Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
15 | Si-Jung Kim, Do-Eun Cho, Sang-Soo Yeo |
Secure Model against APT in m-Connected SCADA Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Distributed Sens. Networks ![In: Int. J. Distributed Sens. Networks 10, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Antonio Di Pietro, Stefano Panzieri |
Taxonomy of SCADA systems security testbeds. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Crit. Infrastructures ![In: Int. J. Crit. Infrastructures 10(3/4), pp. 288-306, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Adil Fahad, Zahir Tari, Abdulmohsen Almalawi, Andrzej Goscinski, Ibrahim Khalil, Abdun Naser Mahmood |
PPFSCADA: Privacy preserving framework for SCADA data publishing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Future Gener. Comput. Syst. ![In: Future Gener. Comput. Syst. 37, pp. 496-511, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Jingcheng Gao, Jing Liu 0027, Bharat Rajan, Rahul Nori, Bo Fu, Yang Xiao 0001, Wei Liang 0001, C. L. Philip Chen |
SCADA communication and security issues. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secur. Commun. Networks ![In: Secur. Commun. Networks 7(1), pp. 175-194, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Amit Kleinmann, Avishai Wool |
Accurate Modeling of The Siemens S7 SCADA Protocol For Intrusion Detection And Digital Forensic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Digit. Forensics Secur. Law ![In: J. Digit. Forensics Secur. Law 9(2), pp. 37-50, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Abdulmohsen Almalawi, Xinghuo Yu 0001, Zahir Tari, Adil Fahad, Ibrahim Khalil |
An unsupervised anomaly-based detection approach for integrity attacks on SCADA systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 46, pp. 94-110, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Petr Novák, Radek Sindelár, Richard Mordinyi |
Integration framework for simulations and SCADA systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Simul. Model. Pract. Theory ![In: Simul. Model. Pract. Theory 47, pp. 121-140, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Nabil Sahli, Mohamed Benmohammed, El-Bay Bourennane |
Ontology and protocol secure for SCADA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Metadata Semant. Ontologies ![In: Int. J. Metadata Semant. Ontologies 9(2), pp. 114-127, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Robert D. Larkin, Juan Lopez Jr., Jonathan W. Butts, Michael R. Grimaila |
Evaluation of security solutions in the SCADA environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Base ![In: Data Base 45(1), pp. 38-53, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Igor Nai Fovino |
SCADA System Cyber Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secure Smart Embedded Devices, Platforms and Applications ![In: Secure Smart Embedded Devices, Platforms and Applications, pp. 451-471, 2014, Springer, 978-1-4614-7914-7. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Yuki Matsui, Hideharu Kojima, Tatsuhiro Tsuchiya |
Modeling the Interaction of Power Line and SCADA Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HASE ![In: 15th International IEEE Symposium on High-Assurance Systems Engineering, HASE 2014, Miami Beach, FL, USA, January 9-11, 2014, pp. 261-262, 2014, IEEE Computer Society, 978-1-4799-3465-2. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Ester Ciancamerla, B. Fresilli, Michele Minichino, Tatiana Patriarca, Serguei Iassinovski |
An electrical grid and its SCADA under cyber attacks: Modelling versus a Hybrid Test Bed. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2014, Rome, Italy, October 13-16, 2014, pp. 1-6, 2014, IEEE, 978-1-4799-3530-7. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Alessio Antonini, Alessandro Barenghi, Gerardo Pelosi, Saman A. Zonouz |
Security challenges in building automation and SCADA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2014, Rome, Italy, October 13-16, 2014, pp. 1-6, 2014, IEEE, 978-1-4799-3530-7. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
15 | William Mahoney, Abhishek Parakh, Matthew Battey |
Hardware Implementation of Quasigroup Encryption for SCADA Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NCA ![In: 2014 IEEE 13th International Symposium on Network Computing and Applications, NCA 2014, Cambridge, MA, USA, 21-23 August, 2014, pp. 301-305, 2014, IEEE Computer Society, 978-1-4799-5392-9. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
15 | I. Stoian, S. Ignat, D. Capatina, O. Ghiran |
Security and intrusion detection on critical SCADA systems for water management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AQTR ![In: IEEE International Conference on Automation, Quality and Testing, Robotics, AQTR 2014, Cluj-Napoca, Romania, May 22-24, 2014, pp. 1-6, 2014, IEEE, 978-1-4799-3731-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
