Analysis and mitigation of vulnerabilities in short-range wireless communications for industrial control systems
暂无分享,去创建一个
[1] ibrahim hassan alshurbaji,et al. Wireless Intrusion Detection Systems , 2013 .
[2] Rayford B. Vaughn,et al. A Retrofit Network Intrusion Detection System for MODBUS RTU and ASCII Industrial Control Systems , 2012, 2012 45th Hawaii International Conference on System Sciences.
[3] Roger L. King,et al. Cybersecurity risk testing of substation phasor measurement units and phasor data concentrators , 2011, CSIIRW '11.
[4] Xin Liu,et al. Performance of IEEE 802.11 under Jamming , 2008, Mobile Networks and Applications.
[5] Chao Yang,et al. Who is peeping at your passwords at Starbucks? — To catch an evil twin access point , 2010, 2010 IEEE/IFIP International Conference on Dependable Systems & Networks (DSN).
[6] Shahid Raza. Secure Communication in WirelessHART and its Integration with Legacy HART , 2010 .
[7] Bradley Reaves,et al. Discovery, infiltration, and denial of service in a process control system wireless network , 2009, 2009 eCrime Researchers Summit.
[8] Stig Fr. Mjølsnes,et al. An Improved Attack on TKIP , 2009, NordSec.
[9] Thiemo Voigt,et al. Security considerations for the WirelessHART protocol , 2009, 2009 IEEE Conference on Emerging Technologies & Factory Automation.
[10] Rayford B. Vaughn,et al. Discovering vulnerabilities in control system human-machine interface software , 2009, J. Syst. Softw..
[11] Igor Nai Fovino,et al. Design and Implementation of a Secure Modbus Protocol , 2009, Critical Infrastructure Protection.
[12] Erik Tews,et al. Practical attacks against WEP and WPA , 2009, WiSec '09.
[13] Ray Hunt,et al. A review of WPAN security: attacks and prevention , 2008, Mobility '08.
[14] Song Han,et al. WirelessHART: Applying Wireless Technology in Real-Time Industrial Process Control , 2008, 2008 IEEE Real-Time and Embedded Technology and Applications Symposium.
[15] Yang Xiao,et al. Intrusion detection techniques in mobile ad hoc and wireless sensor networks , 2007, IEEE Wireless Communications.
[16] Erik Tews,et al. Breaking 104 Bit WEP in Less Than 60 Seconds , 2007, WISA.
[17] Ken Masica,et al. Recommended Practices Guide for Securing ZigBee Wireless Networks in Process Control System Environments: Draft , 2007 .
[18] Jill Slay,et al. Lessons Learned from the Maroochy Water Breach , 2007, Critical Infrastructure Protection.
[19] Francesco Parisi-Presicce,et al. DNPSec: Distributed Network Protocol Version 3 (DNP3) Security Framework , 2007 .
[20] Avishai Wool,et al. Cracking the Bluetooth PIN , 2005, MobiSys '05.
[21] John D. Fernandez,et al. SCADA systems: vulnerabilities and remediation , 2005 .
[22] David M. Nicol,et al. Evaluation of secure peer-to-peer overlay routing for survivable SCADA systems , 2004, Proceedings of the 2004 Winter Simulation Conference, 2004..
[23] David A. Wagner,et al. Security considerations for IEEE 802.15.4 networks , 2004, WiSe '04.
[24] Stefan Savage,et al. 802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions , 2003, USENIX Security Symposium.
[25] Adi Shamir,et al. Weaknesses in the Key Scheduling Algorithm of RC4 , 2001, Selected Areas in Cryptography.
[26] Ross J. Anderson. Why cryptosystems fail , 1993, CCS '93.