The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for SCADA with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1993-2004 (23) 2005-2006 (24) 2007 (18) 2008 (32) 2009 (31) 2010 (41) 2011 (36) 2012 (46) 2013 (61) 2014 (85) 2015 (70) 2016 (90) 2017 (61) 2018 (51) 2019 (74) 2020 (64) 2021 (73) 2022 (61) 2023 (41) 2024 (15)
Publication types (Num. hits)
article(342) incollection(9) inproceedings(632) phdthesis(10) proceedings(4)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 125 occurrences of 90 keywords

Results
Found 997 publication records. Showing 997 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
15Adi Abimanyu, Jumari, Triyono, Dwi Yuliansari, Gina Kusuma, Sukarman Design Mini Scada for Furnace Induction Reactor of Kernel Coating. Search on Bibsonomy IC3INA The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Helge Janicke, Kevin I. Jones (eds.) 1st International Symposium for ICS & SCADA Cyber Security Research 2013, ICS-CSR 2013, 16-17 September 2013, Leicester, UK Search on Bibsonomy ICS-CSR The full citation details ... 2013 DBLP  BibTeX  RDF
15Francesco Buccafurri, Antonello Comi, Gianluca Lax, Domenico Rosaci A Trust-Based Approach for Detecting Compromised Nodes in SCADA Systems. Search on Bibsonomy MATES The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Abdulmohsen Almalawi, Zahir Tari, Adil Fahad, Ibrahim Khalil A Framework for Improving the Accuracy of Unsupervised Intrusion Detection for SCADA Systems. Search on Bibsonomy TrustCom/ISPA/IUCC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Sarah Calderwood, Weiru Liu, Jun Hong 0001, Michael Loughlin An Architecture of a Multi-Agent System for SCADA - Dealing With Uncertainty, Plans and Actions. Search on Bibsonomy ICINCO (1) The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Sung-Hwan Kim, Min-Woo Park, Jung-Ho Eom, Tai-Myoung Chung The Methodology for Hardening SCADA Security Using Countermeasure Ordering. Search on Bibsonomy MUE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Hui Lin 0005, Adam J. Slagell, Catello Di Martino, Zbigniew Kalbarczyk, Ravishankar K. Iyer Adapting Bro into SCADA: building a specification-based intrusion detection system for the DNP3 protocol. Search on Bibsonomy CSIIRW The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Petr Novák, Petr Kadera, Pavel Vrba, Radek Sindelár Architecture of a multi-agent system for SCADA level in smart distributed environments. Search on Bibsonomy ETFA The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Abdulmohsen Almalawi, Zahir Tari, Ibrahim Khalil, Adil Fahad SCADAVT-A framework for SCADA security testbed based on virtualization technology. Search on Bibsonomy LCN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Ryszard Jakuszewski Programming of Industrial Object Simulators in Proficy HMI/SCADA iFIX System. Search on Bibsonomy ICMMI The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Patric Nader, Paul Honeine, Pierre Beauseroy Intrusion detection in scada systems using one-class classification. Search on Bibsonomy EUSIPCO The full citation details ... 2013 DBLP  BibTeX  RDF
15Jianmin Jiang, Lasith Yasakethu Anomaly Detection via One Class SVM for Protection of SCADA Systems. Search on Bibsonomy CyberC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Shengye Lu, Marko Pikkarainen, Sami Repo, Felipe Alvarez-Cuevas-Figuerola Utilizing SCADA and IEC 61850 for real-time MV/LV network monitoring. Search on Bibsonomy ISGT Europe The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15William Knowles, Daniel Prince, David Hutchison 0001, Jules Ferdinand Pagna Disso, Kevin Jones Towards Real-Time Assessment of Industrial Control Systems (ICSs): A Framework for Future Research. Search on Bibsonomy ICS-CSR The full citation details ... 2013 DBLP  BibTeX  RDF
15Khan Ferdous Wahid, Nicolai Kuntze, Carsten Rudolph Trusted Virtual Machine Management for Virtualization in Critical Environments. Search on Bibsonomy ICS-CSR The full citation details ... 2013 DBLP  BibTeX  RDF
15Robert F. Oates, Fran Thom, Graham Herries Security-Aware, Model-Based Systems Engineering with SysML. Search on Bibsonomy ICS-CSR The full citation details ... 2013 DBLP  BibTeX  RDF
