The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for SCADA with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1993-2004 (23) 2005-2006 (24) 2007 (18) 2008 (32) 2009 (31) 2010 (41) 2011 (36) 2012 (46) 2013 (61) 2014 (85) 2015 (70) 2016 (90) 2017 (61) 2018 (51) 2019 (74) 2020 (64) 2021 (73) 2022 (61) 2023 (41) 2024 (15)
Publication types (Num. hits)
article(342) incollection(9) inproceedings(632) phdthesis(10) proceedings(4)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 125 occurrences of 90 keywords

Results
Found 997 publication records. Showing 997 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
15Si-Jung Kim, Do-Eun Cho, Sang-Soo Yeo Secure Model against APT in m-Connected SCADA Network. Search on Bibsonomy Int. J. Distributed Sens. Networks The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Antonio Di Pietro, Stefano Panzieri Taxonomy of SCADA systems security testbeds. Search on Bibsonomy Int. J. Crit. Infrastructures The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Adil Fahad, Zahir Tari, Abdulmohsen Almalawi, Andrzej Goscinski, Ibrahim Khalil, Abdun Naser Mahmood PPFSCADA: Privacy preserving framework for SCADA data publishing. Search on Bibsonomy Future Gener. Comput. Syst. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Jingcheng Gao, Jing Liu 0027, Bharat Rajan, Rahul Nori, Bo Fu, Yang Xiao 0001, Wei Liang 0001, C. L. Philip Chen SCADA communication and security issues. Search on Bibsonomy Secur. Commun. Networks The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Amit Kleinmann, Avishai Wool Accurate Modeling of The Siemens S7 SCADA Protocol For Intrusion Detection And Digital Forensic. Search on Bibsonomy J. Digit. Forensics Secur. Law The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Abdulmohsen Almalawi, Xinghuo Yu 0001, Zahir Tari, Adil Fahad, Ibrahim Khalil An unsupervised anomaly-based detection approach for integrity attacks on SCADA systems. Search on Bibsonomy Comput. Secur. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Petr Novák, Radek Sindelár, Richard Mordinyi Integration framework for simulations and SCADA systems. Search on Bibsonomy Simul. Model. Pract. Theory The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Nabil Sahli, Mohamed Benmohammed, El-Bay Bourennane Ontology and protocol secure for SCADA. Search on Bibsonomy Int. J. Metadata Semant. Ontologies The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Robert D. Larkin, Juan Lopez Jr., Jonathan W. Butts, Michael R. Grimaila Evaluation of security solutions in the SCADA environment. Search on Bibsonomy Data Base The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Igor Nai Fovino SCADA System Cyber Security. Search on Bibsonomy Secure Smart Embedded Devices, Platforms and Applications The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Yuki Matsui, Hideharu Kojima, Tatsuhiro Tsuchiya Modeling the Interaction of Power Line and SCADA Networks. Search on Bibsonomy HASE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Ester Ciancamerla, B. Fresilli, Michele Minichino, Tatiana Patriarca, Serguei Iassinovski An electrical grid and its SCADA under cyber attacks: Modelling versus a Hybrid Test Bed. Search on Bibsonomy ICCST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Alessio Antonini, Alessandro Barenghi, Gerardo Pelosi, Saman A. Zonouz Security challenges in building automation and SCADA. Search on Bibsonomy ICCST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15William Mahoney, Abhishek Parakh, Matthew Battey Hardware Implementation of Quasigroup Encryption for SCADA Networks. Search on Bibsonomy NCA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15I. Stoian, S. Ignat, D. Capatina, O. Ghiran Security and intrusion detection on critical SCADA systems for water management. Search on Bibsonomy AQTR The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15I. Stoian, D. Capatina, S. Ignat, O. Ghiran SCADA and modeling in water management. Search on Bibsonomy AQTR The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Adrian Korodi, Ioan Silea Specifying and tendering of automation and SCADA systems: Case study for waste water treatment plants. Search on Bibsonomy CCA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Van Long Do, Lionel Fillatre, Igor V. Nikiforov A statistical method for detecting cyber/physical attacks on SCADA systems. Search on Bibsonomy CCA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Hui Lin 0005, Adam J. Slagell, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer Semantic Security