A testbed for secure and robust SCADA systems
暂无分享,去创建一个
Gabor Karsai | Bruno Sinopoli | Annarita Giani | Tanya Roosta | Aakash Shah | Jon Wiley | B. Sinopoli | G. Karsai | A. Giani | T. Roosta | Aakash Shah | John Wiley
[1] B. P. Ziegler,et al. Theory of Modeling and Simulation , 1976 .
[2] P. Barham,et al. The high level architecture , 1999, Proceedings IEEE Virtual Reality (Cat. No. 99CB36316).
[3] Andrew P. Moore,et al. Attack Modeling for Information Security and Survivability , 2001 .
[4] Adi Shamir,et al. Weaknesses in the Key Scheduling Algorithm of RC4 , 2001, Selected Areas in Cryptography.
[5] Pradeep K. Khosla,et al. SWATT: softWare-based attestation for embedded devices , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[6] Richard Han,et al. Node Compromise in Sensor Networks: The Need for Secure Systems ; CU-CS-990-05 , 2005 .
[7] Elaine Shi,et al. Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems , 2005, SOSP '05.
[8] L. V. Doorn,et al. SCUBA: Secure Code Update By Attestation in sensor networks , 2006, WiSe '06.
[9] Vinay M. Igure,et al. Security issues in SCADA networks , 2006, Comput. Secur..
[10] Eric A. M. Luiijf,et al. Creating a European SCADA Security Testbed , 2007, Critical Infrastructure Protection.
[11] Igor Nai Fovino,et al. Effects of intentional threats to power substation control systems , 2008, Int. J. Crit. Infrastructures.