15Ivan Cibrario Bertolotti, Luca Durante, Tingting Hu, Adriano Valenzano A Model for the Analysis of Security Policies in Industrial Networks. Search on Bibsonomy ICS-CSR The full citation details ... 2013 DBLP  BibTeX  RDF
15Andrew J. C. Blyth Role Logic and its Application to the Analysis of Process Control Systems from the Socio - Technical System Perspective. Search on Bibsonomy ICS-CSR The full citation details ... 2013 DBLP  BibTeX  RDF
15Thomas H. Morris, Wei Gao Industrial Control System Cyber Attacks. Search on Bibsonomy ICS-CSR The full citation details ... 2013 DBLP  BibTeX  RDF
15Amit Soni, Sye Loong Keoh, Sandeep S. Kumar, Oscar García Morchon HADA: Hybrid Access Decision Architecture for Building Automation and Control Systems. Search on Bibsonomy ICS-CSR The full citation details ... 2013 DBLP  BibTeX  RDF
15Ismael Abad Cardiel, Ruben Heradio Gil, Carlos Cerrada Somolinos, José Antonio Cerrada Somolinos A SCADA oriented middleware for RFID technology. Search on Bibsonomy Expert Syst. Appl. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Igor Nai Fovino, Alessio Coletta, Andrea Carcano, Marcelo Masera Critical State-Based Filtering System for Securing SCADA Network Protocols. Search on Bibsonomy IEEE Trans. Ind. Electron. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Dina Hadziosmanovic, Damiano Bolzoni, Pieter H. Hartel A log mining approach for process monitoring in SCADA. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Xian Liu Quality of Optical Channels in Wireless SCADA for Offshore Wind Farms. Search on Bibsonomy IEEE Trans. Smart Grid The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Yang Zhang 0015, Junliang Chen Wide-area SCADA system with distributed security framework. Search on Bibsonomy J. Commun. Networks The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Irfan Ahmed 0001, Sebastian Obermeier 0001, Martin Naedele, Golden G. Richard III SCADA Systems: Challenges for Forensic Investigators. Search on Bibsonomy Computer The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Recep Yenitepe Design and implementation of a SCADA-controlled MTMPS as a mechatronics training unit. Search on Bibsonomy Comput. Appl. Eng. Educ. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Sergio García-Nieto, Miguel A. Martínez 0001, José Vicente Salcedo, David Laurí Practice tool based on open source SCADA for experimentation in nonlinear control using the inverted pendulum. Search on Bibsonomy Comput. Appl. Eng. Educ. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Zhendong Ma, Paul Smith 0001, Florian Skopik Towards a Layered Architectural View for Security Analysis in SCADA Systems Search on Bibsonomy CoRR The full citation details ... 2012 DBLP  BibTeX  RDF
15Yongge Wang sSCADA: Securing SCADA Infrastructure Communications Search on Bibsonomy CoRR The full citation details ... 2012 DBLP  BibTeX  RDF
15Luciano Sánchez, Inés Couso Singular spectral analysis of ill-known signals and its application to predictive maintenance of windmills with SCADA records. Search on Bibsonomy Soft Comput. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15HyungJun Kim Security and Vulnerability of SCADA Systems over IP-Based Wireless Sensor Networks. Search on Bibsonomy Int. J. Distributed Sens. Networks The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Andrew Nicholson, S. Webber, S. Dyer, T. Patel, Helge Janicke SCADA security in the light of Cyber-Warfare. Search on Bibsonomy Comput. Secur. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Julian L. Rrushi SCADA Protocol Vulnerabilities. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Abdelmajid Khelil, Daniel Germanus, Neeraj Suri Protection of SCADA Communication Channels. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Cristina Alcaraz, Gerardo Fernandez, Fernando Carvajal Security Aspects of SCADA and DCS Environments. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Ondrej Rysavý, Jaroslav Ráb, Patrik Halfar, Miroslav Svéda A Formal Authorization Framework for Networked SCADA Systems. Search on Bibsonomy ECBS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Branislav Atlagic, Mihaly Sagi, Dejan Milinkov, Bojan Bogovac, Stanko Culaja Model-based approach to the development of SCADA applications. Search on Bibsonomy ECBS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Branislav Atlagic, Mihaly Sagi, Dejan Milinkov, Bojan Bogovac, Stanko Culaja A Way towards Efficiency of SCADA Infrastructure. Search on Bibsonomy ECBS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Nabil Sahli, Mohamed Benmohammed Security Ontology for Semantic SCADA. Search on Bibsonomy ICWIT The full citation details ... 2012 DBLP  BibTeX  RDF