Analysis of SCADA Networks to Detect Malicious Control Commands in Power Grids (Poster). Search on Bibsonomy SIN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Suhaila Ismail, Elena Sitnikova, Jill Slay Towards Developing SCADA Systems Security Measures for Critical Infrastructures against Cyber-Terrorist Attacks. Search on Bibsonomy SEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Deepjyoti Deka, Ross Baldick, Sriram Vishwanath Optimal hidden SCADA attacks on power grid: A graph theoretic approach. Search on Bibsonomy ICNC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Rami Al-Dalky, Omar Abduljaleel, Khaled Salah 0001, Hadi Otrok, Mahmoud Al-Qutayri A Modbus traffic generator for evaluating the security of SCADA systems. Search on Bibsonomy CSNDSP The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Yanjun Zuo Data labeling for integrity in SCADA systems. Search on Bibsonomy ICIS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Weize Li 0002, Lun Xie, Daqian Liu, Zhiliang Wang False Logic Attacks on SCADA Control System. Search on Bibsonomy APSCC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Said Filali, Carina S. González, Carlos Lecuona Standards Evaluation HMI: Application of the guideline GEDIS to the systems SCADA of the NAP (Network Access Point) Canary Islands. Search on Bibsonomy Interacción The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Simon Back, Simon B. Kranzer, Thomas J. Heistracher, Thomas J. Lampoltshammer Bridging SCADA systems and GI systems. Search on Bibsonomy WF-IoT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Sai Krishna Pallimalli, Arshad Shaik Defense Methodologies of AV Evasion for Access Control and Information Assurance in Industrial Distributed Control Systems and SCADA Systems. Search on Bibsonomy ICITCS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Dong-Ho Kang, Byoung-Koo Kim, Jung-Chan Na, Kyoung-Son Jhang Whitelist Generation Technique for Industrial Firewall in SCADA Networks. Search on Bibsonomy FCC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Vlad-Cristian Georgescu SCADA software used in dispatch centre for photovoltaic parks. Search on Bibsonomy ECAI The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Amritha Puliadi Premnath, Ju-Yeon Jo, Yoohwan Kim Application of NTRU Cryptographic Algorithm for SCADA Security. Search on Bibsonomy ITNG The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Christophe Feltus, Moussa Ouedraogo, Djamel Khadraoui Towards cyber-security protection of critical infrastructures by generating security policy for SCADA systems. Search on Bibsonomy ICT-DM The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Sylvie Charbonnier, Nabil Bouchair, Philippe Gayet Analysis of fault diagnosability from SCADA alarms signatures using relevance indices. Search on Bibsonomy SMC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Jie Wen 0007, Jiao Dai, Jizhong Han, Fangchun Di, Hu Yan Llama: Distributed Multi-versioned Model Data Management for SCADA. Search on Bibsonomy CSE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Muhammad Waseem Anwar, Farooque Azam Proposing a Novel Architecture of Script Component to Incorporate the Scripting Language Support in SCADA Systems. Search on Bibsonomy CISIM The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Kyoung-Ho Kim, Jeong-Han Yun, Yeop Chang, Woonyon Kim Packet Loss Consideration for Burst-Based Anomaly Detection in SCADA Network. Search on Bibsonomy WISA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Seungoh Choi, Yeop Chang, Jeong-Han Yun, Woonyon Kim Multivariate Statistic Approach to Field Specifications of Binary Protocols in SCADA System. Search on Bibsonomy WISA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Adnan A. Farooqui, Syed Sajjad Haider Zaidi, Attaullah Y. Memon, Sameer Qazi Cyber Security Backdrop: A SCADA testbed. Search on Bibsonomy ComComAP The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Irina N. Kolosok, Liudmila Gurina Calculation of Cyber Security Index in the Problem of Power System State Estimation Based on SCADA and WAMS Measurements. Search on Bibsonomy CRITIS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Leandros A. Maglaras, Jianmin Jiang OCSVM model combined with K-means recursive clustering for intrusion detection in SCADA systems. Search on Bibsonomy QSHINE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Helge Janicke, Kevin I. Jones (eds.) 2nd International Symposium for ICS & SCADA Cyber Security Research 2014, ICS-CSR 2014, 11-12 September 2014, St. Pölten, Austria Search on Bibsonomy ICS-CSR The full citation details ... 2014 DBLP  BibTeX  RDF
