Threats in Industrial Control Systems

Author:

Luiijf Eric

Publisher

Springer International Publishing

Reference64 articles.

1. Abrams, M., & Weiss, J. (2008). Malicious control system cyber security attack case study—Maroochy water services Australia. Washington, DC: NIST. Retrieved November 8, 2015, from http://csrc.nist.gov/groups/SMA/fisma/ics/documents/Maroochy-Water-Services-Case-Study_report.pdf .

2. Anderson, R., & Moore, T. (2006). The economics of information security. Science, 314(5799), 610–613. doi: 10.1126/science.1130992 .

3. Averill, B., & Luiijf, E. A. (2010). Canvassing the cyber security landscape: Why Energy companies need to pay attention. Journal on Energy Security, May 18. Retrieved November 8, 2015, from http://www.ensec.org/index.php?view=article&id=243%3Acanvassing-the-cyber-security-landscapewhy-energy-companies-need-to-pay-attention .

4. National Transportation Safety Board. (2010). Collision of two Washington metropolitan area transit authority metrorail trains near Fort Totten station, Washington, D.C., June 22, 2009. Washington, DC: NTSB. Retrieved November 8, 2015, from http://www.ntsb.gov/investigations/AccidentReports/Reports/RAR1002.pdf .

5. BSI. (2014). Requirements for network-connected industrial components v1.1.. Bad Godesberg, Germany: BSI. Retrieved November 8, 2015, from https://www.allianz-fuer-cybersicherheit.de/ACS/DE/_downloads/techniker/hardware/BSI-CS_067E.pdf .

Cited by 7 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Cyber threat intelligence for critical infrastructure security;Concurrency and Computation: Practice and Experience;2023-04-26

2. Usage Control for Industrial Control System;Collaborative Approaches for Cyber Security in Cyber-Physical Systems;2023

3. AICrit: A unified framework for real-time anomaly detection in water treatment plants;Journal of Information Security and Applications;2022-02

4. An Encryption Algorithm for Long-Distance Data Transmission in the Internet of Things Based on Channel Nonlinear Transformation;2021 Fifth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC);2021-11-11

5. Analyzing the Cyber Risk in Critical Infrastructures;Issues on Risk Analysis for Critical Infrastructure Protection [Working Title];2021-01-12

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3