15Thomas Richard McEvoy, Stephen D. Wolthusen Agent Interaction and State Determination in SCADA Systems. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Jeffrey L. Hieb, Jacob Schreiver, James H. Graham Using Bloom Filters to Ensure Access Control and Authentication Requirements for SCADA Field Devices. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Rafael Ramos Regis Barbosa, Ramin Sadre, Aiko Pras Difficulties in Modeling SCADA Traffic: A Comparative Analysis. Search on Bibsonomy PAM The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Rafael Ramos Regis Barbosa, Ramin Sadre, Aiko Pras A first look into SCADA network traffic. Search on Bibsonomy NOMS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Biswajit Panja, Atul Prakash 0001, Priyanka Meharia, Bradley Schneider Security in sensor network based SCADA system for adaptive traffic signal operation. Search on Bibsonomy CTS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Guillermo Francia III, David Thornton, Thomas Brookshire Wireless vulnerability of SCADA systems. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Shahnewaz A. Jolly, Vahid Garousi, Matt M. Eskandar Automated Unit Testing of a SCADA Control Software: An Industrial Case Study Based on Action Research. Search on Bibsonomy ICST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Sioe T. Mak, Nader Farah Synchronizing SCADA and Smart Meters operation for advanced smart distribution grid applications. Search on Bibsonomy ISGT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Göran Andersson, Peyman Mohajerin Esfahani, Maria Vrakopoulou, Kostas Margellos, John Lygeros, André Teixeira 0001, György Dán, Henrik Sandberg, Karl Henrik Johansson Cyber-security of SCADA systems. Search on Bibsonomy ISGT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Rodrigo Palma-Behnke, Diego Ortiz, Lorenzo Reyes, Guillermo Jimenez-Estevez, Natalia Garrido Social SCADA and Demand Response for sustainable isolated microgrids. Search on Bibsonomy ISGT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Armando W. Colombo, J. Marco Mendes, Paulo Leitão, Stamatis Karnouskos Service-oriented SCADA and MES supporting Petri nets based orchestrated automation systems. Search on Bibsonomy IECON The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Görkem Kilinç 0001, Igor Nai Fovino Distributed Identity Based Private Key Generation for SCADA Systems. Search on Bibsonomy CRITIS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Li Yang, Xiedong Cao, Jie Li, Aomin Wang, Weibin Tan, Zhijun Yu Research on FNN-based security defence architecture model of scada network. Search on Bibsonomy CCIS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15 Securing SCADA communication using hybrid cryptography. Search on Bibsonomy ICUIMC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Saranya Parthasarathy, Deepa Kundur Bloom filter based intrusion detection for smart grid SCADA. Search on Bibsonomy CCECE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Rafael Ramos Regis Barbosa, Ramin Sadre, Aiko Pras Towards periodicity based anomaly detection in SCADA networks. Search on Bibsonomy ETFA The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Bill Miller, Dale C. Rowe A survey SCADA of and critical infrastructure incidents. Search on Bibsonomy RIIT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Reda Shbib, Shikun Zhou, Khalil Alkadhimi SCADA System Security, Complexity, and Security Proof. Search on Bibsonomy ICPCA/SWS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Vincent Urias, Brian P. Van Leeuwen, Bryan Richardson Supervisory Command and Data Acquisition (SCADA) system cyber security analysis using a live, virtual, and constructive (LVC) testbed. Search on Bibsonomy MILCOM The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15M. P. Azuwa, Rabiah Ahmad, Shahrin