15 | I. Stoian, D. Capatina, S. Ignat, O. Ghiran |
SCADA and modeling in water management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AQTR ![In: IEEE International Conference on Automation, Quality and Testing, Robotics, AQTR 2014, Cluj-Napoca, Romania, May 22-24, 2014, pp. 1-6, 2014, IEEE, 978-1-4799-3731-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Adrian Korodi, Ioan Silea |
Specifying and tendering of automation and SCADA systems: Case study for waste water treatment plants. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCA ![In: 2014 IEEE Conference on Control Applications, CCA 2014, Juan Les Antibes, France, October 8-10, 2014, pp. 1503-1508, 2014, IEEE. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Van Long Do, Lionel Fillatre, Igor V. Nikiforov |
A statistical method for detecting cyber/physical attacks on SCADA systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCA ![In: 2014 IEEE Conference on Control Applications, CCA 2014, Juan Les Antibes, France, October 8-10, 2014, pp. 364-369, 2014, IEEE. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Hui Lin 0005, Adam J. Slagell, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer |
Semantic Security Analysis of SCADA Networks to Detect Malicious Control Commands in Power Grids (Poster). ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014, pp. 492, 2014, ACM, 978-1-4503-3033-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Suhaila Ismail, Elena Sitnikova, Jill Slay |
Towards Developing SCADA Systems Security Measures for Critical Infrastructures against Cyber-Terrorist Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: ICT Systems Security and Privacy Protection - 29th IFIP TC 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014. Proceedings, pp. 242-249, 2014, Springer, 978-3-642-55414-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Deepjyoti Deka, Ross Baldick, Sriram Vishwanath |
Optimal hidden SCADA attacks on power grid: A graph theoretic approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNC ![In: International Conference on Computing, Networking and Communications, ICNC 2014, Honolulu, HI, USA, February 3-6, 2014, pp. 36-40, 2014, IEEE. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Rami Al-Dalky, Omar Abduljaleel, Khaled Salah 0001, Hadi Otrok, Mahmoud Al-Qutayri |
A Modbus traffic generator for evaluating the security of SCADA systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSNDSP ![In: 9th International Symposium on Communication Systems, Networks & Digital Signal Processing, CSNDSP 2014, Manchester, UK, July 23-25, 2014, pp. 809-814, 2014, IEEE, 978-1-4799-2581-0. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Yanjun Zuo |
Data labeling for integrity in SCADA systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIS ![In: 2014 IEEE/ACIS 13th International Conference on Computer and Information Science, ICIS 2014, Taiyuan, China, June 4-6, 2014, pp. 111-118, 2014, IEEE Computer Society, 978-1-4799-4860-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Weize Li 0002, Lun Xie, Daqian Liu, Zhiliang Wang |
False Logic Attacks on SCADA Control System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APSCC ![In: 2014 Asia-Pacific Services Computing Conference, APSCC 2014, Fuzhou, Fu Jian, China, December 4-6, 2014, pp. 136-140, 2014, IEEE Computer Society, 978-1-4799-7064-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Said Filali, Carina S. González, Carlos Lecuona |
Standards Evaluation HMI: Application of the guideline GEDIS to the systems SCADA of the NAP (Network Access Point) Canary Islands. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Interacción ![In: Proceedings of the XV International Conference on Human Computer Interaction, Interacción '14, Puerto de la Cruz, Tenerife, Spain, September 10-12, 2014, pp. 23:1-23:2, 2014, ACM, 978-1-4503-2880-7. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Simon Back, Simon B. Kranzer, Thomas J. Heistracher, Thomas J. Lampoltshammer |
Bridging SCADA systems and GI systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WF-IoT ![In: IEEE World Forum on Internet of Things, WF-IoT 2014, Seoul, South Korea, March 6-8, 2014, pp. 41-44, 2014, IEEE Computer Society, 978-1-4799-3459-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Sai Krishna Pallimalli, Arshad Shaik |
Defense Methodologies of AV Evasion for Access Control and Information Assurance in Industrial Distributed Control Systems and SCADA Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITCS ![In: 2014 International Conference on IT Convergence and Security, 10.1109/ICITCS.2014, Beijing, China, October 28-30, 2014, pp. 1-5, 2014, IEEE Computer Society, 978-1-4799-6541-0. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Dong-Ho Kang, Byoung-Koo Kim, Jung-Chan Na, Kyoung-Son Jhang |
