Early Warning System for Cascading Effect Control in Energy Control Systems
暂无分享,去创建一个
[1] Cristina Alcaraz,et al. The role of Wireless Sensor Networks in the area of Critical Information Infrastructure Protection , 2007, Inf. Secur. Tech. Rep..
[2] McClanahan. SCADA and IP: is network convergence really here? , 2003 .
[3] Janusz Bialek,et al. Critical Interrelations Between ICT and Electricity System , 2010 .
[4] Edward Nash,et al. Coupling Wireless Sensor Networks and the Sensor Observation Service - Bridging the Interoperability Gap , 2009 .
[5] Gabriel Maciá-Fernández,et al. Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..
[7] Sebastian Schmidt,et al. Internet Early Warning Systems , 2010 .
[8] Sergio M. Savaresi,et al. Unsupervised learning techniques for an intrusion detection system , 2004, SAC '04.
[9] Cristina Alcaraz,et al. Analysis of Security Threats, Requirements, Technologies and Standards in Wireless Sensor Networks , 2009, FOSAD.
[10] Joachim Biskup,et al. Towards Early Warning Systems - Challenges, Technologies and Architecture , 2009, CRITIS.
[11] Mark Gibson,et al. Technologies and Techniques for Early Warning Systems to Monitor and Evaluate Drinking Water Quality: A State-of-the-Art Review , 2005 .
[12] Sascha Bastke,et al. Internet Early Warning Systems-Overview and Architecture , 2009 .
[13] Cristina Alcaraz,et al. Adaptive Dispatching of Incidences Based on Reputation for SCADA Systems , 2009, TrustBus.
[14] Cristina Alcaraz,et al. A Security Analysis for Wireless Sensor Mesh Networks in Highly Critical Systems , 2010, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[15] Wu-chi Feng,et al. Forensix: a robust, high-performance reconstruction system , 2005, 25th IEEE International Conference on Distributed Computing Systems Workshops.
[16] Ronald E. Fisher,et al. Analyzing Cross-Sector Interdependencies , 2007, 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07).
[17] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[18] Bon K. Sy. Integrating intrusion alert information to aid forensic explanation: An analytical intrusion detection framework for distributive IDS , 2009, Inf. Fusion.
[19] Timothy Grance,et al. Guide to Integrating Forensic Techniques into Incident Response , 2006 .
[20] G. Maciá-Fernández,et al. Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..