1 |
GAO-04-628T, 'Critical Infrastructure Protection: Challenges and Efforts to Secure Control Systems. Testimony before the Subcommittee on Technology Information Policy', Intergovernmental Relations and the Census, House Committee on Government Reform, March, 2004
|
2 |
Yongge Wang and Bei-Tseng Chu: sSCADA, 'Securing SCADA Infrastructure Communications', August, 2004
|
3 |
William Stallings, 'Cryptography and Network Security - Principles and Practices', Pearson International Edition, 2006
|
4 |
Stuart A. Boyer, 'SCADA: Supervisory Control and Data Acquisition', 2nd Edition, Instrument Society of America, 1999
|
5 |
Rolf Carlson, 'Sandia SCADA Program: High-Security SCADA LDRD Final Report', Sandia Report, SAND2002-0729, April, 2002
|
6 |
J. Eisenhauer, P. Donnelly, M. Ellis and M. O'Brien, 'Roadmap to Secure Control Systems in the Energy Sector', January, 2006
|
7 |
C.L. Beaver, D.R. Gallup, W.D. NeuMann, and M.D. Torgerson, 'Key Management for SCADA', SAND Report SAND2001-3252, March, 2002
|
8 |
Dacfey Dzung, Mario Crevatin, Security for Industrial Communication Systems, 2005 Proceedings of the IEEE, 2005
|
9 |
Dacfey Dzung, Mario Crevatin, 'Security for Industrial Communication Systems', Proceedings of the IEEE, 2005
|
10 |
Thomas Kropp, 'System Threats and Vulnerabilities - An EMS and SCADA Security System Overview', IEEE Power and Energy Magazine, March, pp.46-50, 2006
|