Vulnerability Assessment of Cyber Security for SCADA Systems
暂无分享,去创建一个
Mohamed Amine Ferrag | Leandros A. Maglaras | Abdelouahid Derhab | Mithun Mukherjee | Stylianos Rallis | Helge Janicke | Awais Yousaf | Richard Smith | Kyle Coffey
[1] Leandros A. Maglaras,et al. Integrated OCSVM mechanism for intrusion detection in SCADA systems , 2014 .
[2] Xuemin Shen,et al. Efficient self-healing group key management with dynamic revocation and collusion resistance for SCADA in smart grid , 2015, Secur. Commun. Networks.
[3] Kevin Jones,et al. A review of cyber security risk assessment methods for SCADA systems , 2016, Comput. Secur..
[4] Leandros A. Maglaras,et al. An assessment of the application of IT security mechanisms to industrial control systems , 2017 .
[5] Karen A. Scarfone,et al. Guide to Industrial Control Systems (ICS) Security , 2015 .
[6] Zahra Moravej,et al. Secure SCADA communication by using a modified key management scheme. , 2013, ISA transactions.
[7] Paul K. Kerr,et al. The Stuxnet Computer Worm: Harbinger of an Emerging Warfare Capability , 2010 .
[8] Imad H. Elhajj,et al. SCADA Intrusion Detection System based on temporal behavior of frequent patterns , 2014, MELECON 2014 - 2014 17th IEEE Mediterranean Electrotechnical Conference.
[9] Dilip Patel,et al. Assessing and augmenting SCADA cyber security: A survey of techniques , 2017, Comput. Secur..
[10] Xiaohui Liang,et al. PaRQ: A Privacy-Preserving Range Query Scheme Over Encrypted Metering Data for Smart Grid , 2013, IEEE Transactions on Emerging Topics in Computing.
[11] Ray Fink. LESSONS LEARNED FROM CYBER SECURITY ASSESSMENTS OF SCADA AND ENERGY MANAGEMENT SYSTEMS , 2006 .
[12] Mercy Bere,et al. Initial investigation of Industrial Control System (ICS) security using Artificial Immune System (AIS) , 2015, 2015 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC).
[13] Eric D. Knapp,et al. Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems , 2011 .
[14] Ernest Foo,et al. DNP3 network scanning and reconnaissance for critical infrastructure , 2016, ACSW.
[15] Luca Bruno,et al. AVATAR: A Framework to Support Dynamic Security Analysis of Embedded Systems' Firmwares , 2014, NDSS.
[16] William H. Sanders,et al. Model-based Security Metrics Using ADversary VIew Security Evaluation (ADVISE) , 2011, 2011 Eighth International Conference on Quantitative Evaluation of SysTems.
[17] Ravishankar K. Iyer,et al. Runtime Semantic Security Analysis to Detect and Mitigate Control-Related Attacks in Power Grids , 2018, IEEE Transactions on Smart Grid.
[18] Helge Janicke,et al. SCADA security in the light of Cyber-Warfare , 2012, Comput. Secur..
[19] Mohamed Amine Ferrag. EPEC: an efficient privacy-preserving energy consumption scheme for smart grid communications , 2017, Telecommun. Syst..
[20] Mohamed Amine Ferrag,et al. A systematic review of data protection and privacy preservation schemes for smart grid communications , 2018 .
[21] T.J. Overbye,et al. SCADA Cyber Security Testbed Development , 2006, 2006 38th North American Power Symposium.
[22] Mirjana D. Stojanovic,et al. An Improved Risk Assessment Method for SCADA Information Security , 2014 .
[23] Zahir Tari,et al. PPFSCADA: Privacy preserving framework for SCADA data publishing , 2014, Future Gener. Comput. Syst..
[24] Tai-hoon Kim,et al. Improving SCADA control systems security with software vulnerability analysis , 2010 .
[25] Athar Mahboob,et al. Securing SCADA systems with open source software , 2013, 2013 High Capacity Optical Networks and Emerging/Enabling Technologies.
[26] Robert Radvanovsky,et al. Handbook of SCADA/Control Systems Security, Second Edition , 2016 .
[27] Leandros A. Maglaras,et al. Vulnerability Analysis of Network Scanning on SCADA Systems , 2018, Secur. Commun. Networks.
[28] Yacov Y. Haimes,et al. Risks of Terrorism to Information Technology and to Critical Interdependent Infrastructures , 2004 .
[29] Alvaro A. Cárdenas,et al. Attacks against process control systems: risk assessment, detection, and response , 2011, ASIACCS '11.
[30] Yongge Wang,et al. sSCADA: securing SCADA infrastructure communications , 2011, Int. J. Commun. Networks Distributed Syst..
[31] Stefan Savage,et al. You've Got Vulnerability: Exploring Effective Vulnerability Notifications , 2016, USENIX Security Symposium.
[32] Jie Wu,et al. An Efficient Privacy Preserving Keyword Search Scheme in Cloud Computing , 2009, 2009 International Conference on Computational Science and Engineering.
[33] Yi Yang,et al. EMRQ: An Efficient Multi-keyword Range Query Scheme in Smart Grid Auction Market , 2014, KSII Trans. Internet Inf. Syst..
