Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
15 | Thiago Alves 0001, Thomas H. Morris, Seong-Moo Yoo |
Securing SCADA Applications Using OpenPLC With End-To-End Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSS ![In: Proceedings of the 3rd Annual Industrial Control System Security Workshop, ICSS 2017, San Juan, PR, USA, December 05-05, 2017, pp. 1-6, 2017, ACM. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Antoine Lemay, Scott Knight |
A timing-based covert channel for SCADA networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyCon U.S. ![In: 2017 International Conference on Cyber Conflict, CyCon U.S. 2017, Washington, DC, USA, November 7-8, 2017, pp. 8-15, 2017, IEEE Computer Society, 978-1-5386-2379-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Mao Yi, Harald Mueller, Liu Yu, Jiang Chuan |
Benchmarking Cloud-Based SCADA System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CloudCom ![In: IEEE International Conference on Cloud Computing Technology and Science, CloudCom 2017, Hong Kong, December 11-14, 2017, pp. 122-129, 2017, IEEE Computer Society, 978-1-5386-0692-6. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Lyes Bayou, David Espes, Nora Cuppens-Boulahia, Frédéric Cuppens |
wIDS: A Multilayer IDS for Wireless-Based SCADA Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 13th International Conference, ICISS 2017, Mumbai, India, December 16-20, 2017, Proceedings, pp. 387-404, 2017, Springer, 978-3-319-72597-0. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | N. Vinoth Kumar |
Detection and correction of time-skew in SCADA measurement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISGT ![In: IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, ISGT 2017, Washington, DC, USA, April 23-26, 2017, pp. 1-5, 2017, IEEE, 978-1-5386-2890-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Thomas Porrmann, Roland Essmann, Armando W. Colombo |
Development of an event-oriented, cloud-based SCADA system using a microservice architecture under the RAMI4.0 specification: Lessons learned. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IECON ![In: IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society, Beijing, China, October 29 - November 1, 2017, pp. 3441-3448, 2017, IEEE, 978-1-5386-1127-2. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Zhaoxia Xiao, Zhijun Guo, Josep M. Guerrero, Hongwei Fang |
SCADA system for islanded DC microgrids. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IECON ![In: IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society, Beijing, China, October 29 - November 1, 2017, pp. 2669-2674, 2017, IEEE, 978-1-5386-1127-2. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Van Long Do |
Statistical detection and isolation of cyber-physical attacks on SCADA systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IECON ![In: IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society, Beijing, China, October 29 - November 1, 2017, pp. 3524-3529, 2017, IEEE, 978-1-5386-1127-2. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Milorad Papic, Zlatko Bundalo, Dusanka Bundalo, Radovan Stojanovic, Zivorad Kovacevic, Drazen Pasalic, Branimir Cvijic |
Microcomputer based embedded SCADA and RFID systems implemented on LINUX platform. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MECO ![In: 6th Mediterranean Conference on Embedded Computing, MECO 2017, Bar, Montenegro, June 11-15, 2017, pp. 1-5, 2017, IEEE, 978-1-5090-6742-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Nicholas R. Rodofile, Kenneth Radke, Ernest Foo |
Framework for SCADA cyber-attack dataset creation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSW ![In: Proceedings of the Australasian Computer Science Week Multiconference, ACSW 2017, Geelong, Australia, January 31 - February 3, 2017, pp. 69:1-69:10, 2017, ACM, 978-1-4503-4768-6. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Alexander Prokhorov, Ihor Klymenko, Elena Yashina, Olga Morozova, Sergey Oleynick, Tatiana Solyanyk |
SCADA Systems and Augmented Reality as Technologies for Interactive and Distance Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICTERI ![In: Proceedings of the 13th International Conference on ICT in Education, Research and Industrial Applications. Integration, Harmonization and Knowledge Transfer, ICTERI 2017, Kyiv, Ukraine, May 15-18, 2017., pp. 245-256, 2017, CEUR-WS.org. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
15 | Imtiaz Ullah, Qusay H. Mahmoud |
A hybrid model for anomaly-based intrusion detection in SCADA networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE BigData ![In: 2017 IEEE International Conference on Big Data (IEEE BigData 2017), Boston, MA, USA, December 11-14, 2017, pp. 2160-2167, 2017, IEEE Computer Society, 978-1-5386-2715-0. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Woo-Suk Jung, Jeong-Han Yun, Sin-Kyu Kim, Kyu-Seok Shim, Myung-Sup Kim |
