A Review of Cyber Security Techniques for Critical Infrastructure Protection
暂无分享,去创建一个
[1] Sinclair D. Hansen. An intrusion detection system for supervisory control and data acquisition systems , 2008 .
[2] Susan Marie Wade. SCADA Honeynets: The attractiveness of honeypots as critical infrastructure security tools for the detection and analysis of advanced threats , 2011 .
[3] Waleed H. ElSaid. Enhanced cryptographic approaches for SCADA network security. , 2010 .
[4] Sungmo Jung,et al. Software Vulnerability Design and Approaches for Securing SCADA Control Systems , 2009 .
[5] Yongge Wang,et al. sSCADA: securing SCADA infrastructure communications , 2011, Int. J. Commun. Networks Distributed Syst..
[6] Vinay M. Igure,et al. Security issues in SCADA networks , 2006, Comput. Secur..
[7] Aamir Shahzad,et al. A New Cloud based supervisory control and Data Acquisition Implementation to Enhance the Level of Security using Testbed , 2014, J. Comput. Sci..
[8] Shahrulniza Musa,et al. Cryptography and Authentication Placement to Provide Secure Channel for SCADA Communication , 2013 .
[9] Golden G. Richard,et al. SCADA Systems: Challenges for Forensic Investigators , 2012, Computer.
[10] Thomas Morris,et al. A testbed for SCADA control system cybersecurity research and pedagogy , 2011, CSIIRW '11.
[11] S. Shankar Sastry,et al. A Taxonomy of Cyber Attacks on SCADA Systems , 2011, 2011 International Conference on Internet of Things and 4th International Conference on Cyber, Physical and Social Computing.