Advance Defense Modeling for SCADA Systems
Abstract
Keywords
Full Text:
PDFReferences
A.Creery, E.J Byres(2005), ―Industrial Cyber Security for Power System and SCADA System‖, in IEEE PAPER
C.-C. Liu, C.-W. Ten, and G. Manimaran (2007), ―Vulnerability assessment of cyber security for SCADA systems using attack trees,‖ Proc. IEEE Power Eng. Soc. Gen. Meeting, Tampa, pp. 1–8
C.-C. Liu, C.-W. Ten, and G. Manimaran (2008), ―Vulnerability assessment of cyber security for SCADA systems,‖ IEEE Trans. Power Syst., vol. 23, no. 4, pp. 1836–1846.
Chee-WooiTen, Chen-Ching, Liu.Maimaran Govindarasu(2010),‖Cybersecurity for Critical Infrastructures: Attack and Defense Modeling‖, IEEE Trans. Systems, man, and cybernetics—part a: systems and humans, vol. 40.
J. Depoy, J. Phelan, P. Sholander, B. Smith, G. Varna do, and G. Wyss(2005), ―Risk assessment for physical and cyber-attacks on critical infrastructures, ―Proc. IEEE MILCOM, Oct. 17–20, vol. 3, pp. 1961–1969 2
W. L. McGill and B. M. Ayyub(2007), ―The meaning of vulnerability in the context of critical infrastructure protection,‖ in Critical Infrastructure Protection: Elements of Risk. Arlington, VA: School of Laws, George.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.