The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for SCADA with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1993-2004 (23) 2005-2006 (24) 2007 (18) 2008 (32) 2009 (31) 2010 (41) 2011 (36) 2012 (46) 2013 (61) 2014 (85) 2015 (70) 2016 (90) 2017 (61) 2018 (51) 2019 (74) 2020 (64) 2021 (73) 2022 (61) 2023 (41) 2024 (15)
Publication types (Num. hits)
article(342) incollection(9) inproceedings(632) phdthesis(10) proceedings(4)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 125 occurrences of 90 keywords

Results
Found 997 publication records. Showing 997 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
15Thiago Alves 0001, Thomas H. Morris, Seong-Moo Yoo Securing SCADA Applications Using OpenPLC With End-To-End Encryption. Search on Bibsonomy ICSS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Antoine Lemay, Scott Knight A timing-based covert channel for SCADA networks. Search on Bibsonomy CyCon U.S. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Mao Yi, Harald Mueller, Liu Yu, Jiang Chuan Benchmarking Cloud-Based SCADA System. Search on Bibsonomy CloudCom The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Lyes Bayou, David Espes, Nora Cuppens-Boulahia, Frédéric Cuppens wIDS: A Multilayer IDS for Wireless-Based SCADA Systems. Search on Bibsonomy ICISS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15N. Vinoth Kumar Detection and correction of time-skew in SCADA measurement. Search on Bibsonomy ISGT The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Thomas Porrmann, Roland Essmann, Armando W. Colombo Development of an event-oriented, cloud-based SCADA system using a microservice architecture under the RAMI4.0 specification: Lessons learned. Search on Bibsonomy IECON The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Zhaoxia Xiao, Zhijun Guo, Josep M. Guerrero, Hongwei Fang SCADA system for islanded DC microgrids. Search on Bibsonomy IECON The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Van Long Do Statistical detection and isolation of cyber-physical attacks on SCADA systems. Search on Bibsonomy IECON The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Milorad Papic, Zlatko Bundalo, Dusanka Bundalo, Radovan Stojanovic, Zivorad Kovacevic, Drazen Pasalic, Branimir Cvijic Microcomputer based embedded SCADA and RFID systems implemented on LINUX platform. Search on Bibsonomy MECO The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Nicholas R. Rodofile, Kenneth Radke, Ernest Foo Framework for SCADA cyber-attack dataset creation. Search on Bibsonomy ACSW The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Alexander Prokhorov, Ihor Klymenko, Elena Yashina, Olga Morozova, Sergey Oleynick, Tatiana Solyanyk SCADA Systems and Augmented Reality as Technologies for Interactive and Distance Learning. Search on Bibsonomy ICTERI The full citation details ... 2017 DBLP  BibTeX  RDF
15Imtiaz Ullah, Qusay H. Mahmoud A hybrid model for anomaly-based intrusion detection in SCADA networks. Search on Bibsonomy IEEE BigData The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Woo-Suk Jung, Jeong-Han Yun, Sin-Kyu Kim, Kyu-Seok Shim, Myung-Sup Kim Structured whitelist generation in SCADA network using PrefixSpan algorithm. Search on Bibsonomy APNOMS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Chih-Yuan Lin, Simin Nadjm-Tehrani, Mikael Asplund Timing-Based Anomaly Detection in SCADA Networks. Search on Bibsonomy CRITIS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Zhi Lu, Yi Lu, Mingzhe Yuan, Zhongfeng Wang A heterogeneous large-scale parallel SCADA/DCS architecture in 5G OGCE. Search on Bibsonomy CISP-BMEI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Haicheng Qu, Jitao Qin, Wanjun Liu, Hao Chen 0014 Instruction Detection in SCADA/Modbus Network Based on Machine Learning. Search on Bibsonomy MLICOM (2) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Xiaojun Zhou, Zhen Xu 0009, Liming Wang, Kai Chen What should we do? A structured review of SCADA system cyber security standards. Search on Bibsonomy CoDIT The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Jarilyn Hernández Jiménez, Qian (Guenevere) Chen, Jeffrey Nichols 0001, Chelsea Calhoun, Summer Sykes Towards a Cyber Defense Framework for SCADA Systems Based on Power Consumption Monitoring. Search on Bibsonomy HICSS The full citation details ... 2017 DBLP  BibTeX  RDF
15James O'Brien, Tianying Wu, Vaithianathan Venkatasubramanian, Hongming Zhang Source Location of Forced Oscillations Using Synchrophasor and SCADA Data. Search on Bibsonomy HICSS The full citation details ... 2017 DBLP  BibTeX  RDF