Whitelist Generation Technique for Industrial Firewall in SCADA Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCC ![In: Frontier and Innovation in Future Computing and Communications, Proceedings of the 2014 FTRA International Symposium on Frontier and Innovation in Future Computing and Communications, FCC 2014, Auckland, New Zealand, January 13-16, 2014, pp. 525-534, 2014, Springer, 978-94-017-8797-0. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Vlad-Cristian Georgescu |
SCADA software used in dispatch centre for photovoltaic parks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECAI ![In: Proceedings of the 6th International Conference on Electronics, Computers and Artificial Intelligence, ECAI 2014, Bucharest, Romania, October 23-25, 2014, pp. 1-4, 2014, IEEE, 978-1-4799-5478-0. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Amritha Puliadi Premnath, Ju-Yeon Jo, Yoohwan Kim |
Application of NTRU Cryptographic Algorithm for SCADA Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: 11th International Conference on Information Technology: New Generations, ITNG 2014, Las Vegas, NV, USA, April 7-9, 2014, pp. 341-346, 2014, IEEE Computer Society, 978-1-4799-3187-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Christophe Feltus, Moussa Ouedraogo, Djamel Khadraoui |
Towards cyber-security protection of critical infrastructures by generating security policy for SCADA systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICT-DM ![In: 1st International Conference on Information and Communication Technologies for Disaster Management, ICT-DM 2014, Algiers, Algeria, March 24-25, 2014, pp. 1-8, 2014, IEEE, 978-1-4799-4767-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Sylvie Charbonnier, Nabil Bouchair, Philippe Gayet |
Analysis of fault diagnosability from SCADA alarms signatures using relevance indices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SMC ![In: 2014 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2014, San Diego, CA, USA, October 5-8, 2014, pp. 2739-2744, 2014, IEEE, 978-1-4799-3840-7. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Jie Wen 0007, Jiao Dai, Jizhong Han, Fangchun Di, Hu Yan |
Llama: Distributed Multi-versioned Model Data Management for SCADA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSE ![In: 17th IEEE International Conference on Computational Science and Engineering, CSE 2014, Chengdu, China, December 19-21, 2014, pp. 1968-1973, 2014, IEEE Computer Society, 978-1-4799-7981-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Muhammad Waseem Anwar, Farooque Azam |
Proposing a Novel Architecture of Script Component to Incorporate the Scripting Language Support in SCADA Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISIM ![In: Computer Information Systems and Industrial Management - 13th IFIP TC8 International Conference, CISIM 2014, Ho Chi Minh City, Vietnam, November 5-7, 2014. Proceedings, pp. 351-362, 2014, Springer, 978-3-662-45236-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Kyoung-Ho Kim, Jeong-Han Yun, Yeop Chang, Woonyon Kim |
Packet Loss Consideration for Burst-Based Anomaly Detection in SCADA Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications - 15th International Workshop, WISA 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers, pp. 358-369, 2014, Springer, 978-3-319-15086-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Seungoh Choi, Yeop Chang, Jeong-Han Yun, Woonyon Kim |
Multivariate Statistic Approach to Field Specifications of Binary Protocols in SCADA System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications - 15th International Workshop, WISA 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers, pp. 345-357, 2014, Springer, 978-3-319-15086-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Adnan A. Farooqui, Syed Sajjad Haider Zaidi, Attaullah Y. Memon, Sameer Qazi |
Cyber Security Backdrop: A SCADA testbed. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ComComAP ![In: IEEE Computers, Communications and IT Applications Conference, ComComAP 2014, Beijing, China, October 20-22, 2014, pp. 98-103, 2014, IEEE, 978-1-4799-4813-0. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Irina N. Kolosok, Liudmila Gurina |
Calculation of Cyber Security Index in the Problem of Power System State Estimation Based on SCADA and WAMS Measurements. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRITIS ![In: Critical Information Infrastructures Security - 9th International Conference, CRITIS 2014, Limassol, Cyprus, October 13-15, 2014, Revised Selected Papers, pp. 172-177, 2014, Springer, 978-3-319-31663-5. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Leandros A. Maglaras, Jianmin Jiang |
