Challenges and opportunities in securing industrial control systems
暂无分享,去创建一个
Pieter H. Hartel | Sandro Etalle | Dina Hadziosmanovic | Damiano Bolzoni | D. Bolzoni | S. Etalle | P. Hartel | Dina Hadziosmanovic
[1] Pieter H. Hartel,et al. A log mining approach for process monitoring in SCADA , 2010, International Journal of Information Security.
[2] Aiko Pras,et al. Difficulties in Modeling SCADA Traffic: A Comparative Analysis , 2012, PAM.
[3] Ulf Lindqvist,et al. Using Model-based Intrusion Detection for SCADA Networks , 2006 .
[4] Joseph L. Hellerstein,et al. Towards discovery of event correlation rules , 2001, 2001 IEEE/IFIP International Symposium on Integrated Network Management Proceedings. Integrated Network Management VII. Integrated Management Strategies for the New Millennium (Cat. No.01EX470).
[5] C. Bellettini,et al. Vulnerability Analysis of SCADA Protocol Binaries through Detection of Memory Access Taintedness , 2007, 2007 IEEE SMC Information Assurance and Security Workshop.
[6] Vern Paxson,et al. Bro: a system for detecting network intruders in real-time , 1998, Comput. Networks.
[7] Aunshul Rege‐Patwardhan. Cybercrimes against critical infrastructures: a study of online criminal organization and techniques , 2009 .
[8] M. Naedele,et al. Human-Assisted Intrusion Detection for Process Control Systems , 2004 .
[9] Ning Lu,et al. Safeguarding SCADA Systems with Anomaly Detection , 2003, MMM-ACNS.
[10] Miroslaw Malek,et al. Comprehensive logfiles for autonomic systems , 2004, 18th International Parallel and Distributed Processing Symposium, 2004. Proceedings..
[11] Alfonso Valdes,et al. Communication pattern anomaly detection in process control systems , 2009, 2009 IEEE Conference on Technologies for Homeland Security.
[12] S. Shankar Sastry,et al. Research Challenges for the Security of Control Systems , 2008, HotSec.
[13] Giordano Vicoli,et al. Novelty detection and management to safeguard information-intensive critical infrastructures , 2007 .
[14] Peng Ning,et al. False data injection attacks against state estimation in electric power grids , 2009, CCS.
[15] Renata Teixeira,et al. Early application identification , 2006, CoNEXT '06.