THÔNG TIN TÀI LIỆU
Thông tin cơ bản
Định dạng | |
---|---|
Số trang | 87 |
Dung lượng | 2,38 MB |
Nội dung
Ngày đăng: 27/01/2021, 17:23
Nguồn tham khảo
Tài liệu tham khảo | Loại | Chi tiết | ||
---|---|---|---|---|
[4] N. Falliere, L. O. Murchu and E. Chien, “W32.Stuxnet Dossier,” Symantec Report version 1.3, Nov 2010 | Sách, tạp chí |
|
||
[13] Berinato, Scott; “Debunking the Threat to Water Utilities”, CIO Magazine, CXO | Sách, tạp chí |
|
||
[2] J. Slay and M. Miller. Lessons learned from the Maroochy Water Breach. Critical Infrastructure Protection, vol. 253, pp. 73–82, 2008 | Khác | |||
[3] D. Ryu, H. Kim and K. Um. Reducing security vulnerabilities for critical infrastructure. Journal of Loss Prevention in the Process Industries, vol. 22, pp. 1020–1024, 2009 | Khác | |||
[11] V. M. Igure and R. D. Williams. Security and SCADA protocols. 5th International Topical Meeting on Nuclear Plant Instrumentation Controls, and Human Machine Interface Technology (NPIC and HMIT), pp. 560–567,USA, 2006 | Khác | |||
[12] CPNI - PROCESS CONTROL AND SCADA SECURITY - GUIDE 1. UNDERSTAND THE BUSINESS RISK | Khác | |||
[15] GOOD PRACTICE GUIDE - PROCESS CONTROL AND SCADA SECURITY - GUIDE 1. UNDERSTAND THE BUSINESS RISK | Khác | |||
[16] NIST Special Publication 800-82 - Guide to Industrial Control Systems (ICS) Security | Khác | |||
[17] Common Cyber Security Vulnerabilities Observed in Control System Assessments by the INL NSTB Program – Nov 2008 | Khác | |||
[22] G. Dondossola, M. Masera, I. Nai Fovino, J. Szanto: Effects of intentional threats to power substation control systems, International Journal of Critical Infrastructure, (IJCIS), Vol. 4, No. 1/2, 2008 | Khác | |||
[23] I. Nai Fovino, M. Masera, R. Leszczyna: ICT Security Assessment of a Power Plant, a Case Study In Proceeding of the Second Int. Conference on Critical Infrastructure Protection, Arlington, USA, March 2008 | Khác | |||
[24] A. Carcano, I. Nai Fovino, M. Masera, A. Trombetta: Scada Malware, a proof of Concept. In proceeding of the 3rd International Workshop on Critical Information Infrastructures Security, Rome, October 13-15, 2008 | Khác | |||
[25] A. A. Creery, E. J. Byres: Industrial Cybersecurity for power system and SCADA networks IEE Industry Apllication Magazine, July-August 2007 | Khác | |||
[26] R. Chandia, J. Gonzalez, T. Kilpatrick, M. Papa and S. Shenoi: Security Strategies for Scada Networks In Proceeding of the First Int. Conference on Critical Infrastructure Protection, Hanover, NH., USA, March 19 21, 2007 | Khác | |||
[27] M. Majdalawieh, F. Parisi-Presicce, D. Wijesekera: Distributed Network Protocol Security (DNPSec) security framework. In Proceedings of the 21st Annual Computer Security Applications Conference, December 59,2005, Tucson, Arizona | Khác |
TỪ KHÓA LIÊN QUAN
TÀI LIỆU CÙNG NGƯỜI DÙNG
TÀI LIỆU LIÊN QUAN