15Nagendra Babu Gunti, Karthikeyan Lingasubramanian Neutralization of the Effect of Hardware Trojan in SCADA System Using Selectively Placed TMR. Search on Bibsonomy iNIS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Daniel Martinez, David Celeita, Diego Clavijo, Gustavo A. Ramos Hardware and software integration as a realist SCADA environment to test protective relaying control. Search on Bibsonomy IAS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Jan Vávra, Martin Hromada Determination of Optimal Cluster Number in Connection to SCADA. Search on Bibsonomy CSOC (3) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Matus Korman, Margus Välja, Gunnar Björkman, Mathias Ekstedt, Alexandre Vernotte, Robert Lagerström Analyzing the Effectiveness of Attack Countermeasures in a SCADA System. Search on Bibsonomy SPSR-SG@CPSWeek The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Jayasinghe L. Sarinda, M. Tariq Iqbal, George K. I. Mann Low-cost and open source SCADA options for remote control and monitoring of inverters. Search on Bibsonomy CCECE The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Kevin Wong, Craig Dillabaugh, Nabil Seddigh, Biswajit Nandy Enhancing Suricata intrusion detection system for cyber security in SCADA networks. Search on Bibsonomy CCECE The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Meng Li, Wenjing Li 0001, Peng Yu 0001, Fanqin Zhou Risk prediction of the SCADA communication network based on entropy-gray model. Search on Bibsonomy CNSM The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Amit Kleinmann, Ori Amichay, Avishai Wool, David Tenenbaum, Ofer Bar, Leonid Lev Stealthy Deception Attacks Against SCADA Systems. Search on Bibsonomy CyberICPS/SECPRE@ESORICS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Malaka El, Emma McMahon, Sagar Samtani, Mark W. Patton, Hsinchun Chen Benchmarking vulnerability scanners: An experiment on SCADA devices and scientific instruments. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Justyna J. Chromik, Carina Pilch, Pascal Brackmann, Christof Duhme, Franziska Everinghoff, Artur Giberlein, Thomas Teodorowicz, Julian Wieland, Boudewijn R. Haverkort, Anne Remke Context-aware local Intrusion Detection in SCADA systems: A testbed and two showcases. Search on Bibsonomy SmartGridComm The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Yuriy P. Kondratenko, Oleksiy V. Kozlov, Oleksandr Gerasin, Andriy M. Topalov, Oleksiy V. Korobko Automation of control processes in specialized pyrolysis complexes based on web SCADA systems. Search on Bibsonomy IDAACS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Marwa Keshk, Nour Moustafa, Elena Sitnikova, Gideon Creech Privacy preservation intrusion detection technique for SCADA systems. Search on Bibsonomy MilCIS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Qi Liu 0052, Yingying Zhao, Yawen Zhang, Dahai Kang, Qin Lv, Li Shang Hierarchical context-aware anomaly diagnosis in large-scale PV systems using SCADA data. Search on Bibsonomy INDIN The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Braulio Barahona, Cyprien Hoelzl, Eleni N. Chatzi Applying design knowledge and machine learning to scada data for classification of wind turbine operating regimes. Search on Bibsonomy SSCI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Luying Zhou, Huaqun Guo, Dong Li, Jianying Zhou 0001, Jun Wen Wong A scheme for lightweight SCADA packet authentication. Search on Bibsonomy APCC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Leandros A. Maglaras, Jianmin Jiang, Tiago J. Cruz Combining ensemble methods and social network metrics for improving accuracy of OCSVM on intrusion detection in SCADA systems. Search on Bibsonomy J. Inf. Secur. Appl. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Nong Si, Ke-Bin Jia One Communication Key Udate with Whitelist Attribute in SCADA System. Search on Bibsonomy J. Inf. Hiding Multim. Signal Process. The full citation details ... 2016 DBLP  BibTeX  RDF
