Author:
Carcano Andrea,Fovino Igor Nai,Masera Marcelo,Trombetta Alberto
Publisher
Springer Berlin Heidelberg
Reference14 articles.
1. Dondossola, G., Masera, M., Nai Fovino, I., Szanto, J.: Effects of intentional threats to power substation control systems. International Journal of Critical Infrastructure (IJCIS) 4(1/2) (2008)
2. Nai Fovino, I., Masera, M., Leszczyna, R.: ICT Security Assessment of a Power Plant, a Case Study. In: Proceeding of the Second Annual IFIP Working Group 11.10 International Conference on Critical Infrastructure Protection, George Manson University, Arlington, USA (March 2008)
3. Huitsing, P., Chandia, R., Papa, M., Shenoi, S.: Attack Taxonomies for the Modbus Serial and TCP Protocols. In: Proceeding of the Second Annual IFIP Working Group 11.10 International Conference on Critical Infrastructure Protection, George Manson University, Arlington, USA (March 2008)
4. Creery, A., Byres, E.: Industrial Cybersecurity for power system and SCADA networks. IEE Industry Apllication Magazine (July-August 2007)
5. Chandia, R., Gonzalez, J., Kilpatrick, T., Papa, M., Shenoi, S.: Security Strategies for Scada Networks. In: Proceeding of the First Annual IFIP Working Group 11.10 International Conference on Critical Infrastructure Protection, Dartmouth College, Hanover, New Hampshire, USA, March 19-21 (2007)
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Malware Attacks on SCADA Systems: Assessing Risks and Strengthening Cybersecurity Measures;2023 IEEE 21st Jubilee International Symposium on Intelligent Systems and Informatics (SISY);2023-09-21
2. Cyber–physical vulnerability and resiliency analysis for DER integration: A review, challenges and research needs;Renewable and Sustainable Energy Reviews;2022-10
3. Model Checking for Real-Time Attack Detection in Water Distribution Systems;Informatics and Automation;2022-02-17
4. CPS;Proceedings of the 30th Annual Computer Security Applications Conference;2014-12-08
5. Through the eye of the PLC;Proceedings of the 30th Annual Computer Security Applications Conference;2014-12-08