OCSVM model combined with K-means recursive clustering for intrusion detection in SCADA systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
QSHINE ![In: 10th International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, QShine 2014, Rhodes, Greece, August 18-20, 2014, pp. 133-134, 2014, IEEE, 978-1-63190-025-9. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Helge Janicke, Kevin I. Jones (eds.) |
2nd International Symposium for ICS & SCADA Cyber Security Research 2014, ICS-CSR 2014, 11-12 September 2014, St. Pölten, Austria ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICS-CSR ![BCS, 978-1-78017-286-6 The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
15 | Chen Liu 0011, Mengxin Liu, Zhengqiu Yang, Jiangpeng Xiu |
Study on the data integration platform of multi-regional SCADA system based on cloud computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCIS ![In: IEEE 3rd International Conference on Cloud Computing and Intelligence Systems, CCIS 2014, Shenzhen, China, November 27-29, 2014, pp. 519-522, 2014, IEEE, 978-1-4799-4720-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Yong Qin, Xiedong Cao, Peng Liang 0007, Qichao Hu, Weiwei Zhang |
Research on the analytic factor neuron model based on cloud generator and its application in oil&gas SCADA security defense. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCIS ![In: IEEE 3rd International Conference on Cloud Computing and Intelligence Systems, CCIS 2014, Shenzhen, China, November 27-29, 2014, pp. 155-159, 2014, IEEE, 978-1-4799-4720-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Muhammad Aamir 0001, Muhammad Aslam Uqaili, Javier Poncela, Nishat Ahmad Khan, B. S. Chowdhry 0001 |
Implementation and testing of optimal design of RTU hardware for Wireless SCADA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VITAE ![In: 4th International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems, VITAE 2014, Aalborg, Denmark, May 11-14, 2014, pp. 1-5, 2014, IEEE, 978-1-4799-4626-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Yang Hu 0009, Jizhen Liu, Taihua Chang, Wei Li 0100, Zhongwei Lin, Hongmin Meng |
Effective wind speed estimation and optimized setting strategy for WTGS based on SCADA system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AuCC ![In: 4th Australian Control Conference, AuCC 2014, Canberra, Australia, November 17-18, 2014, pp. 43-48, 2014, IEEE, 978-1-9221-0739-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Suhaila Ismail, Elena Sitnikova, Jill Slay |
Using integrated system theory approach to assess security for SCADA systems cyber security for critical infrastructures: A pilot study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSKD ![In: 11th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2014, Xiamen, China, August 19-21, 2014, pp. 1000-1006, 2014, IEEE, 978-1-4799-5147-5. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Payam Mahmoudi Nasr, Ali Yazdian Varjani |
Petri net model of insider attacks in SCADA system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCISC ![In: 11th International ISC Conference on Information Security and Cryptology, ISCISC 2014, Tehran, Iran, September 3-4, 2014, pp. 55-60, 2014, IEEE. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Aamir Shahzad, Shahrulniza Musa, Abdulaziz Aborujilah, Muhammad Irfan |
Industrial control systems (ICSs) vulnerabilities analysis and SCADA security enhancement using testbed encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICUIMC ![In: The 8th International Conference on Ubiquitous Information Management and Communication, ICUIMC '14, Siem Reap, Cambodia - January 09 - 11, 2014, pp. 7:1-7:6, 2014, ACM, 978-1-4503-2644-5. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Qian Chen 0019, Sherif Abdelwahed |
Towards realizing self-protecting SCADA systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISR ![In: Cyber and Information Security Research Conference, CISR '14, Oak Ridge, TN, USA, April 8-10, 2014, pp. 105-108, 2014, ACM, 978-1-4503-2812-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Anis Ben Aissa, Latifa Ben Arfa Rabai, Robert K. Abercrombie, Ali Mili 0001, Frederick T. Sheldon |
Quantifying availability in SCADA environments using the cyber security metric MFC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISR ![In: Cyber and Information Security Research Conference, CISR '14, Oak Ridge, TN, USA, April 8-10, 2014, pp. 81-84, 2014, ACM, 978-1-4503-2812-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Michael Haney, Mauricio Papa |
A framework for the design and deployment of a SCADA honeynet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISR ![In: Cyber and Information Security Research Conference, CISR '14, Oak Ridge, TN, USA, April 8-10, 2014, pp. 121-124, 2014, ACM, 978-1-4503-2812-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Rattikorn Hewett, Sudeeptha Rudrapattana, Phongphun Kijsanayothin |
