Formal Vulnerability Analysis of a Security System for Remote Fieldbus Access
暂无分享,去创建一个
[1] Bruno Dutertre. Formal Modeling and Analysis of the Modbus Protocol , 2007, Critical Infrastructure Protection.
[2] Vlastimil Klíma,et al. Attacking RSA-Based Sessions in SSL/TLS , 2003, CHES.
[3] Jeffrey L. Hieb,et al. Cyber security risk assessment for SCADA and DCS networks. , 2007, ISA transactions.
[4] Andrew D. Gordon,et al. Verified Reference Implementations of WS-Security Protocols , 2006, WS-FM.
[5] Vinay M. Igure,et al. Security issues in SCADA networks , 2006, Comput. Secur..
[6] Karen A. Scarfone,et al. SP 800-82. Guide to Industrial Control Systems (ICS) Security: Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control Systems (DCS), and other control system configurations such as Programmable Logic Controllers (PLC) , 2011 .
[7] Richard Zurawski,et al. The Industrial Information Technology Handbook , 2004, The Industrial Information Technology Handbook.
[8] Michael S. DePriest. Network security considerations in TCP/IP-based manufacturing automation , 1997 .
[9] Sujeet Shenoi,et al. Security Analysis of Multilayer SCADA Protocols , 2007, Critical Infrastructure Protection.
[10] Kenneth G. Paterson,et al. Plaintext Recovery Attacks against SSH , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[11] Martin Naedele,et al. Security for Process Control Systems: An Overview , 2008, IEEE Security & Privacy Magazine.
[12] A. Treytl,et al. Security measures for industrial fieldbus systems - state of the art and solutions for IP-based approaches , 2004, IEEE International Workshop on Factory Communication Systems, 2004. Proceedings..
[13] Martín Abadi,et al. Computer-Assisted Verification of a Protocol for Certified Email , 2003, SAS.
[14] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[15] Christian Schwaiger,et al. Achievement of secure Internet access to fieldbus systems , 2002, Microprocess. Microsystems.
[16] Adriano Valenzano,et al. Detecting Chains of Vulnerabilities in Industrial Networks , 2009, IEEE Transactions on Industrial Informatics.
[17] Ann Miller. Trends in Process Control Systems Security , 2005, IEEE Secur. Priv..
[18] M BellovinSteven,et al. Just fast keying , 2004 .
[19] Martín Abadi,et al. Just fast keying in the pi calculus , 2004, TSEC.
[20] Bruno Blanchet,et al. An efficient cryptographic protocol verifier based on prolog rules , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..
[21] L. Pietre-Cambacedes,et al. Cryptographic Key Management for SCADA Systems-Issues and Perspectives , 2008, 2008 International Conference on Information Security and Assurance (isa 2008).
[22] Martín Abadi,et al. Mobile values, new names, and secure communication , 2001, POPL '01.
[23] John C. Mitchell,et al. Multiset rewriting and the complexity of bounded security protocols , 2004, J. Comput. Secur..
[24] Gavin Lowe,et al. A hierarchy of authentication specifications , 1997, Proceedings 10th Computer Security Foundations Workshop.