Structured whitelist generation in SCADA network using PrefixSpan algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APNOMS ![In: 19th Asia-Pacific Network Operations and Management Symposium, APNOMS 2017, Seoul, Korea (South), September 27-29, 2017, pp. 326, 2017, IEEE, 978-1-5386-1101-2. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Chih-Yuan Lin, Simin Nadjm-Tehrani, Mikael Asplund |
Timing-Based Anomaly Detection in SCADA Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRITIS ![In: Critical Information Infrastructures Security - 12th International Conference, CRITIS 2017, Lucca, Italy, October 8-13, 2017, Revised Selected Papers, pp. 48-59, 2017, Springer, 978-3-319-99842-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Zhi Lu, Yi Lu, Mingzhe Yuan, Zhongfeng Wang |
A heterogeneous large-scale parallel SCADA/DCS architecture in 5G OGCE. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISP-BMEI ![In: 10th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics, CISP-BMEI 2017, Shanghai, China, October 14-16, 2017, pp. 1-7, 2017, IEEE, 978-1-5386-1937-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Haicheng Qu, Jitao Qin, Wanjun Liu, Hao Chen 0014 |
Instruction Detection in SCADA/Modbus Network Based on Machine Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MLICOM (2) ![In: Machine Learning and Intelligent Communications - Second International Conference, MLICOM 2017, Weihai, China, August 5-6, 2017, Proceedings, Part II, pp. 437-454, 2017, Springer, 978-3-319-73446-0. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Xiaojun Zhou, Zhen Xu 0009, Liming Wang, Kai Chen |
What should we do? A structured review of SCADA system cyber security standards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoDIT ![In: 4th International Conference on Control, Decision and Information Technologies, CoDIT 2017, Barcelona, Spain, April 5-7, 2017, pp. 605-614, 2017, IEEE, 978-1-5090-6465-6. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Jarilyn Hernández Jiménez, Qian (Guenevere) Chen, Jeffrey Nichols 0001, Chelsea Calhoun, Summer Sykes |
Towards a Cyber Defense Framework for SCADA Systems Based on Power Consumption Monitoring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 50th Hawaii International Conference on System Sciences, HICSS 2017, Hilton Waikoloa Village, Hawaii, USA, January 4-7, 2017, pp. 1-7, 2017, ScholarSpace / AIS Electronic Library (AISeL). The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
15 | James O'Brien, Tianying Wu, Vaithianathan Venkatasubramanian, Hongming Zhang |
Source Location of Forced Oscillations Using Synchrophasor and SCADA Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 50th Hawaii International Conference on System Sciences, HICSS 2017, Hilton Waikoloa Village, Hawaii, USA, January 4-7, 2017, pp. 1-10, 2017, ScholarSpace / AIS Electronic Library (AISeL). The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
15 | Nagendra Babu Gunti, Karthikeyan Lingasubramanian |
Neutralization of the Effect of Hardware Trojan in SCADA System Using Selectively Placed TMR. ![Search on Bibsonomy](Pics/bibsonomy.png) |
iNIS ![In: IEEE International Symposium on Nanoelectronic and Information Systems, iNIS 2017, Bhopal, India, December 18-20, 2017, pp. 99-104, 2017, IEEE, 978-1-5386-1356-6. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Daniel Martinez, David Celeita, Diego Clavijo, Gustavo A. Ramos |
Hardware and software integration as a realist SCADA environment to test protective relaying control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: 2017 IEEE Industry Applications Society Annual Meeting, Cincinnati, OH, USA, October 1-5, 2017, pp. 1-8, 2017, IEEE, 978-1-5090-4894-6. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Jan Vávra, Martin Hromada |
Determination of Optimal Cluster Number in Connection to SCADA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSOC (3) ![In: Software Engineering Trends and Techniques in Intelligent Systems - Proceedings of the 6th Computer Science On-line Conference 2017 (CSOC2017), Vol 3, pp. 136-147, 2017, 978-3-319-57140-9. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Matus Korman, Margus Välja, Gunnar Björkman, Mathias Ekstedt, Alexandre Vernotte, Robert Lagerström |
Analyzing the Effectiveness of Attack Countermeasures in a SCADA System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPSR-SG@CPSWeek ![In: Proceedings of the 2nd Workshop on Cyber-Physical Security and Resilience in Smart Grids, SPSR-SG@CPSWeek 2017, Pittsburgh, PA, USA, April 21, 2017, pp. 73-78, 2017, ACM, 978-1-4503-4978-9. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Jayasinghe L. Sarinda, M. Tariq Iqbal, George K. I. Mann |
Low-cost and open source SCADA options for remote control and monitoring of inverters. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCECE ![In: 30th IEEE Canadian Conference on Electrical and Computer Engineering, CCECE 2017, Windsor, ON, Canada, April 30 - May 3, 2017, pp. 1-4, 2017, IEEE, 978-1-5090-5538-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Kevin Wong, Craig Dillabaugh, Nabil Seddigh, Biswajit Nandy |