Cyber-security analysis of smart grid SCADA systems with game models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISR ![In: Cyber and Information Security Research Conference, CISR '14, Oak Ridge, TN, USA, April 8-10, 2014, pp. 109-112, 2014, ACM, 978-1-4503-2812-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Yong Wang, Zhaoyan Xu, Jialong Zhang, Lei Xu 0024, Haopei Wang, Guofei Gu |
SRID: State Relation Based Intrusion Detection for False Data Injection Attacks in SCADA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS (2) ![In: Computer Security - ESORICS 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part II, pp. 401-418, 2014, Springer, 978-3-319-11211-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Nunzio Marco Torrisi, Ognjen Vukovic, György Dán, Stefan Hagdahl |
Peekaboo: A gray hole attack on encrypted SCADA communication using traffic analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SmartGridComm ![In: 2014 IEEE International Conference on Smart Grid Communications, SmartGridComm 2014, Venice, Italy, November 3-6, 2014, pp. 902-907, 2014, IEEE, 978-1-4799-4934-2. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
15 | J. Jerry Daniel, H. Pratheesh, B. Raja Singh, G. Rakesh, Joseph Mathew, Senju Thomas Panicker, S. S. Shankar, K. T. Sujimon, Arun Krishnan, A. Muhammed Irshad |
Implementation of a novel SCADA architecture for a 210 MW thermal power plant. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDSE ![In: International Conference on Data Science & Engineering, ICDSE 2014, Kochi, India, August 26-28, 2014, pp. 182-187, 2014, IEEE, 978-1-4799-6870-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Valery Anatolevich Kamaev, Alexey G. Finogeev, Anton A. Finogeev, Sergey Shevchenko |
Knowledge Discovery in the SCADA Databases Used for the Municipal Power Supply System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
JCKBSE ![In: Knowledge-Based Software Engineering - 11th Joint Conference, JCKBSE 2014, Volgograd, Russia, September 17-20, 2014. Proceedings, pp. 1-14, 2014, Springer, 978-3-319-11853-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Shahir Majed, Suhaimi Ibrahim, Mohamed Shaaban |
Architecting and Development of the SecureCyber: A SCADA Security platform Over Energy Smart Grid. ![Search on Bibsonomy](Pics/bibsonomy.png) |
iiWAS ![In: Proceedings of the 16th International Conference on Information Integration and Web-based Applications & Services, Hanoi, Vietnam, December 4-6, 2014, pp. 170-174, 2014, ACM, 978-1-4503-3001-5. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Qian Chen 0019, Sherif Abdelwahed |
A Model-based Approach to Self-Protection in SCADA Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Feedback Computing ![In: 9th International Workshop on Feedback Computing, Philadelphia, PA, USA, June 17, 2014., 2014, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
15 | Nicole Beatriz Portilla, Max Hering de Queiroz, José Eduardo Ribeiro Cury |
Integration of supervisory control with SCADA system for a flexible manufacturing cell. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDIN ![In: 12th IEEE International Conference on Industrial Informatics, INDIN 2014, Porto Alegre, RS, Brazil, July 27-30, 2014, pp. 261-266, 2014, IEEE, 978-1-4799-4905-2. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Manuel Cheminod, Luca Durante, Lucia Seno, Adriano Valenzano |
Automated Analysis of Access Policies in Industrial Plants. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICS-CSR ![In: 2nd International Symposium for ICS & SCADA Cyber Security Research 2014, ICS-CSR 2014, 11-12 September 2014, St. Pölten, Austria, 2014, BCS, 978-1-78017-286-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
15 | Laurens Lemaire, Jorn Lapon, Bart De Decker, Vincent Naessens |
A SysML Extension for Security Analysis of Industrial Control Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICS-CSR ![In: 2nd International Symposium for ICS & SCADA Cyber Security Research 2014, ICS-CSR 2014, 11-12 September 2014, St. Pölten, Austria, 2014, BCS, 978-1-78017-286-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
15 | Alessio Antonini, Federico Maggi, Stefano Zanero |
A Practical Attack Against a KNX-based Building Automation System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICS-CSR ![In: 2nd International Symposium for ICS & SCADA Cyber Security Research 2014, ICS-CSR 2014, 11-12 September 2014, St. Pölten, Austria, 2014, BCS, 978-1-78017-286-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
15 | Benjamin Green 0001, Daniel Prince, Utz Roedig, Jerry S. Busby, David Hutchison 0001 |
