Browse > Article

실시간 분산 제어시스템 보안  

Shin, Incheol (목포대학교 정보보호학과)
Keywords
Citations & Related Records
연도 인용수 순위
  • Reference
1 S. Amin, A. Cardenas, and S. Sastry, "Safe and Secure Networked Control Systems Under Denial-of-Service Attacks," Hybrid Systems: Computation and Control, Lecture Notes in Computer Science. Springer Berlin/Heidelberg, 30, pp. 31-45, April 2009.
2 "The Smart Grid: An Introduction," prepared for the U.S. Department of Energy by Litos Strategic Communication under contract No. DE-AC26-04NT41817, Subtask 560.01.04, http://www.oe.energy.gov/DocumentsandMedia/DOE_SG_Book_Single_Pages.pdf(checked 9/21/2009).
3 IEEE 100, The Authoritative Dictionary of IEEE Standards Terms, Seventh Edition, IEEE, 2000.
4 M. Jamshidi, Large-Scale Systems, Series Volume 9, North-Holland Series in System Science and Engineering, Elsevier Science Publishing, Inc., pp. 103-104, 1983.
5 H. J. Reekie and R. J. McAdam, A Software Architecture Primer, Angophora Press, Sydney, Australia, 2006.
6 "Top 10 Vulnerabilities of Control Systems and their Associated Mitigations-2006," North American Electric Reliability Council, Control Systems Security Working Group, U.S. Department of Energy, National SCADA Test Bed Program, March 16, 2006.
7 K. Stouffer et al., "Guide to Industrial Control Systems (ICS) Security," National Institute of Standards and Technology, U.S. Dept. of Commerce, Special Publication 800-82, Draft, September 2008.
8 Common Cybersecurity Vulnerabilities Observed in Control System Assessments by the INLNSTB Program, INL/EXT-08-13979, Idaho National Laboratory, November 2008.
9 R. Kisner et al., Design Practices for Communications and Workstations in Highly Integrated Control Rooms, NUREG/CR-6991, September 2009.
10 L. Xie et al., "Data Mapping and the Prediction of Common Cause Failure Probability," IEEE Trans. on Reliability 54(2), June 2005.
11 J. C. Cunha et al., "A Study of Failure Models in Feedback Control Systems," The International Conference on Dependable Systems and Networks (DSN), Göteborg, Sweden, 1-4 July 2001.
12 T. Fleury et al., "Towards a Taxonomy of Attacks Against Energy Control Systems," Proceedings of the IFIP International Conference on Critical Infrastructure Protection, March 2008.
13 P. Marti et al., "Jitter Compensation for Real-Time Control Systems," Real-Time Systems Symposium, 2001 (RTSS 2001) Proceedings, 22nd IEEE, Dec. 3-6, 2001.
14 P. Marti et al., "An Integrated Approach to Real-time Distributed Control Systems Over Fieldbuses," pp. 177-182 in 8th IEEE International Conference on Emerging Technologies and Factory Automation, 2001 Proceedings, Vol. 1, 2001.
15 R. Kisner et al., Design Practices for Communications and Workstations in Highly Integrated Control Rooms, NUREG/CR-6991, September 2009.
16 L. Lamport, R. Shostak, and M. Pease, "The Byzantine Generals Problem," ACM Trans. Programming Languages and Systems 4(3), 382-401, July 1982.   DOI
17 J. Eisenhauer, P. Donnelly, M. Ellis, and M. O'Brien, "Roadmap to Secure Control Systems in the Energy Sector," Energetics Incorporated, sponsored by the U.S. Department of Energy and the U.S. Department of Homeland Security, January 2006.
18 U. S. G. A. Office, Critical infrastructure protection: Multiple efforts to secure control systems are under way, but challenges remain, Technical Report GAO-07-1036, Report to Congressional Requesters, 2007.
19 R. J. Turk, Cyber incidents involving control systems, Technical Report INL/EXT-05-00671,Idaho National Laboratory, October 2005.
20 J. Sykes, K. Koellner, W. Premerlani, B. Kasztenny, and M. Adamiak, "Synchrophasors: A primer and practical applications," Power Systems Conference: Advanced Metering, Protection, Control, Communication, and Distributed Resources, 2007. PSC 2007, pp.213-240, March 13-16, 2007.