Intrusion Detection for SCADA Systems
暂无分享,去创建一个
[1] Hong Peng,et al. A Defense Model Study Based on IDS and Firewall Linkage , 2010, 2010 International Conference of Information Science and Management Engineering.
[2] Yan-ping Chen,et al. Research on a High Efficient Intrusion Prevention Model , 2010, 2010 Third International Symposium on Intelligent Information Technology and Security Informatics.
[3] Zhiliang Zhu,et al. Research of intrusion detection system based on vulnerability scanner , 2010, 2010 2nd International Conference on Advanced Computer Control.
[4] T. Kropp. System threats and vulnerabilities [power system protection] , 2006, IEEE Power and Energy Magazine.
[5] I.H. Elhajj,et al. Distributed and Collaborative Intrusion Detection Systems , 2008, 2008 IEEE Lebanon Communications Workshop.
[6] Zehua Chen,et al. An adaptive real-time intrusion detection system using sequences of system call , 2003, CCECE 2003 - Canadian Conference on Electrical and Computer Engineering. Toward a Caring and Humane Technology (Cat. No.03CH37436).
[7] Christoph Meinel,et al. An Extensible and Virtualization-Compatible IDS Management Architecture , 2009, 2009 Fifth International Conference on Information Assurance and Security.
[8] Zhao Quangang. A new model of intelligent hybrid detection system , 2010, 2010 International Conference on Networking and Digital Society.
[9] Usman Ahmed,et al. Host based intrusion detection using RBF neural networks , 2009, 2009 International Conference on Emerging Technologies.
[10] HyungJun Kim,et al. Reducing security vulnerabilities for critical infrastructure , 2009 .
[11] John W. Lockwood,et al. SIFT: snort intrusion filter for TCP , 2005, 13th Symposium on High Performance Interconnects (HOTI'05).
[12] Fakhri Karray,et al. Lightweight IDS Based on Features Selection and IDS Classification Scheme , 2009, 2009 International Conference on Computational Science and Engineering.
[13] Milos Manic,et al. Neural Network based Intrusion Detection System for critical infrastructures , 2009, 2009 International Joint Conference on Neural Networks.
[14] Ulf Lindqvist,et al. Using Model-based Intrusion Detection for SCADA Networks , 2006 .
[15] Igor Nai Fovino,et al. Modbus/DNP3 State-Based Intrusion Detection System , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.
[16] Zulaiha Ali Othman,et al. Multilayer packet tagging for network behaviour analysis , 2010, 2010 International Symposium on Information Technology.
[17] Jill Slay,et al. Lessons Learned from the Maroochy Water Breach , 2007, Critical Infrastructure Protection.
[18] Thomas D. Tarman,et al. Asynchronous transfer mode (ATM) intrusion detection , 2001, 2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277).
[19] Zhimin Zhou,et al. The study on network intrusion detection system of Snort , 2010, 2010 International Conference on Networking and Digital Society.
[20] Ma Jun,et al. Research of intrusion detection system based on machine learning , 2010, 2010 2nd International Conference on Computer Engineering and Technology.
[21] A. Daneels,et al. Современные SCADA-системы , 2017 .
[22] Stefan Lüders. CONTROL SYSTEMS UNDER ATTACK , 2005 .
[23] Arshad Iqbal,et al. Network Traffic Analysis and Intrusion Detection Using Packet Sniffer , 2010, 2010 Second International Conference on Communication Software and Networks.
[24] Hossein Shirazi,et al. Increasing Overall Network Security by Integrating Signature-Based NIDS with Packet Filtering Firewall , 2009, 2009 International Joint Conference on Artificial Intelligence.
[25] Vinay M. Igure,et al. Security issues in SCADA networks , 2006, Comput. Secur..
[26] Salim Hariri,et al. A testbed for analyzing security of SCADA control systems (TASSCS) , 2011, ISGT 2011.
[27] Wei Gao,et al. On SCADA control system command and response injection and intrusion detection , 2010, 2010 eCrime Researchers Summit.
[28] R. D. Williams,et al. Security and SCADA protocols , 2006 .
[29] Salvatore D'Antonio,et al. High-Speed Intrusion Detection in Support of Critical Infrastructure Protection , 2006, CRITIS.
[30] Hui Li,et al. Research on intelligent intrusion prevention system based on Snort , 2010, 2010 International Conference on Computer, Mechatronics, Control and Electronic Engineering.
[31] Peeyush Jain,et al. An Adaptive Intrusion Prevention System Based on Immunity , 2009, 2009 International Conference on Advances in Computing, Control, and Telecommunication Technologies.
[32] Deborah A. Frincke,et al. Configurable middleware-level intrusion detection for embedded systems , 2005, 25th IEEE International Conference on Distributed Computing Systems Workshops.
[33] Robert J. Turk. Cyber Incidents Involving Control Systems , 2005 .
[34] Chunlei Wang,et al. A Simulation Environment for SCADA Security Analysis and Assessment , 2010, 2010 International Conference on Measuring Technology and Mechatronics Automation.
[35] Joni da Silva Fraga,et al. Octopus-IIDS: An anomaly based intelligent intrusion detection system , 2010, The IEEE symposium on Computers and Communications.
[36] Jong-Soo Jang,et al. Kernel-level intrusion detection method using simplification and grouping , 2005, The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005..
[37] Craig Valli. SCADA Forensics with Snort IDS , 2009 .