1 |
Dong-hwi Lee, Kyong-ho Choi, "A Study of an Anomalous Event Detection using White-List on Control Networks," Convergence security journal, 12(4), pp. 78-84, Sep. 2012.
|
2 |
Pauline Koh, Hwa-jae Choi, Se-ryoung Kim, Hyuk-min Kwon, Huy-kang Kim, "Intrusion Detection Methodology for SCADA system environment based on traffic self-similarity property," Journal of the Korean Institute of Information Security and Cryptology, 22(2), pp. 267-281, Apr. 2012.
|
3 |
K. Stouffer, J. Falco, and K. Kent, "Guide to supervisory control and data acquisition (SCADA) and industrial control systems security," Recommendations of the National Institute of Standards and Technology, pp. 498-506, Sep. 2006.
|
4 |
D. Yang, A. Usynin, and J. Hines, "Anomaly-based intrusion detection for SCADA systems," 5th International Topical Meeting on Nuclear Plant Instrumentation Controls and Human Machine Interface Technology, Nov. 2006.
|
5 |
R. Ramos, R. Barbosa, and A. Pras, "Intrusion detection in SCADA networks," Mechanisms for Autonomous Management of Networks and Services, LNCS 6155, pp. 163-166, 2010.
|
6 |
A. Carcano, I.N. Fovino, M. Masera, and Alberto Trombetta, "State-based network intrusion detection systems for SCADA protocols: a proof of concept," Critical Information Infrastructures Security, LNCS 6027, pp. 138-150, 2010.
|
7 |
Wan-jib Kim, Huy-kang Kim, Kyung-ho Lee, Heung-youll Youm, "Risk Analysis and Monitoring Model of Urban SCADA Network Infrastructure," Journal of the Korean Institute of Information Security and Cryptology, 21(6), pp. 67-81, Dec. 2011.
|
8 |
Homeland Security, ICS-CERT Year in Review, 2013
|
9 |
NCSC, MSIP, KCC, MOSPA, 2013 White Paper on National Intelligence, pp. 99-102, 2013
|
10 |
NCSC, The security guidelines for SCADA systems in national infrastructure, Apr. 2010
|
11 |
US Department of Commerce, NIST Special Publication 800-82, Guide to Industrial Control Systems(ICS) Security, June 2013
|