Enhancing Suricata intrusion detection system for cyber security in SCADA networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCECE ![In: 30th IEEE Canadian Conference on Electrical and Computer Engineering, CCECE 2017, Windsor, ON, Canada, April 30 - May 3, 2017, pp. 1-5, 2017, IEEE, 978-1-5090-5538-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Meng Li, Wenjing Li 0001, Peng Yu 0001, Fanqin Zhou |
Risk prediction of the SCADA communication network based on entropy-gray model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CNSM ![In: 13th International Conference on Network and Service Management, CNSM 2017, Tokyo, Japan, November 26-30, 2017, pp. 1-5, 2017, IEEE Computer Society, 978-3-901882-98-2. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Amit Kleinmann, Ori Amichay, Avishai Wool, David Tenenbaum, Ofer Bar, Leonid Lev |
Stealthy Deception Attacks Against SCADA Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberICPS/SECPRE@ESORICS ![In: Computer Security - ESORICS 2017 International Workshops, CyberICPS 2017 and SECPRE 2017, Oslo, Norway, September 14-15, 2017, Revised Selected Papers, pp. 93-109, 2017, Springer, 978-3-319-72816-2. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Malaka El, Emma McMahon, Sagar Samtani, Mark W. Patton, Hsinchun Chen |
Benchmarking vulnerability scanners: An experiment on SCADA devices and scientific instruments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: 2017 IEEE International Conference on Intelligence and Security Informatics, ISI 2017, Beijing, China, July 22-24, 2017, pp. 83-88, 2017, IEEE, 978-1-5090-6727-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Justyna J. Chromik, Carina Pilch, Pascal Brackmann, Christof Duhme, Franziska Everinghoff, Artur Giberlein, Thomas Teodorowicz, Julian Wieland, Boudewijn R. Haverkort, Anne Remke |
Context-aware local Intrusion Detection in SCADA systems: A testbed and two showcases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SmartGridComm ![In: 2017 IEEE International Conference on Smart Grid Communications, SmartGridComm 2017, Dresden, Germany, October 23-27, 2017, pp. 467-472, 2017, IEEE, 978-1-5386-0943-9. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Yuriy P. Kondratenko, Oleksiy V. Kozlov, Oleksandr Gerasin, Andriy M. Topalov, Oleksiy V. Korobko |
Automation of control processes in specialized pyrolysis complexes based on web SCADA systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDAACS ![In: 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, IDAACS 2017, Bucharest, Romania, September 21-23, 2017, pp. 107-112, 2017, IEEE, 978-1-5386-0697-1. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Marwa Keshk, Nour Moustafa, Elena Sitnikova, Gideon Creech |
Privacy preservation intrusion detection technique for SCADA systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MilCIS ![In: 2017 Military Communications and Information Systems Conference, MilCIS 2017, Canberra, Australia, November 14-16, 2017, pp. 1-6, 2017, IEEE, 978-1-5090-4003-2. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Qi Liu 0052, Yingying Zhao, Yawen Zhang, Dahai Kang, Qin Lv, Li Shang |
Hierarchical context-aware anomaly diagnosis in large-scale PV systems using SCADA data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDIN ![In: 15th IEEE International Conference on Industrial Informatics, INDIN 2017, Emden, Germany, July 24-26, 2017, pp. 1025-1030, 2017, IEEE, 978-1-5386-0837-1. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Braulio Barahona, Cyprien Hoelzl, Eleni N. Chatzi |
Applying design knowledge and machine learning to scada data for classification of wind turbine operating regimes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSCI ![In: 2017 IEEE Symposium Series on Computational Intelligence, SSCI 2017, Honolulu, HI, USA, November 27 - Dec. 1, 2017, pp. 1-8, 2017, IEEE, 978-1-5386-2726-6. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Luying Zhou, Huaqun Guo, Dong Li, Jianying Zhou 0001, Jun Wen Wong |
A scheme for lightweight SCADA packet authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APCC ![In: 23rd Asia-Pacific Conference on Communications, APCC 2017, Perth, Australia, December 11-13, 2017, pp. 1-6, 2017, IEEE, 978-1-7405-2390-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Leandros A. Maglaras, Jianmin Jiang, Tiago J. Cruz |
Combining ensemble methods and social network metrics for improving accuracy of OCSVM on intrusion detection in SCADA systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Secur. Appl. ![In: J. Inf. Secur. Appl. 30, pp. 15-26, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
15 | Nong Si, Ke-Bin Jia |
