Accurate modeling of Modbus/TCP for intrusion detection in SCADA systems
暂无分享,去创建一个
[1] Béla Genge,et al. A cyber-physical experimentation environment for the security analysis of networked industrial control systems , 2012, Comput. Electr. Eng..
[2] Salim Hariri,et al. A testbed for analyzing security of SCADA control systems (TASSCS) , 2011, ISGT 2011.
[3] T. M. Chen,et al. Stuxnet, the real start of cyber warfare? [Editor's Note] , 2010, IEEE Netw..
[4] Wei Gao,et al. On SCADA control system command and response injection and intrusion detection , 2010, 2010 eCrime Researchers Summit.
[5] Ulf Lindqvist,et al. Detection, correlation, and visualization of attacks against critical infrastructure systems , 2010, 2010 Eighth International Conference on Privacy, Security and Trust.
[6] Siddharth Sridhar,et al. Development of the PowerCyber SCADA security testbed , 2010, CSIIRW '10.
[7] Igor Nai Fovino,et al. Modbus/DNP3 State-Based Intrusion Detection System , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.
[8] Chunlei Wang,et al. A Simulation Environment for SCADA Security Analysis and Assessment , 2010, 2010 International Conference on Measuring Technology and Mechatronics Automation.
[9] T. M. Chen,et al. Smart grids, smart cities need better networks [Editor's Note] , 2010, IEEE Netw..
[10] Hak-Man Kim,et al. Development of test-bed and security devices for SCADA communication in electric power system , 2009, INTELEC 2009 - 31st International Telecommunications Energy Conference.
[11] Alfonso Valdes,et al. Communication pattern anomaly detection in process control systems , 2009, 2009 IEEE Conference on Technologies for Homeland Security.
[12] Intrusion Monitoring in Process Control Systems , 2009, 2009 42nd Hawaii International Conference on System Sciences.
[13] 栄 久米原,et al. Wiresharkパケット解析リファレンス : Network Protocol Analyzer , 2009 .
[14] Gabor Karsai,et al. A testbed for secure and robust SCADA systems , 2008, SIGBED.
[15] Ulf Lindqvist,et al. Using Model-based Intrusion Detection for SCADA Networks , 2006 .
[16] Dayu Yang,et al. Anomaly-Based Intrusion Detection for SCADA Systems , 2006 .
[17] Chi-Ho Tsang,et al. Multi-agent intrusion detection system in industrial network using ant colony clustering approach and unsupervised feature extraction , 2005, 2005 IEEE International Conference on Industrial Technology.
[18] Deborah A. Frincke,et al. Configurable middleware-level intrusion detection for embedded systems , 2005, 25th IEEE International Conference on Distributed Computing Systems Workshops.
[19] Martin Roesch,et al. Snort - Lightweight Intrusion Detection for Networks , 1999 .
[20] Peter G. Neumann,et al. EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances , 1997, CCS 2002.
[21] S. M. Bellovin,et al. Security problems in the TCP/IP protocol suite , 1989, CCRV.