Sahib, Solahuddin Shamsuddin A propose technical security metrics model for SCADA systems. Search on Bibsonomy CyberSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Farid Daryabar, Ali Dehghantanha, Nur Izura Udzir, Nor Fazlida Binti Mohd Sani, Solahuddin bin Shamsuddin Towards secure model for SCADA systems. Search on Bibsonomy CyberSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Sung-Hwan Kim, Jung-Ho Eom, Tai-Myoung Chung A study on optimization of security function for reducing vulnerabilities in SCADA. Search on Bibsonomy CyberSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Xiedong Cao, Cundang Wei, Jie Li, Li Yang, Dan Zhang, Gang Tang The Geological Disasters Defense Expert System of the Massive Pipeline Network SCADA System Based on FNN. Search on Bibsonomy APWeb Workshops The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Li Yang, Xiedong Cao, Jie Li, Cundang Wei, Shiyong Cao, Dan Zhang, Zhidi Chen, Gang Tang A New Formal Description Model of Network Attacking and Defence Knowledge of Oil and Gas Field SCADA System. Search on Bibsonomy APWeb Workshops The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Kaushik Das, Jagabondhu Hazra, Deva P. Seetharam, Ravi Kiran Reddi, Avinash Kumar Sinha Real-time hybrid state estimation incorporating SCADA and PMU measurements. Search on Bibsonomy ISGT Europe The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Filipe Fernandes, Hugo Morais, Pedro Faria, Zita A. Vale, Carlos Ramos 0001 Combined heat and power and consumption optimization in a SCADA-based system. Search on Bibsonomy ISGT Europe The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Cristina Alcaraz, Javier López 0001, Jianying Zhou 0001, Rodrigo Roman Secure SCADA framework for the protection of energy control systems. Search on Bibsonomy Concurr. Comput. Pract. Exp. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Andrea Carcano, Alessio Coletta, Michele Guglielmi, Marcelo Masera, Igor Nai Fovino, Alberto Trombetta A Multidimensional Critical State Analysis for Detecting Intrusions in SCADA Systems. Search on Bibsonomy IEEE Trans. Ind. Informatics The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Eric A. M. Luiijf, Manou Ali, Annemarie Zielstra Assessing and improving SCADA security in the Dutch drinking water sector. Search on Bibsonomy Int. J. Crit. Infrastructure Prot. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Carlos Queiroz, Abdun Naser Mahmood, Zahir Tari SCADASim - A Framework for Building SCADA Simulations. Search on Bibsonomy IEEE Trans. Smart Grid The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Majdi Khalel, Ahmad Aljaafreh Trigger-based Intelligent Controller for Distributed SCADA Systems. Search on Bibsonomy J. Ubiquitous Syst. Pervasive Networks The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Christopher Beggs, Ryan McGowan Fostering SCADA and IT Relationships: An Industry Perspective. Search on Bibsonomy Int. J. Cyber Warf. Terror. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Yongge Wang sSCADA: securing SCADA infrastructure communications. Search on Bibsonomy Int. J. Commun. Networks Distributed Syst. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Branislav Atlagic, Dejan Milinkov, Mihaly Sagi, Bojan Bogovac High-Performance Networked SCADA Architecture for Safety-Critical Systems. Search on Bibsonomy ECBS-EERC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Ling Cheng Study and application of DNP3.0 in SCADA system. Search on Bibsonomy EMEIT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Rebecca Shapiro, Sergey Bratus, Edmond Rogers, Sean W. Smith Identifying Vulnerabilities in SCADA Systems via Fuzz-Testing. