Identifying and Scoring Vulnerability in SCADA Environments
暂无分享,去创建一个
[1] Yacov Y. Haimes,et al. Hierarchical Holographic Modeling , 1981, IEEE Transactions on Systems, Man, and Cybernetics.
[2] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[3] Yacov Y Haimes,et al. Risk Filtering, Ranking, and Management Framework Using Hierarchical Holographic Modeling , 2002, Risk analysis : an official publication of the Society for Risk Analysis.
[4] Herbert J. Mattord,et al. Principles of Information Security , 2004 .
[5] Yacov Y. Haimes,et al. Risks of Terrorism to Information Technology and to Critical Interdependent Infrastructures , 2004 .
[6] Mark A. Turnquist,et al. Assessing the performance of interdependent infrastructures and optimizing investments , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.
[7] Shamkant B. Navathe,et al. A Management Perspective on Risk of Security Threats to Information Systems , 2005, Inf. Technol. Manag..
[8] Yacov Y. Haimes,et al. Journal of Homeland Security and Emergency Management A Roadmap for Quantifying the Efficacy of Risk Management of Information Security and Interdependent , 2011 .
[9] W. Granzer,et al. Security in networked building automation systems , 2006, 2006 IEEE International Workshop on Factory Communication Systems.
[10] Jack Wiles. Supervisory Control and Data Acquisition , 2008 .
[11] Carlo Bellettini,et al. Combating Memory Corruption Attacks On Scada Devices , 2008, Critical Infrastructure Protection.
[12] Sujeet Shenoi,et al. A Taxonomy of Attacks on the DNP3 Protocol , 2009, Critical Infrastructure Protection.
[13] Igor Nai Fovino,et al. Design and Implementation of a Secure Modbus Protocol , 2009, Critical Infrastructure Protection.
[14] Raul Aquino-Santos,et al. Emerging Technologies in Wireless Ad-hoc Networks: Applications and Future Development , 2010 .
[15] Georgios Loukas,et al. Protection Against Denial of Service Attacks: A Survey , 2010, Comput. J..
[16] David G. Holmberg,et al. BACnet wide area network security threat assessment , 2011 .
[17] S. Shankar Sastry,et al. A Taxonomy of Cyber Attacks on SCADA Systems , 2011, 2011 International Conference on Internet of Things and 4th International Conference on Cyber, Physical and Social Computing.
[18] Dale C. Rowe,et al. A survey SCADA of and critical infrastructure incidents , 2012, RIIT '12.
[19] Helge Janicke,et al. SCADA security in the light of Cyber-Warfare , 2012, Comput. Secur..
[20] Jian Guan,et al. Chapter 4 – A Digraph Model for Risk Identification and Management in SCADA Systems , 2013 .
[21] Prabaharan Poornachandran,et al. Detecting the network attack vectors on SCADA systems , 2015, 2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[22] Federica Pascucci,et al. Communications network analysis in a SCADA system testbed under cyber-attacks , 2015, 2015 23rd Telecommunications Forum Telfor (TELFOR).
[23] Zhao Yan,et al. The Study of Security Issues for the Industrial Control Systems Communication Protocols , 2015 .
[24] Kevin Jones,et al. A Forensic Taxonomy of SCADA Systems and Approach to Incident Response , 2015, ICS-CSR.
[25] Daniel Krauss,et al. Ontology-based detection of cyber-attacks to SCADA-systems in critical infrastructures , 2016, 2016 Sixth International Conference on Digital Information and Communication Technology and its Applications (DICTAP).
[26] Elias Bou-Harb. Passive inference of attacks on SCADA communication protocols , 2016, 2016 IEEE International Conference on Communications (ICC).