15Chen Liu 0011, Mengxin Liu, Zhengqiu Yang, Jiangpeng Xiu Study on the data integration platform of multi-regional SCADA system based on cloud computing. Search on Bibsonomy CCIS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Yong Qin, Xiedong Cao, Peng Liang 0007, Qichao Hu, Weiwei Zhang Research on the analytic factor neuron model based on cloud generator and its application in oil&gas SCADA security defense. Search on Bibsonomy CCIS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Muhammad Aamir 0001, Muhammad Aslam Uqaili, Javier Poncela, Nishat Ahmad Khan, B. S. Chowdhry 0001 Implementation and testing of optimal design of RTU hardware for Wireless SCADA. Search on Bibsonomy VITAE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Yang Hu 0009, Jizhen Liu, Taihua Chang, Wei Li 0100, Zhongwei Lin, Hongmin Meng Effective wind speed estimation and optimized setting strategy for WTGS based on SCADA system. Search on Bibsonomy AuCC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Suhaila Ismail, Elena Sitnikova, Jill Slay Using integrated system theory approach to assess security for SCADA systems cyber security for critical infrastructures: A pilot study. Search on Bibsonomy FSKD The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Payam Mahmoudi Nasr, Ali Yazdian Varjani Petri net model of insider attacks in SCADA system. Search on Bibsonomy ISCISC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Aamir Shahzad, Shahrulniza Musa, Abdulaziz Aborujilah, Muhammad Irfan Industrial control systems (ICSs) vulnerabilities analysis and SCADA security enhancement using testbed encryption. Search on Bibsonomy ICUIMC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Qian Chen 0019, Sherif Abdelwahed Towards realizing self-protecting SCADA systems. Search on Bibsonomy CISR The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Anis Ben Aissa, Latifa Ben Arfa Rabai, Robert K. Abercrombie, Ali Mili 0001, Frederick T. Sheldon Quantifying availability in SCADA environments using the cyber security metric MFC. Search on Bibsonomy CISR The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Michael Haney, Mauricio Papa A framework for the design and deployment of a SCADA honeynet. Search on Bibsonomy CISR The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Rattikorn Hewett, Sudeeptha Rudrapattana, Phongphun Kijsanayothin Cyber-security analysis of smart grid SCADA systems with game models. Search on Bibsonomy CISR The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Yong Wang, Zhaoyan Xu, Jialong Zhang, Lei Xu 0024, Haopei Wang, Guofei Gu SRID: State Relation Based Intrusion Detection for False Data Injection Attacks in SCADA. Search on Bibsonomy ESORICS (2) The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Nunzio Marco Torrisi, Ognjen Vukovic, György Dán, Stefan Hagdahl Peekaboo: A gray hole attack on encrypted SCADA communication using traffic analysis. Search on Bibsonomy SmartGridComm The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15J. Jerry Daniel, H. Pratheesh, B. Raja Singh, G. Rakesh, Joseph Mathew, Senju Thomas Panicker, S. S. Shankar, K. T. Sujimon, Arun Krishnan, A. Muhammed Irshad Implementation of a novel SCADA architecture for a 210 MW thermal power plant. Search on Bibsonomy ICDSE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Valery Anatolevich Kamaev, Alexey G. Finogeev, Anton A. Finogeev, Sergey Shevchenko Knowledge Discovery in the SCADA Databases Used for the Municipal Power Supply System. Search on Bibsonomy JCKBSE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Shahir Majed, Suhaimi Ibrahim, Mohamed Shaaban Architecting and Development of the SecureCyber: A SCADA Security platform Over Energy Smart Grid. Search on Bibsonomy iiWAS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Qian Chen 0019, Sherif Abdelwahed A Model-based Approach to Self-Protection in SCADA Systems. Search on Bibsonomy Feedback Computing The full citation details ... 2014 DBLP  BibTeX  RDF
15Nicole Beatriz Portilla, Max Hering de Queiroz, José Eduardo Ribeiro Cury Integration of supervisory control with SCADA system for a flexible manufacturing cell. Search on Bibsonomy INDIN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Manuel Cheminod, Luca Durante, Lucia Seno, Adriano Valenzano Automated Analysis of Access Policies in Industrial Plants. Search on Bibsonomy ICS-CSR The full citation details ... 2014 DBLP  BibTeX  RDF