One Communication Key Udate with Whitelist Attribute in SCADA System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Hiding Multim. Signal Process. ![In: J. Inf. Hiding Multim. Signal Process. 7(3), pp. 629-636, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
15 | Hosny A. Abbas, Samir I. Shaheen, Mohammed H. Amin |
Self-adaptive large-scale SCADA system based on self-organised multi-agent systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Autom. Control. ![In: Int. J. Autom. Control. 10(3), pp. 234-266, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
15 | Jeyasingam Nivethan, Mauricio Papa |
On the use of open-source firewalls in ICS/SCADA systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Secur. J. A Glob. Perspect. ![In: Inf. Secur. J. A Glob. Perspect. 25(1-3), pp. 83-93, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
15 | Anam Sajid, Haider Abbas, Kashif Saleem |
Cloud-Assisted IoT-Based SCADA Systems Security: A Review of the State of the Art and Future Challenges. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 4, pp. 1375-1384, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
15 | Md. Mahmud Hasan, Hussein T. Mouftah |
Optimal Trust System Placement in Smart Grid SCADA Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 4, pp. 2907-2919, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
15 | Raphael Amoah, Seyit Ahmet Çamtepe, Ernest Foo |
Securing DNP3 Broadcast Communications in SCADA Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Ind. Informatics ![In: IEEE Trans. Ind. Informatics 12(4), pp. 1474-1485, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
15 | Aamir Shahzad, Malrey Lee, Changhoon Lee, Naixue Xiong, Suntae Kim, Young Keun Lee, Kangmin Kim, Seon-Mi Woo, Gisung Jeong |
The protocol design and New approach for SCADA security enhancement during sensors broadcasting system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Tools Appl. ![In: Multim. Tools Appl. 75(22), pp. 14641-14668, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
15 | Yichi Zhang, Lingfeng Wang 0001, Yingmeng Xiang |
Power System Reliability Analysis With Intrusion Tolerance in SCADA Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Smart Grid ![In: IEEE Trans. Smart Grid 7(2), pp. 669-683, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
15 | Dinesha Ranathunga, Matthew Roughan, Hung X. Nguyen, Phil Kernick, Nickolas J. G. Falkner |
Case Studies of SCADA Firewall Configurations and the Implications for Best Practices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Netw. Serv. Manag. ![In: IEEE Trans. Netw. Serv. Manag. 13(4), pp. 871-884, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
15 | Abebe Tesfahun, Dhavala Lalitha Bhaskari |
A SCADA testbed for investigating cyber security vulnerabilities in critical infrastructures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Autom. Control. Comput. Sci. ![In: Autom. Control. Comput. Sci. 50(1), pp. 54-62, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
15 | Sungho Jeon 0002, Jeong-Han Yun, Seungoh Choi, Woonyon Kim |
Passive Fingerprinting of SCADA in Critical Infrastructure Network without Deep Packet Inspection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1608.07679, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
15 | Hongrui Wang, Tao Lu 0002, Xiaodai Dong, Peixue Li, Michael Xie |
Hierarchical Online Intrusion Detection for SCADA Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1611.09418, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
15 | Christophe Feltus, Djamel Khadraoui |
Designing security policies for complex SCADA systems management and protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Technol. Manag. ![In: Int. J. Inf. Technol. Manag. 15(4), pp. 313-332, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
15 | Barend Pretorius, Brett van Niekerk |
Cyber-Security for ICS/SCADA: A South African Perspective. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Cyber Warf. Terror. ![In: Int. J. Cyber Warf. Terror. 6(3), pp. 1-16, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
15 | Suhaila Ismail, Elena Sitnikova, Jill Slay |
SCADA Systems Cyber Security for Critical Infrastructures: Case Studies in Multiple Sectors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Cyber Warf. Terror. ![In: Int. J. Cyber Warf. Terror. 6(3), pp. 79-95, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
15 | Abdalhossein Rezai, Parviz Keshavarzi, Zahra Moravej |
Advance hybrid key management architecture for SCADA network security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secur. Commun. Networks ![In: Secur. Commun. Networks 9(17), pp. 4358-4368, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
15 | Abdulmohsen Almalawi, Adil Fahad, Zahir Tari, Abdullah Alamri, Rayed AlGhamdi, Albert Y. Zomaya |
An Efficient Data-Driven Clustering Technique to Detect Attacks in SCADA Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 11(5), pp. 893-906, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