Socio-Technical Security Analysis of Industrial Control Systems (ICS). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICS-CSR ![In: 2nd International Symposium for ICS & SCADA Cyber Security Research 2014, ICS-CSR 2014, 11-12 September 2014, St. Pölten, Austria, 2014, BCS, 978-1-78017-286-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
15 | Kieran McLaughlin, Sakir Sezer, Paul Smith 0001, Zhendong Ma, Florian Skopik |
PRECYSE: Cyber-attack Detection and Response for Industrial Control Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICS-CSR ![In: 2nd International Symposium for ICS & SCADA Cyber Security Research 2014, ICS-CSR 2014, 11-12 September 2014, St. Pölten, Austria, 2014, BCS, 978-1-78017-286-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
15 | Robin Chapas, Ana Hristova, Thomas Locher, Sebastian Obermeier 0001 |
Securing Industrial Control Systems through Autonomous Hardening. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICS-CSR ![In: 2nd International Symposium for ICS & SCADA Cyber Security Research 2014, ICS-CSR 2014, 11-12 September 2014, St. Pölten, Austria, 2014, BCS, 978-1-78017-286-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
15 | Donghyun Choi, Hanjae Jeong, Dongho Won, Seungjoo Kim |
Hybrid Key Management Architecture for Robust SCADA Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Sci. Eng. ![In: J. Inf. Sci. Eng. 29(2), pp. 281-298, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
15 | Carlos Queiroz, Abdun Naser Mahmood, Zahir Tari |
A Probabilistic Model to Predict the Survivability of SCADA Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Ind. Informatics ![In: IEEE Trans. Ind. Informatics 9(4), pp. 1975-1985, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Nan Cen, Irene Eusgeld, Wolfgang Kröger |
Analyzing vulnerabilities between SCADA system and SUC due to interdependencies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Reliab. Eng. Syst. Saf. ![In: Reliab. Eng. Syst. Saf. 113, pp. 76-93, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Niv Goldenberg, Avishai Wool |
Accurate modeling of Modbus/TCP for intrusion detection in SCADA systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Crit. Infrastructure Prot. ![In: Int. J. Crit. Infrastructure Prot. 6(2), pp. 63-75, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Jeffrey L. Hieb, Jacob Schreiver, James H. Graham |
A security-hardened appliance for implementing authentication and access control in SCADA infrastructures with legacy field devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Crit. Infrastructure Prot. ![In: Int. J. Crit. Infrastructure Prot. 6(1), pp. 12-24, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Rafael Ramos Regis Barbosa, Ramin Sadre, Aiko Pras |
Flow whitelisting in SCADA networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Crit. Infrastructure Prot. ![In: Int. J. Crit. Infrastructure Prot. 6(3-4), pp. 150-158, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Saurabh Amin, Xavier Litrico, S. Shankar Sastry, Alexandre M. Bayen |
Cyber Security of Water SCADA Systems - Part II: Attack Detection Using Enhanced Hydrodynamic Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Control. Syst. Technol. ![In: IEEE Trans. Control. Syst. Technol. 21(5), pp. 1679-1693, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Saurabh Amin, Xavier Litrico, Shankar Sastry 0001, Alexandre M. Bayen |
Cyber Security of Water SCADA Systems - Part I: Analysis and Experimentation of Stealthy Deception Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Control. Syst. Technol. ![In: IEEE Trans. Control. Syst. Technol. 21(5), pp. 1963-1970, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Hussam M. N. Al Hamadi, Chan Yeob Yeun, Mohamed Jamal Zemerly |
A Novel Security Scheme for the Smart Grid and SCADA Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Pers. Commun. ![In: Wirel. Pers. Commun. 73(4), pp. 1547-1559, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Muhammad Aamir 0001, Javier Poncela, Muhammad Aslam Uqaili, Bhawani Shankar Chowdhry, Nishat Ahmad Khan |
Optimal Design of Remote Terminal Unit (RTU) for Wireless SCADA System for Energy Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Pers. Commun. ![In: Wirel. Pers. Commun. 69(3), pp. 999-1012, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Meik Schlechtingen, Ilmar Ferreira Santos, Sofiane Achiche |
Wind turbine condition monitoring based on SCADA data using normal behavior models. Part 1: System description. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Appl. Soft Comput. ![In: Appl. Soft Comput. 13(1), pp. 259-270, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Savas Sahin, Yalçin Isler |
Microcontroller-Based Robotics and SCADA Experiments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Educ. ![In: IEEE Trans. Educ. 56(4), pp. 424-429, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Thomas Richard McEvoy, Stephen D. Wolthusen |