[34] Justin Varghese,et al. Security issues in SCADA based industrial control systems , 2017, 2017 2nd International Conference on Anti-Cyber Crimes (ICACC).
[35] Mauricio Papa,et al. Passive Scanning in Modbus Networks , 2007, Critical Infrastructure Protection.
[36] John S. Heidemann,et al. Understanding passive and active service discovery , 2007, IMC '07.
[37] Athanasios V. Vasilakos,et al. False Data Injection on State Estimation in Power Systems—Attacks, Impacts, and Defense: A Survey , 2017, IEEE Transactions on Industrial Informatics.
[38] Elaine Shi,et al. Multi-Dimensional Range Query over Encrypted Data , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[39] Eul Gyu Im,et al. Man-in-the-Middle Attack Test-bed Investigating Cyber-security Vulnerabilities in Smart Grid SCADA Systems , 2012 .
[40] Anirban Basu,et al. Privacy-friendly secure bidding for smart grid demand-response , 2017, Inf. Sci..
[41] Chen-Ching Liu,et al. A PMU-based risk assessment framework for power control systems , 2013, 2013 IEEE Power & Energy Society General Meeting.
[42] Ross J. Anderson,et al. Optical Fault Induction Attacks , 2002, CHES.
[43] G. Manimaran,et al. Cybersecurity for Critical Infrastructures: Attack and Defense Modeling , 2010, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.
[44] Rafal Leszczyna,et al. Cybersecurity and privacy in standards for smart grids - A comprehensive survey , 2018, Comput. Stand. Interfaces.
[45] Zahir Tari,et al. An Efficient Data-Driven Clustering Technique to Detect Attacks in SCADA Systems , 2016, IEEE Transactions on Information Forensics and Security.
[46] Parviz Keshavarzi,et al. Advance hybrid key management architecture for SCADA network security , 2016, Secur. Commun. Networks.
[47] Ahmed Ahmim,et al. Privacy-Preserving Schemes for Ad Hoc Social Networks: A Survey , 2016, IEEE Communications Surveys & Tutorials.
[48] Ling Shi,et al. Optimal Linear Cyber-Attack on Remote State Estimation , 2017, IEEE Transactions on Control of Network Systems.
[49] Xinghuo Yu,et al. An unsupervised anomaly-based detection approach for integrity attacks on SCADA systems , 2014, Comput. Secur..
[50] Leandros A. Maglaras,et al. Human behaviour as an aspect of cybersecurity assurance , 2016, Secur. Commun. Networks.
[51] Kee-Choon Kwon,et al. A CYBER SECURITY RISK ASSESSMENT FOR THE DESIGN OF I&C SYSTEMS IN NUCLEAR POWER PLANTS , 2012 .
[52] Farnam Jahanian,et al. CANVuS: Context-Aware Network Vulnerability Scanning , 2010, RAID.
[53] Rong Zheng,et al. Detecting Stealthy False Data Injection Using Machine Learning in Smart Grid , 2017, IEEE Systems Journal.
[54] Leandros A. Maglaras,et al. A Cybersecurity Detection Framework for Supervisory Control and Data Acquisition Systems , 2016, IEEE Transactions on Industrial Informatics.
[55] Xiaohui Liang,et al. SESA: an efficient searchable encryption scheme for auction in emerging smart grid marketing , 2014, Secur. Commun. Networks.
[56] Man-Ki Yoon,et al. A Reconnaissance Attack Mechanism for Fixed-Priority Real-Time Systems , 2017, ArXiv.
[57] Rong Zheng,et al. Detecting Stealthy False Data Injection Using Machine Learning in Smart Grid , 2017, IEEE Syst. J..
[58] Eric Wustrow,et al. ZMap: Fast Internet-wide Scanning and Its Security Applications , 2013, USENIX Security Symposium.
[59] Nada Golmie,et al. An integrated detection system against false data injection attacks in the Smart Grid , 2015, Secur. Commun. Networks.
[60] Ralph Langner,et al. Stuxnet: Dissecting a Cyberwarfare Weapon , 2011, IEEE Security & Privacy.
[61] Sergei Skorobogatov,et al. Semi-invasive attacks: a new approach to hardware security analysis , 2005 .
[62] D. Prince Winston,et al. An enhanced optimization based algorithm for intrusion detection in SCADA network , 2017, Comput. Secur..
[63] Wei Gao,et al. On SCADA control system command and response injection and intrusion detection , 2010, 2010 eCrime Researchers Summit.
[64] Ajay Prasad,et al. SCADA security issues and FPGA implementation of AES — A review , 2016, 2016 2nd International Conference on Next Generation Computing Technologies (NGCT).
[65] Mathias Ekstedt,et al. Issues of cyber security in SCADA-systems - On the importance of awareness , 2009 .
[66] K. McLaughlin,et al. Multiattribute SCADA-Specific Intrusion Detection System for Power Networks , 2014, IEEE Transactions on Power Delivery.
[67] Haider Abbas,et al. Cloud-Assisted IoT-Based SCADA Systems Security: A Review of the State of the Art and Future Challenges , 2016, IEEE Access.