15 | Amiya Ranjan Panda, Debahuti Mishra, Hare Krishna Ratha |
Implementation of SCADA/HMI system for real-time controlling and performance monitoring of SDR based flight termination system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Ind. Inf. Integr. ![In: J. Ind. Inf. Integr. 3, pp. 20-30, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
15 | Weize Li 0002, Lun Xie, Zulan Deng, Zhiliang Wang |
False sequential logic attack on SCADA system and its physical impact analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 58, pp. 149-159, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
15 | Yulia Cherdantseva, Pete Burnap, Andrew Blyth, Peter Eden, Kevin Jones, Hugh Soulsby, Kristan Stoddart |
A review of cyber security risk assessment methods for SCADA systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 56, pp. 1-27, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
15 | Nicoleta Stroia, Daniel Moga, Eugen Vitan, Gloria Cosovici, Corneliu Lungoci, István Kovács, Maria Mircea |
Internet based SCADA platform for monitoring strategic hydrotechnical structures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AQTR ![In: IEEE International Conference on Automation, Quality and Testing, Robotics, AQTR 2016, Cluj-Napoca, Romania, May 19-21, 2016, pp. 1-5, 2016, IEEE, 978-1-4673-8692-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
15 | I. Stoian, D. Capatina, O. Ghiran, Liviu Cristian Miclea, Szilárd Enyedi |
SCADA plug-in modules and instruments for federative organisation: Application on water management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AQTR ![In: IEEE International Conference on Automation, Quality and Testing, Robotics, AQTR 2016, Cluj-Napoca, Romania, May 19-21, 2016, pp. 1-6, 2016, IEEE, 978-1-4673-8692-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
15 | Giovanni Corbò, Chiara Foglietta, Cosimo Palazzo, Stefano Panzieri |
Smart Behavioural Filter for SCADA Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INISCOM ![In: Industrial Networks and Intelligent Systems - Second International Conference, INISCOM 2016, Leicester, UK, October 31 - November 1, 2016, Revised Selected Papers, pp. 101-110, 2016, 978-3-319-52568-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
15 | Amit Kleinmann, Avishai Wool |
Automatic Construction of Statechart-Based Anomaly Detection Models for Multi-Threaded SCADA via Spectral Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CPS-SPC@CCS ![In: Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy, CPS-SPC@CCS 2016, Vienna, Austria, October 28, 2016, pp. 1-12, 2016, ACM, 978-1-4503-4568-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
15 | Robert Udd, Mikael Asplund, Simin Nadjm-Tehrani, Mehrdad Kazemtabrizi, Mathias Ekstedt |
Exploiting Bro for Intrusion Detection in a SCADA System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CPSS@AsiaCCS ![In: Proceedings of the 2nd ACM International Workshop on Cyber-Physical System Security, CPSS@AsiaCCS, Xi'an, China, May 30, 2016, pp. 44-51, 2016, ACM, 978-1-4503-4288-9. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
15 | Abdullah Al Balushi, Kieran McLaughlin, Sakir Sezer |
Contextual Intrusion Alerts for Scada Networks - An Ontology based Approach for Intrusion Alerts Post Processing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISSP ![In: Proceedings of the 2nd International Conference on Information Systems Security and Privacy, ICISSP 2016, Rome, Italy, February 19-21, 2016., pp. 457-464, 2016, SciTePress, 978-989-758-167-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
15 | Antoine Lemay, Alireza Sadighian, José M. Fernandez 0001 |
Lightweight Journaling for Scada Systems via Event Correlation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Critical Infrastructure Protection ![In: Critical Infrastructure Protection X - 10th IFIP WG 11.10 International Conference, ICCIP 2016, Arlington, VA, USA, March 14-16, 2016, Revised Selected Papers, pp. 99-115, 2016, 978-3-319-48736-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
15 | Mihai Sanduleac, Lucas Pons, Giampaolo Fiorentino, Rares Pop, Mihaela M. Albu |
The unbundled smart meter concept in a synchro-SCADA framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
I2MTC ![In: IEEE International Instrumentation and Measurement Technology Conference, I2MTC 2016, Proceedings, Taipei, Taiwan, May 23-26, 2016, pp. 1-5, 2016, IEEE, 978-1-4673-9220-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
15 | Anas Motii, Agnes Lanusse, Brahim Hamid, Jean-Michel Bruel |
Model-Based Real-Time Evaluation of Security Patterns: A SCADA System Case Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAFECOMP Workshops ![In: Computer Safety, Reliability, and Security - SAFECOMP 2016 Workshops, ASSURE, DECSoS, SASSUR, and TIPS, Trondheim, Norway, September 20, 2016, Proceedings, pp. 375-389, 2016, Springer, 978-3-319-45479-5. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
