Classifying resilience approaches for protecting smart grids against cyber threats
Smart grids (SG) draw the attention of cyber attackers due to their vulnerabilities, which are
caused by the usage of heterogeneous communication technologies and their distributed …
caused by the usage of heterogeneous communication technologies and their distributed …
Modbus/DNP3 state-based intrusion detection system
The security of Industrial Critical Infrastructures is become a prominent problem with the
advent of modern ICT technologies used to improve the performances and the features of …
advent of modern ICT technologies used to improve the performances and the features of …
Critical state-based filtering system for securing SCADA network protocols
The security of System Control and Data Acquisition (SCADA) systems is one of the most
pressing subjects in industrial systems, particularly for those installations actively using the …
pressing subjects in industrial systems, particularly for those installations actively using the …
State-based network intrusion detection systems for SCADA protocols: a proof of concept
We present a novel Intrusion Detection System able to detect complex attacks to SCADA
systems. By complex attack, we mean a set of commands (carried in Modbus packets) that …
systems. By complex attack, we mean a set of commands (carried in Modbus packets) that …
Scada malware, a proof of concept
Critical Infrastructures are nowadays exposed to new kind of threats. The cause of such
threats is related to the large number of new vulnerabilities and architectural weaknesses …
threats is related to the large number of new vulnerabilities and architectural weaknesses …
A secure and survivable architecture for SCADA systems
Industrial systems are nowadays exposed to new kinds of malicious threats. The cause of
this is related to the large number of new vulnerabilities and architectural weaknesses …
this is related to the large number of new vulnerabilities and architectural weaknesses …
Approaching secure industrial control systems
R Leszczyna - IET Information Security, 2015 - Wiley Online Library
This study presents a systematic approach to secure industrial control systems based on
establishing a business case followed by the development of a security programme. To …
establishing a business case followed by the development of a security programme. To …
Cyber vulnerability in power systems operation and control
E Bompard, P Cuccia, M Masera, IN Fovino - … Models, Analysis, and …, 2012 - Springer
Introduction Modern power systems are composed of several interacting national systems
synchronously or asynchronously interconnected over large geographic areas, and in the …
synchronously or asynchronously interconnected over large geographic areas, and in the …
Computing the distance between smooth objects in three dimensional space
EG Gilbert, CP Foo - 1989 IEEE International Conference on Robotics …, 1989 - computer.org
Industrial Systems are nowadays exposed to new kinds of malicious threats. The cause of
this is related to the large number of new vulnerabilities and architectural weaknesses …
this is related to the large number of new vulnerabilities and architectural weaknesses …
Modbus/DNP3 state-based filtering system
The security of SCADA systems is one of the most pressing subjects in industrial systems,
especially for those installation actively using the public network in order to provide new …
especially for those installation actively using the public network in order to provide new …