Locating subverted processes using random packet comparison in SCADA systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Crit. Infrastructures ![In: Int. J. Crit. Infrastructures 9(1/2), pp. 32-51, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
15 | John McCarthy 0004, William Mahoney |
SCADA Threats in the Modern Airport. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Cyber Warf. Terror. ![In: Int. J. Cyber Warf. Terror. 3(4), pp. 32-39, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Eric Byres |
The air gap: SCADA's enduring security myth. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Commun. ACM ![In: Commun. ACM 56(8), pp. 29-31, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Diogo L. F. Nina, João Viana da Fonseca Neto, Ernesto Franklin Marcal Ferreira, Alcione Miranda dos Santos |
Hybrid Support System for Decision Making Based on MLP-ANN, IED and SCADA for Disturbances Analysis of Electrical Power Distribution Transformers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UKSim ![In: 15th International Conference on Computer Modelling and Simulation, UKSim 2013, Cambridge, United Kingdom, April 10-12, 2013, pp. 12-20, 2013, IEEE, 978-1-4673-6421-8. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Hui Lin 0005, Adam J. Slagell, Zbigniew Kalbarczyk, Peter W. Sauer, Ravishankar K. Iyer |
Semantic security analysis of SCADA networks to detect malicious control commands in power grids. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEGS@CCS ![In: SEGS'13, Proceedings of the 2013 ACM Workshop on Smart Energy Grid Security, Co-located with CCS 2013, November 8, 2013, Berlin, Germany, pp. 29-34, 2013, ACM, 978-1-4503-2492-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Yi Deng 0005, Sandeep K. Shukla |
A Distributed Real-Time Event Correlation Architecture for SCADA Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Critical Infrastructure Protection ![In: Critical Infrastructure Protection VII - 7th IFIP WG 11.10 International Conference, ICCIP 2013, Washington, DC, USA, March 18-20, 2013, Revised Selected Papers, pp. 81-93, 2013, Springer, 978-3-642-45329-8. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
15 | R. K. Shyamasundar |
Security and protection of SCADA: a bigdata algorithmic approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013, pp. 20-27, 2013, ACM, 978-1-4503-2498-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Christophe Feltus, Djamel Khadraoui |
On designing automatic reaction strategy for critical infrastructure SCADA system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013, pp. 444-445, 2013, ACM, 978-1-4503-2498-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Guy Guemkam, Jonathan Blangenois, Christophe Feltus, Djamel Khadraoui |
Metamodel for reputation based agents system: case study for electrical distribution SCADA design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013, pp. 251-255, 2013, ACM, 978-1-4503-2498-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Miao Liu, Changbing Guo, Mancang Yuan |
The Framework of SCADA System Based on Cloud Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CloudComp ![In: Cloud Computing - 4th International Conference, CloudComp 2013, Wuhan, China, October 17-19, 2013, Revised Selected Papers, pp. 155-163, 2013, Springer, 978-3-319-05505-3. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Justin M. Beaver, Raymond C. Borges-Hink, Mark A. Buckner |
An Evaluation of Machine Learning Methods to Detect Malicious SCADA Communications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICMLA (2) ![In: 12th International Conference on Machine Learning and Applications, ICMLA 2013, Miami, FL, USA, December 4-7, 2013, Volume 2, pp. 54-59, 2013, IEEE. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Jian Shen 0001, Jin Wang 0001, Yongjun Ren, Jianwei Zhang 0005, Shunfeng Wang |
Efficient Key Management Scheme for SCADA System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EMC/HumanCom ![In: Advanced Technologies, Embedded and Multimedia for Human-centric Computing - HumanCom and EMC 2013 [International Conference on Human-centric Computing, HumanCom 2013 / 8th International Conference on Embedded and Multimedia Computing, EMC 2013, Taipei, Taiwan, August 23-25, 2013], pp. 619-625, 2013, Springer, 978-94-007-7261-8. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Ondrej Rysavý, Jaroslav Ráb, Miroslav Svéda |
Improving security in SCADA systems through firewall policy analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FedCSIS ![In: Proceedings of the 2013 Federated Conference on Computer Science and Information Systems, Kraków, Poland, September 8-11, 2013., pp. 1423-1428, 2013, 978-1-4673-4471-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
