4.1 Article

Cybersecurity for Critical Infrastructures: Attack and Defense Modeling

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Engineering, Electrical & Electronic

Vulnerability Assessment of Cybersecurity for SCADA Systems

Chee-Wooi Ten et al.

IEEE TRANSACTIONS ON POWER SYSTEMS (2008)

Article Computer Science, Cybernetics

A formal virtual enterprise access control model

Tsung-Yi Chen et al.

IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART A-SYSTEMS AND HUMANS (2008)

Article Engineering, Electrical & Electronic

Modelling and simulation for performance evaluation of IEC61850-Based substation communication systems

Tarlochan S. Sidhu et al.

IEEE TRANSACTIONS ON POWER DELIVERY (2007)

Article Engineering, Electrical & Electronic

Context information-based cyber security defense of protection system

Su Sheng et al.

IEEE TRANSACTIONS ON POWER DELIVERY (2007)

Article Engineering, Electrical & Electronic

Application of sensor network for secure electric energy infrastructure

Ramon A. Leon et al.

IEEE TRANSACTIONS ON POWER DELIVERY (2007)

Article Computer Science, Cybernetics

Covariance-matrix modeling and detecting various flooding attacks

Daniel S. Yeung et al.

IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART A-SYSTEMS AND HUMANS (2007)

Article Computer Science, Cybernetics

Automatically detecting criminal identity deception: An adaptive detection algorithm

G. Alan Wang et al.

IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART A-SYSTEMS AND HUMANS (2006)

Article Computer Science, Cybernetics

Palm line extraction and matching for personal authentication

Xiangqian Wu et al.

IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART A-SYSTEMS AND HUMANS (2006)

Article Engineering, Electrical & Electronic

Assessment of interactions between power and telecommunications infrastructures

Kevin Schneider et al.

IEEE TRANSACTIONS ON POWER SYSTEMS (2006)

Article Engineering, Electrical & Electronic

Power system control centers: Past, present, and future

FF Wu et al.

PROCEEDINGS OF THE IEEE (2005)

Article Computer Science, Information Systems

Trends in process control systems security

A Miller

IEEE SECURITY & PRIVACY (2005)

Article Automation & Control Systems

Security in SCADA systems: How to handle the growing menace to process automation

T Brown

COMPUTING AND CONTROL ENGINEERING (2005)

Article Automation & Control Systems

Denial of service attacks on network-based control systems: Impact and mitigation

Men Long et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2005)

Article Engineering, Electrical & Electronic

Management of information security for an electric power utility -: On security domains and use of ISO/IEC17799 standard

GN Ericsson et al.

IEEE TRANSACTIONS ON POWER DELIVERY (2005)

Article Computer Science, Information Systems

Toward econometric models of the security risk from remote attacks

SE Schechter

IEEE SECURITY & PRIVACY (2005)

Article Computer Science, Hardware & Architecture

Robustness of the Markov-chain model for cyber-attack detection

N Ye et al.

IEEE TRANSACTIONS ON RELIABILITY (2004)

Article Computer Science, Hardware & Architecture

EWMA forecast of normal system activity for computer intrusion detection

N Ye et al.

IEEE TRANSACTIONS ON RELIABILITY (2004)

Article Engineering, Electrical & Electronic

Analysis of electric grid security under terrorist threat

J Salmeron et al.

IEEE TRANSACTIONS ON POWER SYSTEMS (2004)

Article Engineering, Electrical & Electronic

Simulation study of Internet based inter control center data exchange for complete network modeling

CL Su et al.

IEEE TRANSACTIONS ON POWER SYSTEMS (2002)

Article Engineering, Electrical & Electronic

Information architecture for future power systems and its reliability analysis

ZX Xie et al.

IEEE TRANSACTIONS ON POWER SYSTEMS (2002)

Article Automation & Control Systems

Identifying, understanding, and analyzing critical infrastructure interdependencies

SA Rinaldi et al.

IEEE CONTROL SYSTEMS MAGAZINE (2001)

Article Computer Science, Hardware & Architecture

A process control approach to cyber attack detection

N Ye et al.

COMMUNICATIONS OF THE ACM (2001)