Methodology for Cyber Security Risk Mitigation in Next Generation SCADA Systems
暂无分享,去创建一个
[1] Zhiliang Wang,et al. False sequential logic attack on SCADA system and its physical impact analysis , 2016, Comput. Secur..
[2] Jasna D. Markovic-Petrovic,et al. A Fuzzy AHP Approach for Security Risk Assessment in SCADA Networks , 2019 .
[3] Dilip Patel,et al. Autonomic Computing Architecture for SCADA Cyber Security , 2017, Int. J. Cogn. Informatics Nat. Intell..
[4] Bo Chen,et al. Security and Reliability Perspectives in Cyber-Physical Smart Grids , 2018, 2018 IEEE Innovative Smart Grid Technologies - Asia (ISGT Asia).
[5] Bo Fu,et al. SCADA communication and security issues , 2014, Secur. Commun. Networks.
[6] Adriano Valenzano,et al. Performance Evaluation and Modeling of an Industrial Application-Layer Firewall , 2018, IEEE Transactions on Industrial Informatics.
[7] David Hutchison,et al. An Analysis of Cyber Security Attack Taxonomies , 2018, 2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).
[8] Bandar Aldawsari,et al. Security-Oriented Cloud Platform for SOA-Based SCADA , 2015, 2015 15th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing.
[9] Jasna D. Markovic-Petrovic,et al. Analysis of SCADA system vulnerabilities to DDoS attacks , 2013, 2013 11th International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Services (TELSIKS).
[10] Jasna D. Markovic-Petrovic,et al. Scada systems in the cloud and fog environments: Migration scenarios and security issues , 2019, Facta universitatis - series: Electronics and Energetics.
[11] Steve Hutchinson,et al. Intrusion Detection in Industrial Control Systems , 2016 .
[12] Stephen Hailes,et al. Security of smart manufacturing systems , 2018 .
[13] Helge Janicke,et al. SCADA security in the light of Cyber-Warfare , 2012, Comput. Secur..
[14] Harold Kirkham,et al. Secure Data Transfer Guidance for Industrial Control and SCADA Systems , 2011 .
[15] Karen A. Scarfone,et al. Guide to Industrial Control Systems (ICS) Security , 2015 .
[16] Gabriel Maciá-Fernández,et al. Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..
[17] Keith J. Burnham,et al. Preliminaries of Orthogonal Layered Defence Using Functional and Assurance Controls in Industrial Control Systems , 2019, J. Sens. Actuator Networks.
[18] Haider Abbas,et al. Cloud-Assisted IoT-Based SCADA Systems Security: A Review of the State of the Art and Future Challenges , 2016, IEEE Access.
[19] Mirjana D. Stojanovic,et al. An Improved Risk Assessment Method for SCADA Information Security , 2014 .