15 | Maxime Puys, Marie-Laure Potet, Pascal Lafourcade 0001 |
Formal Analysis of Security Properties on the OPC-UA SCADA Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAFECOMP ![In: Computer Safety, Reliability, and Security - 35th International Conference, SAFECOMP 2016, Trondheim, Norway, September 21-23, 2016, Proceedings, pp. 67-75, 2016, Springer, 978-3-319-45476-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
15 | Fábio Januário, Carolina Carvalho, Alberto Cardoso, Paulo Gil |
Security challenges in SCADA systems over Wireless Sensor and Actuator Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICUMT ![In: 8th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, ICUMT 2016, Lisbon, Portugal, October 18-20, 2016, pp. 363-368, 2016, IEEE, 978-1-4673-8818-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
15 | Daniel Krauss, Christoph Thomalla |
Ontology-based detection of cyber-attacks to SCADA-systems in critical infrastructures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DICTAP ![In: Sixth International Conference on Digital Information and Communication Technology and its Applications, DICTAP 2016, Konya, Turkey, July 21-23, 2016, pp. 70-73, 2016, IEEE, 978-1-4673-9609-7. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
15 | Yue Lu, Xiuzhen Chen, Changsong Chen 0002 |
Security authentication mechanism based on symmetric polynomials for SCADA systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIC ![In: International Conference on Security of Smart Cities, Industrial Control System and Communications, SSIC 2016, Paris, France, July 18-19, 2016, pp. 1-6, 2016, IEEE, 978-1-5090-2470-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
15 | Elias Bou-Harb |
Passive inference of attacks on SCADA communication protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: 2016 IEEE International Conference on Communications, ICC 2016, Kuala Lumpur, Malaysia, May 22-27, 2016, pp. 1-6, 2016, IEEE, 978-1-4799-6664-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
15 | Abdullah Al Balushi, Kieran McLaughlin, Sakir Sezer |
OSCIDS: An Ontology based SCADA Intrusion Detection Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECRYPT ![In: Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016) - Volume 4: SECRYPT, Lisbon, Portugal, July 26-28, 2016., pp. 327-335, 2016, SciTePress, 978-989-758-196-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
15 | Irfan Ahmed 0001, Vassil Roussev, William E. Johnson, Saranyan Senthivel, Sneha Sudhakaran |
A SCADA System Testbed for Cybersecurity and Forensic Research and Pedagogy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSS ![In: Proceedings of the 2nd Annual Industrial Control System Security Workshop, ICSS 2016, Los Angeles, CA, USA, December 6, 2016, pp. 1-9, 2016, ACM, 978-1-4503-4788-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
15 | Antoine Lemay, José M. Fernandez 0001 |
Providing SCADA Network Data Sets for Intrusion Detection Research. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSET @ USENIX Security Symposium ![In: 9th Workshop on Cyber Security Experimentation and Test, CSET '16, Austin, TX, USA, August 8, 2016., 2016, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
15 | Van Hoa Nguyen, Yvon Besanger, Quoc Tuan Tran 0001 |
Novel hybrid cloud based SCADA approach for interoperability of micro-grid platforms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISGT ![In: 2016 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, ISGT 2016, Minneapolis, MN, USA, September 6-9, 2016, pp. 1-5, 2016, IEEE, 978-1-5090-5167-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
15 | Yamuna Maccarana, Alberto L. Cologni, Fabio Previdi |
Design of a HTML5 SCADA system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RTSI ![In: 2nd IEEE International Forum on Research and Technologies for Society and Industry Leveraging a better tomorrow, RTSI 2016, Bologna, Italy, September 7-9, 2016, pp. 1-5, 2016, IEEE, 978-1-5090-1131-5. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
15 | Yosra Ben Dhief, Yacine Djemaiel, Slim Rekhis, Noureddine Boudriga |
A Novel Sensor Cloud Based SCADA infrastructure for Monitoring and Attack prevention. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MoMM ![In: Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media, MoMM 2016, Singapore, November 28-30, 2016, pp. 45-49, 2016, ACM, 978-1-4503-4806-5. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
15 | Huan Yang, Liang Cheng 0001, Mooi Choo Chuah |
Detecting Peer-to-Peer Botnets in SCADA Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GLOBECOM Workshops ![In: 2016 IEEE Globecom Workshops, Washington, DC, USA, December 4-8, 2016, pp. 1-6, 2016, IEEE, 978-1-5090-2482-7. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
15 | Nikolaos M. Manousakis, George N. Korres |