15Hosny A. Abbas, Samir I. Shaheen, Mohammed H. Amin Self-adaptive large-scale SCADA system based on self-organised multi-agent systems. Search on Bibsonomy Int. J. Autom. Control. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Jeyasingam Nivethan, Mauricio Papa On the use of open-source firewalls in ICS/SCADA systems. Search on Bibsonomy Inf. Secur. J. A Glob. Perspect. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Anam Sajid, Haider Abbas, Kashif Saleem Cloud-Assisted IoT-Based SCADA Systems Security: A Review of the State of the Art and Future Challenges. Search on Bibsonomy IEEE Access The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Md. Mahmud Hasan, Hussein T. Mouftah Optimal Trust System Placement in Smart Grid SCADA Networks. Search on Bibsonomy IEEE Access The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Raphael Amoah, Seyit Ahmet Çamtepe, Ernest Foo Securing DNP3 Broadcast Communications in SCADA Systems. Search on Bibsonomy IEEE Trans. Ind. Informatics The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Aamir Shahzad, Malrey Lee, Changhoon Lee, Naixue Xiong, Suntae Kim, Young Keun Lee, Kangmin Kim, Seon-Mi Woo, Gisung Jeong The protocol design and New approach for SCADA security enhancement during sensors broadcasting system. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Yichi Zhang, Lingfeng Wang 0001, Yingmeng Xiang Power System Reliability Analysis With Intrusion Tolerance in SCADA Systems. Search on Bibsonomy IEEE Trans. Smart Grid The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Dinesha Ranathunga, Matthew Roughan, Hung X. Nguyen, Phil Kernick, Nickolas J. G. Falkner Case Studies of SCADA Firewall Configurations and the Implications for Best Practices. Search on Bibsonomy IEEE Trans. Netw. Serv. Manag. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Abebe Tesfahun, Dhavala Lalitha Bhaskari A SCADA testbed for investigating cyber security vulnerabilities in critical infrastructures. Search on Bibsonomy Autom. Control. Comput. Sci. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Sungho Jeon 0002, Jeong-Han Yun, Seungoh Choi, Woonyon Kim Passive Fingerprinting of SCADA in Critical Infrastructure Network without Deep Packet Inspection. Search on Bibsonomy CoRR The full citation details ... 2016 DBLP  BibTeX  RDF
15Hongrui Wang, Tao Lu 0002, Xiaodai Dong, Peixue Li, Michael Xie Hierarchical Online Intrusion Detection for SCADA Networks. Search on Bibsonomy CoRR The full citation details ... 2016 DBLP  BibTeX  RDF
15Christophe Feltus, Djamel Khadraoui Designing security policies for complex SCADA systems management and protection. Search on Bibsonomy Int. J. Inf. Technol. Manag. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Barend Pretorius, Brett van Niekerk Cyber-Security for ICS/SCADA: A South African Perspective. Search on Bibsonomy Int. J. Cyber Warf. Terror. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Suhaila Ismail, Elena Sitnikova, Jill Slay SCADA Systems Cyber Security for Critical Infrastructures: Case Studies in Multiple Sectors. Search on Bibsonomy Int. J. Cyber Warf. Terror. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Abdalhossein Rezai, Parviz Keshavarzi, Zahra Moravej Advance hybrid key management architecture for SCADA network security. Search on Bibsonomy Secur. Commun. Networks The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Abdulmohsen Almalawi, Adil Fahad, Zahir Tari, Abdullah Alamri, Rayed AlGhamdi, Albert Y. Zomaya An Efficient Data-Driven Clustering Technique to Detect Attacks in SCADA Systems. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Amiya Ranjan Panda, Debahuti Mishra, Hare Krishna Ratha Implementation of SCADA/HMI system for real-time controlling and performance monitoring of SDR based flight termination system. Search on Bibsonomy J. Ind. Inf. Integr. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Weize Li 0002, Lun Xie, Zulan Deng, Zhiliang Wang False sequential logic attack on SCADA system and its physical impact analysis. Search on Bibsonomy Comput. Secur. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Yulia Cherdantseva, Pete Burnap, Andrew Blyth, Peter Eden, Kevin Jones, Hugh Soulsby, Kristan Stoddart A review of cyber security risk assessment methods for SCADA systems. Search on Bibsonomy Comput. Secur. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Nicoleta Stroia, Daniel Moga, Eugen Vitan, Gloria Cosovici, Corneliu Lungoci, István Kovács, Maria Mircea Internet based SCADA platform for monitoring strategic hydrotechnical structures. Search on Bibsonomy AQTR The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15I. Stoian, D. Capatina, O. Ghiran, Liviu Cristian Miclea, Szilárd Enyedi SCADA plug-in modules and instruments for federative organisation: Application on water management. Search on Bibsonomy AQTR The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Giovanni Corbò, Chiara Foglietta, Cosimo Palazzo, Stefano Panzieri Smart Behavioural Filter for SCADA Network. Search