Challenges and Perspectives in Security Measures for the SCADA System
暂无分享,去创建一个
[1] I.H. Lim,et al. Applying security algorithms against cyber attacks in the distribution automation system , 2008, 2008 IEEE/PES Transmission and Distribution Conference and Exposition.
[2] Yongge Wang,et al. sSCADA: securing SCADA infrastructure communications , 2011, Int. J. Commun. Networks Distributed Syst..
[3] Vinay M. Igure,et al. Security issues in SCADA networks , 2006, Comput. Secur..
[4] L. Pietre-Cambacedes,et al. Cryptographic Key Management for SCADA Systems-Issues and Perspectives , 2008, 2008 International Conference on Information Security and Assurance (isa 2008).
[5] Cheryl L. Beaver,et al. Key Management for SCADA , 2002 .
[6] Julian L. Rrushi,et al. Detecting Attacks in Power Plant Interfacing Substations through Probabilistic Validation of Attack-Effect Bindings , 2008 .
[7] Ulf Lindqvist,et al. Using Model-based Intrusion Detection for SCADA Networks , 2006 .
[8] Bülent Yener,et al. Key distribution mechanisms for wireless sensor networks : a survey , 2005 .
[9] Jill Slay,et al. Lessons Learned from the Maroochy Water Breach , 2007, Critical Infrastructure Protection.
[10] Ed Dawson,et al. SKMA - A Key Management Architecture for SCADA Systems , 2006 .
[11] S. Hurd,et al. Tutorial: Security in Electric Utility Control Systems , 2008, 2008 61st Annual Conference for Protective Relay Engineers.
[12] Sean W. Smith,et al. YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems , 2008, SEC.
[13] Andrew K. Wright,et al. Low-Latency Cryptographic Protection for SCADA Communications , 2004, ACNS.
[14] S.J. Lee,et al. Distributed Restoration system applying Multi-Agent in distribution automation system , 2008, 2008 IEEE Power and Energy Society General Meeting - Conversion and Delivery of Electrical Energy in the 21st Century.
[15] Theodore Y. Ts'o,et al. Kerberos: an authentication service for computer networks , 1994, IEEE Communications Magazine.
[16] F. Cleveland,et al. IEC TC57 Security Standards for the Power System's Information Infrastructure - Beyond Simple Encryption , 2006, 2005/2006 IEEE/PES Transmission and Distribution Conference and Exhibition.
[17] Christopher Allen,et al. The TLS Protocol Version 1.0 , 1999, RFC.