1 |
A. Mahboob and J. Zubairi, "Intrusion Avoidance for SCADA Security in Industrial Plants", IEEE CTS, 2010
|
2 |
Symantec, Internet Security Threat Report, Trends for 2010, vol. 16, 2011
|
3 |
Symantec, W32.Stuxnet Dossier Version 1.4, 2011
|
4 |
A. Matrosov, E. Rodionov, D. Harley and J. Malcho, Stuxnet Under the Microscope revision 1.31, eset, 2006
|
5 |
K. Stouffer, J. Falco and K. Scarfone, Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security, NIST. Spec. Publ. 800-82, 164pages, 2006
|
6 |
P. Welander, "10 Control System Security Threats," Control Engineering, 2007.
|
7 |
B. Schneier, "Attack Trees", Dr. Dobb's Journal, 24(12):21-29, 1999
|
8 |
J.Wang, R-W. Phan, J. Whitley and D. Parish, "Unified Parametrizable Attack Tree", International Journal for ISR, vol. 1, 2011
|
9 |
J.Wang, R-W. Phan, J. Whitley and D. Parish, "Augmented Attack Tree Modeling of Distributed Denial of Services and Tree Based Attack Detection Method", In Proceedings of IEEE 10th International Conference on CIT, 2010
|
10 |
E. Byres, "The Use of Attack Trees in Assessing Vulnerabilities in SCADA Systems", International Infrastructure Suvivability Workshop, Lisbon, 2004
|
11 |
P. Khand, "System Level Security Modeling Using Attack Trees", Proceedings of the 2nd International Conference on Computer Control and Communication, 2009
|
12 |
Symantec, State of Security Survey, 2011
|