A Review of Cyber Security Assessment (CSA) for Industrial Control Systems (ICS) and Their Impact on The Availability of the ICS Operation
暂无分享,去创建一个
Mohd Ezanee Rusli | Norziana Jamil | Razali Jidin | Lam Kwok Yan | Nor Afiq Bonandir | Md Nabil Ahmad Nawawi | Loviana Lenyu Anak Dunstan Maudau | N. Jamil | R. Jidin | M. Rusli
[1] Karen A. Scarfone,et al. Guide to Industrial Control Systems (ICS) Security , 2015 .
[2] Sherali Zeadally,et al. Critical infrastructure protection: Requirements and challenges for the 21st century , 2015, Int. J. Crit. Infrastructure Prot..
[3] Peter Maynard,et al. Threat Analysis of BlackEnergy Malware for Synchrophasor based Real-time Control and Monitoring in Smart Grid , 2016, ICS-CSR.
[4] Hsinchun Chen,et al. Identifying SCADA vulnerabilities using passive and active vulnerability assessment techniques , 2016, 2016 IEEE Conference on Intelligence and Security Informatics (ISI).
[5] Hsinchun Chen,et al. Identifying Supervisory Control and Data Acquisition (SCADA) Devices and their Vulnerabilities on the Internet of Things (IoT): A Text Mining Approach , 2018 .
[6] Leandros A. Maglaras,et al. Vulnerability Analysis of Network Scanning on SCADA Systems , 2018, Secur. Commun. Networks.