A review: Towards practical attack taxonomy for industrial control systems
暂无分享,去创建一个
Zaini Jamaludin | Mohd Ezanee Rusli | Norziana Jamil | Muhammad Reza Z'aba | Razali Jidin | Qais Saif Qassim | Wan Azlan Wan Kamarulzaman | Nabil Ahmad Zawawi | Q. Qassim | N. Jamil | R. Jidin | M. Rusli | M. Z’aba | W. Kamarulzaman | Zaini Jamaludin
[1] Seyyed MohsenHashemi,et al. Taxonomy of the Security Aspects of Cloud Computing Systems - A Survey , 2012 .
[2] Gianluca Stringhini,et al. Targeted Attacks against Industrial Control Systems: Is the Power Industry Prepared? , 2014, SEGS@CCS.
[3] Mathias Ekstedt,et al. Issues of cyber security in SCADA-systems - On the importance of awareness , 2009 .
[4] Ray Hunt,et al. A taxonomy of network and computer attacks , 2005, Comput. Secur..
[5] Dale C. Rowe,et al. A survey SCADA of and critical infrastructure incidents , 2012, RIIT '12.
[6] Wei Gao,et al. Industrial Control System Cyber Attacks , 2013, ICS-CSR.
[7] William B Miller. Classifying and Cataloging Cyber-Security Incidents Within Cyber-Physical Systems , 2014 .
[8] G. Dondossola,et al. Cyber risk assessment of power control systems — A metrics weighed by attack experiments , 2011, 2011 IEEE Power and Energy Society General Meeting.
[9] Xiaohui Liang,et al. Securing smart grid: cyber attacks, countermeasures, and challenges , 2012, IEEE Communications Magazine.
[10] Yuan Xue,et al. Taxonomy for description of cross-domain attacks on CPS , 2013, HiCoNS '13.
[11] Thomas A. Longstaff,et al. A common language for computer security incidents , 1998 .
[12] Sujeet Shenoi,et al. A Taxonomy of Attacks on the DNP3 Protocol , 2009, Critical Infrastructure Protection.
[13] Maria Kjaerland,et al. A taxonomy and comparison of computer security incidents from the commercial and government sectors , 2006, Comput. Secur..
[14] Todd R. Andel,et al. Trust Management and Security in the Future Communication-Based "Smart" Electric Power Grid , 2011, 2011 44th Hawaii International Conference on System Sciences.
[15] D. L. Lough,et al. A taxonomy of computer attacks with applications to wireless networks , 2001 .
[16] Wei Jiang,et al. DMAT : A New Network and Computer Attack Classification , 2013 .
[17] S. Shankar Sastry,et al. A Taxonomy of Cyber Attacks on SCADA Systems , 2011, 2011 International Conference on Internet of Things and 4th International Conference on Cyber, Physical and Social Computing.
[18] Jugal K. Kalita,et al. Network attacks: Taxonomy, tools and systems , 2014, J. Netw. Comput. Appl..
[19] Louise Leenen,et al. A Computer Network Attack Taxonomy and Ontology , 2012, Int. J. Cyber Warf. Terror..
[20] Himanshu Khurana,et al. Towards A Taxonomy Of Attacks Against Energy Control Systems , 2008, Critical Infrastructure Protection.
[21] Stamatis Karnouskos,et al. Stuxnet worm impact on industrial cyber-physical system security , 2011, IECON 2011 - 37th Annual Conference of the IEEE Industrial Electronics Society.
[22] Qishi Wu,et al. AVOIDIT: A Cyber Attack Taxonomy , 2009 .
[23] D M Faissol,et al. Taxonomies of Cyber Adversaries and Attacks: A Survey of Incidents and Approaches , 2009 .