on Bibsonomy INISCOM The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Amit Kleinmann, Avishai Wool Automatic Construction of Statechart-Based Anomaly Detection Models for Multi-Threaded SCADA via Spectral Analysis. Search on Bibsonomy CPS-SPC@CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Robert Udd, Mikael Asplund, Simin Nadjm-Tehrani, Mehrdad Kazemtabrizi, Mathias Ekstedt Exploiting Bro for Intrusion Detection in a SCADA System. Search on Bibsonomy CPSS@AsiaCCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Abdullah Al Balushi, Kieran McLaughlin, Sakir Sezer Contextual Intrusion Alerts for Scada Networks - An Ontology based Approach for Intrusion Alerts Post Processing. Search on Bibsonomy ICISSP The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Antoine Lemay, Alireza Sadighian, José M. Fernandez 0001 Lightweight Journaling for Scada Systems via Event Correlation. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Mihai Sanduleac, Lucas Pons, Giampaolo Fiorentino, Rares Pop, Mihaela M. Albu The unbundled smart meter concept in a synchro-SCADA framework. Search on Bibsonomy I2MTC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Anas Motii, Agnes Lanusse, Brahim Hamid, Jean-Michel Bruel Model-Based Real-Time Evaluation of Security Patterns: A SCADA System Case Study. Search on Bibsonomy SAFECOMP Workshops The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Maxime Puys, Marie-Laure Potet, Pascal Lafourcade 0001 Formal Analysis of Security Properties on the OPC-UA SCADA Protocol. Search on Bibsonomy SAFECOMP The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Fábio Januário, Carolina Carvalho, Alberto Cardoso, Paulo Gil Security challenges in SCADA systems over Wireless Sensor and Actuator Networks. Search on Bibsonomy ICUMT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Daniel Krauss, Christoph Thomalla Ontology-based detection of cyber-attacks to SCADA-systems in critical infrastructures. Search on Bibsonomy DICTAP The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Yue Lu, Xiuzhen Chen, Changsong Chen 0002 Security authentication mechanism based on symmetric polynomials for SCADA systems. Search on Bibsonomy SSIC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Elias Bou-Harb Passive inference of attacks on SCADA communication protocols. Search on Bibsonomy ICC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Abdullah Al Balushi, Kieran McLaughlin, Sakir Sezer OSCIDS: An Ontology based SCADA Intrusion Detection Framework. Search on Bibsonomy SECRYPT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Irfan Ahmed 0001, Vassil Roussev, William E. Johnson, Saranyan Senthivel, Sneha Sudhakaran A SCADA System Testbed for Cybersecurity and Forensic Research and Pedagogy. Search on Bibsonomy ICSS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Antoine Lemay, José M. Fernandez 0001 Providing SCADA Network Data Sets for Intrusion Detection Research. Search on Bibsonomy CSET @ USENIX Security Symposium The full citation details ... 2016 DBLP  BibTeX  RDF
15Van Hoa Nguyen, Yvon Besanger, Quoc Tuan Tran 0001 Novel hybrid cloud based SCADA approach for interoperability of micro-grid platforms. Search on Bibsonomy ISGT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Yamuna Maccarana, Alberto L. Cologni, Fabio Previdi Design of a HTML5 SCADA system. Search on Bibsonomy RTSI The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Yosra Ben Dhief, Yacine Djemaiel, Slim Rekhis, Noureddine Boudriga A Novel Sensor Cloud Based SCADA infrastructure for Monitoring and Attack prevention. Search on Bibsonomy MoMM The full citation details ... 2016 DBLP  BibTeX  RDF
15Huan Yang, Liang Cheng 0001, Mooi Choo Chuah Detecting Peer-to-Peer Botnets in SCADA Systems. Search on Bibsonomy GLOBECOM Workshops The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Nikolaos M. Manousakis, George N. Korres Semidefinite programming for optimal placement of PMUs with channel limits considering pre-existing SCADA and PMU measurements. Search on Bibsonomy PSCC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Juichi Kosakaya Multi-agent-based SCADA system. Search on Bibsonomy EBCCSP The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Eduardo Germano da Silva, Anderson Santos da Silva, Juliano Araujo Wickboldt, Paul Smith 0001, Lisandro Zambenedetti Granville, Alberto E. Schaeffer Filho A One-Class NIDS for SDN-Based SCADA Systems. Search on Bibsonomy COMPSAC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Gianfranco Cerullo, Giovanni