15Laurens Lemaire, Jorn Lapon, Bart De Decker, Vincent Naessens A SysML Extension for Security Analysis of Industrial Control Systems. Search on Bibsonomy ICS-CSR The full citation details ... 2014 DBLP  BibTeX  RDF
15Alessio Antonini, Federico Maggi, Stefano Zanero A Practical Attack Against a KNX-based Building Automation System. Search on Bibsonomy ICS-CSR The full citation details ... 2014 DBLP  BibTeX  RDF
15Benjamin Green 0001, Daniel Prince, Utz Roedig, Jerry S. Busby, David Hutchison 0001 Socio-Technical Security Analysis of Industrial Control Systems (ICS). Search on Bibsonomy ICS-CSR The full citation details ... 2014 DBLP  BibTeX  RDF
15Kieran McLaughlin, Sakir Sezer, Paul Smith 0001, Zhendong Ma, Florian Skopik PRECYSE: Cyber-attack Detection and Response for Industrial Control Systems. Search on Bibsonomy ICS-CSR The full citation details ... 2014 DBLP  BibTeX  RDF
15Robin Chapas, Ana Hristova, Thomas Locher, Sebastian Obermeier 0001 Securing Industrial Control Systems through Autonomous Hardening. Search on Bibsonomy ICS-CSR The full citation details ... 2014 DBLP  BibTeX  RDF
15Donghyun Choi, Hanjae Jeong, Dongho Won, Seungjoo Kim Hybrid Key Management Architecture for Robust SCADA Systems. Search on Bibsonomy J. Inf. Sci. Eng. The full citation details ... 2013 DBLP  BibTeX  RDF
15Carlos Queiroz, Abdun Naser Mahmood, Zahir Tari A Probabilistic Model to Predict the Survivability of SCADA Systems. Search on Bibsonomy IEEE Trans. Ind. Informatics The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Nan Cen, Irene Eusgeld, Wolfgang Kröger Analyzing vulnerabilities between SCADA system and SUC due to interdependencies. Search on Bibsonomy Reliab. Eng. Syst. Saf. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Niv Goldenberg, Avishai Wool Accurate modeling of Modbus/TCP for intrusion detection in SCADA systems. Search on Bibsonomy Int. J. Crit. Infrastructure Prot. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Jeffrey L. Hieb, Jacob Schreiver, James H. Graham A security-hardened appliance for implementing authentication and access control in SCADA infrastructures with legacy field devices. Search on Bibsonomy Int. J. Crit. Infrastructure Prot. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Rafael Ramos Regis Barbosa, Ramin Sadre, Aiko Pras Flow whitelisting in SCADA networks. Search on Bibsonomy Int. J. Crit. Infrastructure Prot. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Saurabh Amin, Xavier Litrico, S. Shankar Sastry, Alexandre M. Bayen Cyber Security of Water SCADA Systems - Part II: Attack Detection Using Enhanced Hydrodynamic Models. Search on Bibsonomy IEEE Trans. Control. Syst. Technol. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Saurabh Amin, Xavier Litrico, Shankar Sastry 0001, Alexandre M. Bayen Cyber Security of Water SCADA Systems - Part I: Analysis and Experimentation of Stealthy Deception Attacks. Search on Bibsonomy IEEE Trans. Control. Syst. Technol. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Hussam M. N. Al Hamadi, Chan Yeob Yeun, Mohamed Jamal Zemerly A Novel Security Scheme for the Smart Grid and SCADA Networks. Search on Bibsonomy Wirel. Pers. Commun. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Muhammad Aamir 0001, Javier Poncela, Muhammad Aslam Uqaili, Bhawani Shankar Chowdhry, Nishat Ahmad Khan Optimal Design of Remote Terminal Unit (RTU) for Wireless SCADA System for Energy Management. Search on Bibsonomy Wirel. Pers. Commun. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Meik Schlechtingen, Ilmar Ferreira Santos, Sofiane Achiche Wind turbine condition monitoring based on SCADA data using normal behavior models. Part 1: System description. Search on Bibsonomy Appl. Soft Comput. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Savas Sahin, Yalçin Isler Microcontroller-Based Robotics and SCADA Experiments. Search on Bibsonomy IEEE Trans. Educ. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Thomas Richard McEvoy, Stephen D. Wolthusen Locating subverted processes using random packet comparison in SCADA systems. Search on Bibsonomy Int. J. Crit. Infrastructures The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15John McCarthy 0004, William Mahoney SCADA Threats in the Modern Airport. Search on Bibsonomy Int. J. Cyber Warf. Terror. