1 |
Moon-suk Choi, Chung-hyo Kim, You-seok Lim, Seong-ho Ju, Yong-hun Lim and Kyung-seok, Jeon, "Development of Low Latency Secure Communication Device for Legacy SCADA," Jonornal of The Korea Institute of information Security & Cryptology 23(2), pp.339-346, APR. 2013
과학기술학회마을
DOI
ScienceOn
|
2 |
Jeong-Han Yun, Sung-Ho Jeon, Kyoung-Ho Kim, and Woo-Nyon Kim, "A Burst-based Whitelist Model for DNP3 Communication in the SCADA System", Proceedings, The 7th International Conference on Information Security and Assurance, 2013
|
3 |
Korea Power Exchange, "A study on information security policy of Smart Grid," SEP. 2012
|
4 |
National Cyber Security Center, "Security Guidelines for Electronic Control System," APR. 2010
|
5 |
Young-Jin Kim, Jung-Hyun Lee and Jong-In Lim, "A Study on the Secure Plan of Security in SCADA Systems," Jonornal of The Korea Institute of information Security & Cryptology, 19(6) pp. 145-153, Dec. 2009
과학기술학회마을
|
6 |
Dong-joo Kang, Jong-joo Lee, Young Lee, Im-sop Lee and Huy-kang Kim, "Quantitative Methodology to Assess Cyber Security Risks of SCADA system in Electric Power Industry," Jonornal of The Korea Institute of information Security & Cryptology 23(3) pp.445-457, JUN. 2013
과학기술학회마을
DOI
ScienceOn
|
7 |
Tasik Shon, "EMS-SCADA targeted attacks and countermeasures," Presentation for Smartgrid Security Workshop 2013, May. 2013
|
8 |
Ui-Hyong Kim, Kyong-Shik Kim, Kwang-Hyuk Lim and Eul-Gyu Im, "Study on Possibility of Man-in-the-Middle Attacks in RS-232C Serial Communication of the SCADA Systems for Power Systems" , Journal of Security Engineering, 7(4), pp 295-310, AUG. 2010
|
9 |
Yun Ho Shin, Gwang Hyuk Lim and Eul Gyu Im, "A Research on the Possibility of ARP Spoofing Attack in SCADA System Based on TCP/IP Environment," Jouranl of Information and Security, 9(3), SEP.2009
|
10 |
Moonsu Jang, Gunhee Lee, SinKyu Kim, Byung-gil Min, Woo-nyon Kim and Jungtaek Seo, "Testing Vulnerabilities of DNP3," Journal of Security Engineering, 7(1), Feb. 2010
|
11 |
U.S. Department of Energy, "21 Steps to improve Cyber Security of SCADA Networks," JAN. 2007
|
12 |
IEEE Power & Energy Society, "IEEE Standard for Electric Power Systems Communications-Distributed Network Protocol (DNP3)," OCT.2012
|
13 |
Tracy Amaio, Tien Van, "IEEE 1711-2010 Security For Legacy SCADA Protocols" SEQUI.inc, 2011
|
14 |
Grant Gilchrist, "Secure Authentication for DNP3," IEEE 2008
|
15 |
Shapiro, Bratus, Rogers and Smith, "Critical Infrastructure Protection 3 Chap1 Do it yourself scada vulnerability testing with lzfuzz," 2012
|
16 |
Triangle MicroWorks,Inc, "DNP3 Overview," 2002
|
17 |
Omar Faruk "Testing & Exploring Vulnerabilities of the Applications Implementing DNP3 Protocol" Master Thesis, Stockholm, Sweden, 2008
|
18 |
Korea Power Exchange, "Development of K-EMS," 2009
|