Cyber security of critical infrastructures
Tài liệu tham khảo
Eric D. Knapp, Joel Thomas Langill, Industrial network security: Securing critical infrastructure networks for smart grid, SCADA, and other Industrial Control Systems, Syngress, 2014.
Adrian Pauna, K. Moulinos, Matina Lakka, J. May, T. Try-fonas, Can we learn from SCADA security incidents? in: White Paper, European Union Agency for Network and Information Security, Heraklion, Crete, Greece, 2013.
Cook, 2017, An assessment of the application of it security mechanisms to industrial control systems, Int. J. Internet Technol. Secured Trans., 7, 144, 10.1504/IJITST.2017.087163
Mitchell, 2014, A survey of intrusion detection techniques for cyber-physical systems, ACM Comput. Surv., 46, 55, 10.1145/2542049
Naedele, 2007, Addressing IT security for critical control systems
Al-Shaer, 2016, Smart grids and security challenges, 3
Cruz, 2016, A cybersecurity detection framework for supervisory control and data acquisition systems, IEEE Trans. Ind. Inform., 12, 2236, 10.1109/TII.2016.2599841
Mohamed Amine Ferrag, Leandros A. Maglaras, Helge Janicke, Jianmin Jiang, A survey on privacy-preserving schemes for smart grid communications, 2016. ArXiv preprint arXiv:1611.07722.
Grigoris Tzokatziou, Leandros Maglaras, Helge Janicke, Insecure by design: Using human interface devices to exploit SCADA systems, in: 3rd International Symposium for ICS & SCADA Cyber Security Research, 2015.
Eric Byres, P. Eng, I.S.A. Fellow, Using ANSI/ISA-99 standards to improve control system security, White paper, Tofino Security, 2012.
Zhu, 2011, A taxonomy of cyber attacks on SCADA systems, 380
M. Luallen, Breaches on the rise in control systems: A sans survey 2014, 2014.
Sadeghi, 2015, Security and privacy challenges in industrial internet of things, 54
Nicholson, 2012, A taxonomy of technical attribution techniques for cyber attacks, 188
Cruz, 2014, A distributed IDS for industrial control systems, Int. J. Cyber Warfare Terrorism, 4, 1, 10.4018/ijcwt.2014040101
Maglaras, 2016, Combining ensemble methods and social network metrics for improving accuracy of ocsvm on intrusion detection in scada systems, J. Inf. Secur. Appl., 30, 15
McMillan, 2010, Siemens: Stuxnet worm hit industrial systems
Bologna, 2005, The need to improve local self-awareness in CIP/CIIP, 6
Sinha, 2010, Insights from the analysis of the mariposa botnet, 1
Shukla, 2016, Cyber security of cyber physical systems: Cyber threats and defense of critical infrastructures, 30
Evans, 2016, Human behaviour as an aspect of cybersecurity assurance, Secur. Commun. Netw., 9, 4667, 10.1002/sec.1657
Rashid Dr, 2014, Detecting and preventing data exfiltratio
Wood, 2016, A security architectural pattern for risk management of industry control systems within critical national infrastructure, Int. J. Crit. Infrastruct.