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Eric Byres The air gap: SCADA's enduring security myth. Search on Bibsonomy Commun. ACM The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Diogo L. F. Nina, João Viana da Fonseca Neto, Ernesto Franklin Marcal Ferreira, Alcione Miranda dos Santos Hybrid Support System for Decision Making Based on MLP-ANN, IED and SCADA for Disturbances Analysis of Electrical Power Distribution Transformers. Search on Bibsonomy UKSim The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Hui Lin 0005, Adam J. Slagell, Zbigniew Kalbarczyk, Peter W. Sauer, Ravishankar K. Iyer Semantic security analysis of SCADA networks to detect malicious control commands in power grids. Search on Bibsonomy SEGS@CCS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Yi Deng 0005, Sandeep K. Shukla A Distributed Real-Time Event Correlation Architecture for SCADA Security. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15R. K. Shyamasundar Security and protection of SCADA: a bigdata algorithmic approach. Search on Bibsonomy SIN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Christophe Feltus, Djamel Khadraoui On designing automatic reaction strategy for critical infrastructure SCADA system. Search on Bibsonomy SIN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Guy Guemkam, Jonathan Blangenois, Christophe Feltus, Djamel Khadraoui Metamodel for reputation based agents system: case study for electrical distribution SCADA design. Search on Bibsonomy SIN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Miao Liu, Changbing Guo, Mancang Yuan The Framework of SCADA System Based on Cloud Computing. Search on Bibsonomy CloudComp The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Justin M. Beaver, Raymond C. Borges-Hink, Mark A. Buckner An Evaluation of Machine Learning Methods to Detect Malicious SCADA Communications. Search on Bibsonomy ICMLA (2) The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Jian Shen 0001, Jin Wang 0001, Yongjun Ren, Jianwei Zhang 0005, Shunfeng Wang Efficient Key Management Scheme for SCADA System. Search on Bibsonomy EMC/HumanCom The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Ondrej Rysavý, Jaroslav Ráb, Miroslav Svéda Improving security in SCADA systems through firewall policy analysis. Search on Bibsonomy FedCSIS The full citation details ... 2013 DBLP  BibTeX  RDF
15Wojciech Tylman SCADA Intrusion Detection Based on Modelling of Allowed Communication Patterns. Search on Bibsonomy DepCoS-RELCOMEX The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Ester Ciancamerla, Michele Minichino, S. Palmieri Modelling SCADA and Corporate Network of a Medium Voltage Power Grid under Cyber Attacks. Search on Bibsonomy SECRYPT The full citation details ... 2013 DBLP  BibTeX  RDF
15Dawei Su, Chunlei Xu, Haibing Zhu, Mingyang Sun, Weijin Zhuang, Yonggang Zhang Design and Realization of Clustering Based Power Grid SCADA System. Search on Bibsonomy Asia International Conference on Modelling and Simulation The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Elena Sitnikova, Ernest Foo, Rayford B. Vaughn The Power of Hands-On Exercises in SCADA Cyber Security Education. Search on Bibsonomy World Conference on Information Security Education The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15John T. Hagen, Barry E. Mullins TCP veto: A novel network attack and its Application to SCADA protocols. Search on Bibsonomy ISGT The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Rong Jiang 0001, Rongxing Lu, Chengzhe Lai, Jun Luo 0011, Xuemin Shen Robust group key management with revocation and collusion resistance for SCADA in smart grid. Search on Bibsonomy GLOBECOM The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Si-Jung Kim, Bong-Han Kim, Sang-Soo Yeo, Do-Eun Cho Network Anomaly Detection for M-Connected SCADA Networks. Search on Bibsonomy BWCCA The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Jules Pagna Disso, Kevin Jones, Steven Bailey A Plausible Solution to SCADA Security Honeypot Systems. Search on Bibsonomy BWCCA The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Gilberto Schneider, Vanessa F. de Lima, Lucas G. Scherer, Robinson F. de Camargo, Claiton M. Franchi SCADA system applied to micro hydropower plant. Search on Bibsonomy IECON The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Naoum Sayegh, Ali Chehab, Imad H. Elhajj, Ayman I. Kayssi Internal security attacks on SCADA systems. Search on Bibsonomy ICCIT The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Djamel Khadraoui, Christophe Feltus Critical Infrastructures Governance Exploring SCADA Cybernetics through Architectured Policy Semantic. Search on Bibsonomy SMC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
Displaying result #701 - #800 of 997 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license