1 |
Common Cyber Security Vulnerabilities Observed in Control System Assessments by the INL NSTB Program. Idaho National Laboratory. IdahoFalls, Idaho 83415. November 2008. http://www.inl.gov/scada/publications/d/inl_nstb_ common_vulnerabilities.pdf
|
2 |
Fink, R. Spencer, D., and Wells, R. Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems. Idaho National Laboratory. Idaho Falls, Idaho 83415. September 2006. http://www.inl.gov/scada/publications/d/nstb_lessons_learned_from_cyber_security_assessments.pdf.
|
3 |
Wireless Procurement Language in Support of Advanced Metering Infrastructure Security. Idaho National Laboratory. Idaho Falls, Idaho 83415. August 2009. http://www.inl.gov/scada/publications/d/inl-ext-09-15658_ami_proc_language.pdf.
|
4 |
ESTEC Project. http://www.estec-project.eu/.
|
5 |
Industrial Instrumentation Process Lab. http://www.bcit.ca/appliedresearch/tc/facilities/industrial.shtml.
|
6 |
SCNI ACTION - IPSC - Europa ipsc.jrc.ec.europa.eu/fileadmin/.../JRC54499.pdf.
|
7 |
"2010年度 制御システムの情報セキュリティ動向に関する調査報告書", IPA, 2011. http://www.ipa.go.jp/security/fy22/reports/ics_sec/index.html.
|
8 |
"制御システムセキュリティ検討タスクフォース報告書". 経済産業省, 2012. http://www.meti.go.jp/committee/kenkyukai/shoujo/controlsystem_security/report01.html.
|
9 |
Reaves, B., Morris, T., Discovery, Infiltration, and Denial of Service in a Process Control System Wireless Network. IEEE eCrime Researchers Summit. October 20-21, 2009. Tacoma, WA.
|
10 |
T. Morris, A. Srivastava, B. Reaves, W. Gao, K. Pavurapu, R. Reddi, A control system testbed to validate critical infrastructure protection concepts, International Journal of Critical Infrastructure Protection (IJCIP), Volume 4, Issue 2, August 2011, Pages 88-103.
DOI
ScienceOn
|
11 |
C. Davis, J. Tate, H. Okhravi, C. Grier, T. Overbye, and D. Nicol, "SCADA Cyber Security Testbed Development," in Power Symposium, 2006. NAPS 2006. 38th North American, pp. 483-488, 2006.
|
12 |
Annarita Giani, Gabor Karsai, Tanya Roosta, Aakash Shah, Bruno Sinopoli, and Jon Wiley, "A testbed for secure and robust SCADA systems," in 14th IEEE real-time and embedded technology and applications symposium (RTAS '08) WIP session, 2008.
|
13 |
C. Queiroz, A. Mahmood, Jiankun Hu, Z. Tari, and Xinghuo Yu, "Building a SCADA Security Testbed," in Network and System Security, 2009. NSS '09. Third International Conference on, pp. 357-364, 2009.
|
14 |
I. Fovino, M. Masera, L. Guidi, and G. Carpi, "An experimental platform for assessing SCADA vulnerabilities and countermeasures in power plants," in Human System Interactions (HSI), 2010 3rd Conference on, pp. 679-686, 2010.
|
15 |
A. Hahn et al., "Development of the Power Cyber SCADA security testbed," in Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research - CSIIRW '10, p. 1, 2010.
|
16 |
Rohan Chabukswar, Bruno Sinpoli, Gabor Karsai, Annarita Giani, Himanshu Neema, and Andrew Davis, "Simulation of Network Attacks on SCADA Systems," in First Workshop on Secure Control Systems, 2010.
|
17 |
Bergman, David C., "Power grid simulation, evaluation, and test framework," Master's, University of Illinois, 2010.
|
18 |
Jim Montague, "Simulation Breaks Out," Control Global, pp. 52-61, Sep-2010.
|