Mazzeo, Gaetano Papale, Luigi Sgaglione, Rosario Cristaldi A Secure Cloud-Based SCADA Application: The Use Case of a Water Supply Network. Search on Bibsonomy SoMeT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Jose Adrian Ruiz Carmona, Julio Cesar Munoz Benitez, Jose Luis Garcia-Gervacio SCADA system design: A proposal for optimizing a production line. Search on Bibsonomy CONIELECOMP The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Jiexin Zhang 0001, Shaoduo Gan, Xiaoxue Liu, Peidong Zhu Intrusion detection in SCADA systems by traffic periodicity and telemetry analysis. Search on Bibsonomy ISCC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Anisur Rahman, Yue Xu 0001, Kenneth Radke, Ernest Foo Finding Anomalies in SCADA Logs Using Rare Sequential Pattern Mining. Search on Bibsonomy NSS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Syed Umer Abdi, Kamran Iqbal, Jameel Ahmed Development of PC-based SCADA training system. Search on Bibsonomy ICIT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Kyriakos Stefanidis, Artemios G. Voyiatzis An HMM-Based Anomaly Detection Approach for SCADA Systems. Search on Bibsonomy WISTP The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Emil Zaev, Darko Babunski, Atanasko Tuneski SCADA system for real-time measuring and evaluation of river water quality. Search on Bibsonomy MECO The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Woo-Suk Jung, Sung-Min Kim, Young-Hoon Goo, Myung-Sup Kim Whitelist representation for FTP service in SCADA system by using structured ACL model. Search on Bibsonomy APNOMS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Mounia El Anbal, Anas Abou El Kalam, Siham Benhadou, Fouad Moutaouakkil, Hicham Medromi Securing SCADA Critical Network Against Internal and External Threats - Short Paper. Search on Bibsonomy CRITIS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Stefano Sebastio, Antonio Scala, Gregorio D'Agostino Availability Study of the Italian Electricity SCADA System in the Cloud. Search on Bibsonomy CRITIS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Thomas Brandstetter, Helge Janicke (eds.) 4th International Symposium for ICS & SCADA Cyber Security Research 2016, ICS-CSR 2016, 23 - 25 August 2016, Queen's Belfast University, UK Search on Bibsonomy ICS-CSR The full citation details ... 2016 DBLP  BibTeX  RDF
15Jianghai Li, Edita Bajramovic, Yuan Gao, Mithil Parekh Graded security forensics readiness of SCADA systems. Search on Bibsonomy GI-Jahrestagung The full citation details ... 2016 DBLP  BibTeX  RDF
15Jan de Meer, Karl Waedt New security standards for industrial automation and control systems, based on IEC 62443-4-2 (IACS/SCADA) - extended abstract. Search on Bibsonomy GI-Jahrestagung The full citation details ... 2016 DBLP  BibTeX  RDF
15Jan de Meer, Karl Waedt Workshop on new security standards for IACS/SCADA industrial systems. Search on Bibsonomy GI-Jahrestagung The full citation details ... 2016 DBLP  BibTeX  RDF
15Yuan Gao, Xin Xie, Mithil Parekh, Edita Bajramovic SIEM: policy-based monitoring of SCADA systems. Search on Bibsonomy GI-Jahrestagung The full citation details ... 2016 DBLP  BibTeX  RDF
15Md. Mahmud Hasan, Hussein T. Mouftah Latency-aware segmentation and trust system placement in smart grid SCADA networks. Search on Bibsonomy CAMAD The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Jan Vávra, Martin Hromada Comparison of the Intrusion Detection System Rules in Relation with the SCADA Systems. Search on Bibsonomy CSOC (2) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Jeyasingam Nivethan, Mauricio Papa A SCADA Intrusion Detection Framework that Incorporates Process Semantics. Search on Bibsonomy CISRC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Florentina-Magda Enescu, Cosmin Stirbu, Valeriu Ionescu SCADA Network System for the Monitoring and Control of an Electrical Installation Supplied by a Hydro-Generator. Search on Bibsonomy SOCO-CISIS-ICEUTE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Arthur Jicha, Mark W. Patton, Hsinchun Chen SCADA honeypots: An in-depth analysis of Conpot. Search on Bibsonomy ISI The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Sagar Samtani, Shuo Yu, Hongyi Zhu, Mark W. Patton, Hsinchun Chen Identifying SCADA vulnerabilities using passive and active vulnerability assessment techniques. Search on Bibsonomy ISI The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
Displaying result #501 - #600 of 997 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license