Semidefinite programming for optimal placement of PMUs with channel limits considering pre-existing SCADA and PMU measurements. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PSCC ![In: Power Systems Computation Conference, PSCC 2016, Genoa, Italy, June 20-24, 2016, pp. 1-7, 2016, IEEE, 978-88-941051-2-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
15 | Juichi Kosakaya |
Multi-agent-based SCADA system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EBCCSP ![In: Second International Conference on Event-based Control, Communication, and Signal Processing, EBCCSP 2016, Krakow, Poland, June 13-15, 2016, pp. 1-5, 2016, IEEE, 978-1-5090-4196-1. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
15 | Eduardo Germano da Silva, Anderson Santos da Silva, Juliano Araujo Wickboldt, Paul Smith 0001, Lisandro Zambenedetti Granville, Alberto E. Schaeffer Filho |
A One-Class NIDS for SDN-Based SCADA Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC ![In: 40th IEEE Annual Computer Software and Applications Conference, COMPSAC 2016, Atlanta, GA, USA, June 10-14, 2016, pp. 303-312, 2016, IEEE Computer Society, 978-1-4673-8845-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
15 | Gianfranco Cerullo, Giovanni Mazzeo, Gaetano Papale, Luigi Sgaglione, Rosario Cristaldi |
A Secure Cloud-Based SCADA Application: The Use Case of a Water Supply Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SoMeT ![In: New Trends in Software Methodologies, Tools and Techniques - Proceedings of the Fifteenth SoMeT_16, Larnaca, Cyprus, 12-14 September 2016, pp. 291-301, 2016, IOS Press, 978-1-61499-673-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
15 | Jose Adrian Ruiz Carmona, Julio Cesar Munoz Benitez, Jose Luis Garcia-Gervacio |
SCADA system design: A proposal for optimizing a production line. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CONIELECOMP ![In: 2016 International Conference on Electronics, Communications and Computers, CONIELECOMP 2016, Cholula, Mexico, February 24-26, 2016, pp. 192-197, 2016, IEEE, 978-1-5090-0079-1. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
15 | Jiexin Zhang 0001, Shaoduo Gan, Xiaoxue Liu, Peidong Zhu |
Intrusion detection in SCADA systems by traffic periodicity and telemetry analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: IEEE Symposium on Computers and Communication, ISCC 2016, Messina, Italy, June 27-30, 2016, pp. 318-325, 2016, IEEE Computer Society, 978-1-5090-0679-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
15 | Anisur Rahman, Yue Xu 0001, Kenneth Radke, Ernest Foo |
Finding Anomalies in SCADA Logs Using Rare Sequential Pattern Mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Network and System Security - 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedings, pp. 499-506, 2016, Springer, 978-3-319-46297-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
15 | Syed Umer Abdi, Kamran Iqbal, Jameel Ahmed |
Development of PC-based SCADA training system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIT ![In: IEEE International Conference on Industrial Technology, ICIT 2016, Taipei, Taiwan, March 14-17, 2016, pp. 1192-1197, 2016, IEEE, 978-1-4673-8075-1. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
15 | Kyriakos Stefanidis, Artemios G. Voyiatzis |
An HMM-Based Anomaly Detection Approach for SCADA Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice - 10th IFIP WG 11.2 International Conference, WISTP 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings, pp. 85-99, 2016, Springer, 978-3-319-45930-1. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
15 | Emil Zaev, Darko Babunski, Atanasko Tuneski |
SCADA system for real-time measuring and evaluation of river water quality. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MECO ![In: 5th Mediterranean Conference on Embedded Computing, MECO 2016, Bar, Montenegro, June 12-16, 2016, pp. 83-86, 2016, IEEE, 978-1-5090-2222-9. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
15 | Woo-Suk Jung, Sung-Min Kim, Young-Hoon Goo, Myung-Sup Kim |
Whitelist representation for FTP service in SCADA system by using structured ACL model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APNOMS ![In: 18th Asia-Pacific Network Operations and Management Symposium, APNOMS 2016, Kanazawa, Japan, October 5-7, 2016, pp. 1-4, 2016, IEEE, 978-4-88552-304-5. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
15 | Mounia El Anbal, Anas Abou El Kalam, Siham Benhadou, Fouad Moutaouakkil, Hicham Medromi |
Securing SCADA Critical Network Against Internal and External Threats - Short Paper. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRITIS ![In: Critical Information Infrastructures Security - 11th International Conference, CRITIS 2016, Paris, France, October 10-12, 2016, Revised Selected Papers, pp. 328-339, 2016, Springer, 978-3-319-71367-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
15 | Stefano Sebastio, Antonio Scala, Gregorio D'Agostino |