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Honghua Xu, Weili Shi, Zhanfang Chen Wasterwater Factories Solution on SCADA System. Search on Bibsonomy CSISE (2) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Bonnie Zhu, Anthony D. Joseph, Shankar Sastry 0001 A Taxonomy of Cyber Attacks on SCADA Systems. Search on Bibsonomy iThings/CPSCom The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Dong (Kevin) Jin, David M. Nicol, Guanhua Yan An event buffer flooding attack in DNP3 controlled SCADA systems. Search on Bibsonomy WSC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Rosslin John Robles, Tai-Hoon Kim Application Program Interface as Back-Up Data Source for SCADA Systems. Search on Bibsonomy ISA The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Rosslin John Robles, Gilcheol Park Securing Communication between SCADA Master Station and Mobile Remote Components. Search on Bibsonomy ISA The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Massimo Ficco, Alessandro Daidone, Luigi Coppolino, Luigi Romano, Andrea Bondavalli An event correlation approach for fault diagnosis in SCADA infrastructures. Search on Bibsonomy EWDC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Paul W. Prickett, Gwyn Davies, Roger I. Grosvenor Practical Implementation of Robust Condition Based Backwash Initiation Using SCADA. Search on Bibsonomy KES (4) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Paul W. Prickett, Gwyn Davies, Roger I. Grosvenor A SCADA Based Power Plant Monitoring and Management System. Search on Bibsonomy KES (3) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Sankalp Bagaria, Shashi Bhushan Prabhakar, Zia Saquib Flexi-DNP3: Flexible distributed network protocol version 3 (DNP3) for SCADA security. Search on Bibsonomy ReTIS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Thomas Richard McEvoy, Stephen D. Wolthusen Defeating Node Based Attacks on SCADA Systems Using Probabilistic Packet Observation. Search on Bibsonomy CRITIS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Juha P. Lahti, Ahm Shamsuzzoha, Timo Kankaanpaa Web-based technologies in power plant automation and SCADA systems: A review and evaluation. Search on Bibsonomy ICCSCE The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Fei Wang, Zhi-jun Zou, Hao Li, Xin Wang SCADA of VAV/CAV Air-Conditioning System Base on Lonworks Technology. Search on Bibsonomy ICAIC (2) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Nan Cen, Irene Eusgeld Exploring impacts of single failure propagation between SCADA and SUC. Search on Bibsonomy IEEM The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Sugwon Hong, Nhat-Phuong Tran, Myungho Lee Development of Smart Devices for Secure Communication in the SCADA System. Search on Bibsonomy ICCSA Workshops The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Sidney Valentine, Csilla Farkas Software security: Application-level vulnerabilities in SCADA systems. Search on Bibsonomy IRI The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Arun Velagapalli, Mahalingam Ramkumar Minimizing the TCB for securing SCADA systems. Search on Bibsonomy CSIIRW The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Jonathan Kirsch, Stuart Goose, Yair Amir, Paul M. Skare Toward survivable SCADA. Search on Bibsonomy CSIIRW The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Aniket Rodrigues, Tish Best, Ravi Pendse SCADA security device: design and implementation. Search on Bibsonomy CSIIRW The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Thomas H. Morris, Rayford B. Vaughn, Yoginder S. Dandass A testbed for SCADA control system cybersecurity research and pedagogy. Search on Bibsonomy CSIIRW The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Rosslin John Robles, Maricel O. Balitanas, Tai-Hoon Kim Security Encryption Schemes for Internet SCADA: Comparison of the Solutions. Search on Bibsonomy SUComS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Wenyan Wu 0002, Jinliang Gao, Yixing Yuan, Hongbin Zhao, Kui Chang Water distribution network real-time simulation based on SCADA system using OPC communication. Search on Bibsonomy ICNSC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Iñaki Garitano, Roberto Uribeetxeberria, Urko Zurutuza A Review of SCADA Anomaly Detection Systems. Search on Bibsonomy SOCO The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Jian Guan, James H. Graham, Jeffrey L. Hieb A digraph model for risk identification and mangement in SCADA systems. Search on Bibsonomy ISI The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Zhixiong Chen, Donovan Evan Adapting SCADA Systems to Cloud Computing Environment. Search on Bibsonomy ICEIS (3) The full citation details ... 2011 DBLP  BibTeX  RDF
Displaying result #801 - #900 of 997 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license