15 | Wojciech Tylman |
SCADA Intrusion Detection Based on Modelling of Allowed Communication Patterns. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DepCoS-RELCOMEX ![In: New Results in Dependability and Computer Systems - Proceedings of the 8th International Conference on Dependability and Complex Systems DepCoS-RELCOMEX, September 9-13, 2013, Brunów, Poland, pp. 489-500, 2013, Springer, 978-3-319-00944-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Ester Ciancamerla, Michele Minichino, S. Palmieri |
Modelling SCADA and Corporate Network of a Medium Voltage Power Grid under Cyber Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECRYPT ![In: SECRYPT 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjavík, Iceland, 29-31 July, 2013, pp. 123-134, 2013, SciTePress, 978-989-8565-73-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
15 | Dawei Su, Chunlei Xu, Haibing Zhu, Mingyang Sun, Weijin Zhuang, Yonggang Zhang |
Design and Realization of Clustering Based Power Grid SCADA System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Asia International Conference on Modelling and Simulation ![In: Proceedings of the Asia Modelling Symposium 2013, Seventh Asia International Conference on Mathematical Modelling and Computer Simulation, AMS 2013, 23 July, 2013, Hong Kong, China / 25 July, 2013, Kuala Lumpur, Malaysia, pp. 230-234, 2013, IEEE, 978-0-7695-5101-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Elena Sitnikova, Ernest Foo, Rayford B. Vaughn |
The Power of Hands-On Exercises in SCADA Cyber Security Education. ![Search on Bibsonomy](Pics/bibsonomy.png) |
World Conference on Information Security Education ![In: Information Assurance and Security Education and Training - 8th IFIP WG 11.8 World Conference on Information Security Education, WISE 8, Auckland, New Zealand, July 8-10, 2013, Proceedings, WISE 7, Lucerne Switzerland, June 9-10, 2011, and WISE 6, Bento Gonçalves, RS, Brazil, July 27-31, 2009, Revised Selected Papers, pp. 83-94, 2013, Springer, 978-3-642-39376-1. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
15 | John T. Hagen, Barry E. Mullins |
TCP veto: A novel network attack and its Application to SCADA protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISGT ![In: IEEE PES Innovative Smart Grid Technologies Conference, ISGT 2013, Washington, DC, USA, February 24-27, 2013, pp. 1-6, 2013, IEEE, 978-1-4673-4894-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Rong Jiang 0001, Rongxing Lu, Chengzhe Lai, Jun Luo 0011, Xuemin Shen |
Robust group key management with revocation and collusion resistance for SCADA in smart grid. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GLOBECOM ![In: 2013 IEEE Global Communications Conference, GLOBECOM 2013, Atlanta, GA, USA, December 9-13, 2013, pp. 802-807, 2013, IEEE, 978-1-4799-1353-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Si-Jung Kim, Bong-Han Kim, Sang-Soo Yeo, Do-Eun Cho |
Network Anomaly Detection for M-Connected SCADA Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BWCCA ![In: 2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications, Compiegne, France, October 28-30, 2013, pp. 351-354, 2013, IEEE, 978-0-7695-5093-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Jules Pagna Disso, Kevin Jones, Steven Bailey |
A Plausible Solution to SCADA Security Honeypot Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BWCCA ![In: 2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications, Compiegne, France, October 28-30, 2013, pp. 443-448, 2013, IEEE, 978-0-7695-5093-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Gilberto Schneider, Vanessa F. de Lima, Lucas G. Scherer, Robinson F. de Camargo, Claiton M. Franchi |
SCADA system applied to micro hydropower plant. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IECON ![In: IECON 2013 - 39th Annual Conference of the IEEE Industrial Electronics Society, Vienna, Austria, November 10-13, 2013, pp. 7205-7209, 2013, IEEE, 978-1-4799-0224-8. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Naoum Sayegh, Ali Chehab, Imad H. Elhajj, Ayman I. Kayssi |
Internal security attacks on SCADA systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCIT ![In: Third International Conference on Communications and Information Technology, ICCIT 2013, Beirut, Lebanon, June 19-21, 2013, pp. 22-27, 2013, IEEE, 978-1-4673-5306-9. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Djamel Khadraoui, Christophe Feltus |
Critical Infrastructures Governance Exploring SCADA Cybernetics through Architectured Policy Semantic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SMC ![In: IEEE International Conference on Systems, Man, and Cybernetics, Manchester, SMC 2013, United Kingdom, October 13-16, 2013, pp. 4766-4771, 2013, IEEE, 978-0-7695-5154-8. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|