Availability Study of the Italian Electricity SCADA System in the Cloud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRITIS ![In: Critical Information Infrastructures Security - 11th International Conference, CRITIS 2016, Paris, France, October 10-12, 2016, Revised Selected Papers, pp. 201-212, 2016, Springer, 978-3-319-71367-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
15 | Thomas Brandstetter, Helge Janicke (eds.) |
4th International Symposium for ICS & SCADA Cyber Security Research 2016, ICS-CSR 2016, 23 - 25 August 2016, Queen's Belfast University, UK ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICS-CSR ![BCS The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
15 | Jianghai Li, Edita Bajramovic, Yuan Gao, Mithil Parekh |
Graded security forensics readiness of SCADA systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GI-Jahrestagung ![In: 46. Jahrestagung der Gesellschaft für Informatik, Informatik von Menschen für Menschen, INFORMATIK 2016, Klagenfurt, Austria, September 26-30, 2016, pp. 581-592, 2016, GI, 978-3-88579-653-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
15 | Jan de Meer, Karl Waedt |
New security standards for industrial automation and control systems, based on IEC 62443-4-2 (IACS/SCADA) - extended abstract. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GI-Jahrestagung ![In: 46. Jahrestagung der Gesellschaft für Informatik, Informatik von Menschen für Menschen, INFORMATIK 2016, Klagenfurt, Austria, September 26-30, 2016, pp. 537-541, 2016, GI, 978-3-88579-653-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
15 | Jan de Meer, Karl Waedt |
Workshop on new security standards for IACS/SCADA industrial systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GI-Jahrestagung ![In: 46. Jahrestagung der Gesellschaft für Informatik, Informatik von Menschen für Menschen, INFORMATIK 2016, Klagenfurt, Austria, September 26-30, 2016, pp. 531-535, 2016, GI, 978-3-88579-653-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
15 | Yuan Gao, Xin Xie, Mithil Parekh, Edita Bajramovic |
SIEM: policy-based monitoring of SCADA systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GI-Jahrestagung ![In: 46. Jahrestagung der Gesellschaft für Informatik, Informatik von Menschen für Menschen, INFORMATIK 2016, Klagenfurt, Austria, September 26-30, 2016, pp. 559-570, 2016, GI, 978-3-88579-653-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
15 | Md. Mahmud Hasan, Hussein T. Mouftah |
Latency-aware segmentation and trust system placement in smart grid SCADA networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CAMAD ![In: 21st IEEE International Workshop on Computer Aided Modelling and Design of Communication Links and Networks, CAMAD 2016, Toronto, ON, Canada, October 23-25, 2016, pp. 37-42, 2016, IEEE, 978-1-5090-2558-9. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
15 | Jan Vávra, Martin Hromada |
Comparison of the Intrusion Detection System Rules in Relation with the SCADA Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSOC (2) ![In: Software Engineering Perspectives and Application in Intelligent Systems - Proceedings of the 5th Computer Science On-line Conference 2016 (CSOC2016), Vol 2, pp. 159-169, 2016, Springer, 978-3-319-33620-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
15 | Jeyasingam Nivethan, Mauricio Papa |
A SCADA Intrusion Detection Framework that Incorporates Process Semantics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISRC ![In: Proceedings of the 11th Annual Cyber and Information Security Research Conference, CISRC 2016, Oak Ridge, TN, USA, April 5-7, 2016, pp. 6:1-6:5, 2016, ACM, 978-1-4503-3752-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
15 | Florentina-Magda Enescu, Cosmin Stirbu, Valeriu Ionescu |
SCADA Network System for the Monitoring and Control of an Electrical Installation Supplied by a Hydro-Generator. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOCO-CISIS-ICEUTE ![In: International Joint Conference SOCO'16-CISIS'16-ICEUTE'16 - San Sebastián, Spain, October 19th-21st, 2016, Proceedings, pp. 156-166, 2016, 978-3-319-47363-5. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
15 | Arthur Jicha, Mark W. Patton, Hsinchun Chen |
SCADA honeypots: An in-depth analysis of Conpot. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: IEEE Conference on Intelligence and Security Informatics, ISI 2016, Tucson, AZ, USA, September 28-30, 2016, pp. 196-198, 2016, IEEE, 978-1-5090-3865-7. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
15 | Sagar Samtani, Shuo Yu, Hongyi Zhu, Mark W. Patton, Hsinchun Chen |
Identifying SCADA vulnerabilities using passive and active vulnerability assessment techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: IEEE Conference on Intelligence and Security Informatics, ISI 2016, Tucson, AZ, USA, September 28-30, 2016, pp. 25-30, 2016, IEEE, 978-1-5090-3865-7. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|