SEARCH

SEARCH BY CITATION

REFERENCES

  • 1
    Tib N. 04-1, Technical Information Bulletin 04–1, National Communications System, SCADA Systems. October, 2004.
  • 2
    Gaushell D, Block W. SCADA communication techniques and standards. Computer Applications in Power IEEE 2002; 6:4550.
  • 3
    Daneels A, Salter W. What is SCADA? International Conference on Accelerator and Large Experimental Physics Control Systems. 1999.
  • 4
    Xiao Y. Editorial. International Journal of Security and Networks (IJSN) 2012; 7(2):7172.
  • 5
    Neji NB, Bouhoula A. Managing hybrid packet filter's specifications. International Journal of Security and Networks (IJSN) 2012; 7(2):7382.
  • 6
    Baig ZA. Rapid anomaly detection for smart grid infrastructures through hierarchical pattern matching. International Journal of Security and Networks (IJSN) 2012; 7(2):8394.
  • 7
    Boyer S, Robert J, Otrok H, Rousseau C. An adaptive tit-for-tat strategy for IEEE 802.11 CSMA/CA protocol. International Journal of Security and Networks (IJSN) 2012; 7(2):95106.
  • 8
    Butun I, Wang Y, Lee Y, Sankar R. Intrusion prevention with two level user authentication in heterogeneous wireless sensor networks. International Journal of Security and Networks (IJSN) 2012; 7(2):107121.
  • 9
    Kolesnikov V, Lee W. MAC aggregation resilient to DoS attacks. International Journal of Security and Networks (IJSN) 2012; 7(2):122132.
  • 10
    Wong D, Tian X. E-mail protocols with perfect forward secrecy. International Journal of Security and Networks 2012; 7(1):15. DOI:10.1504/IJSN.2012.048491
  • 11
    Vespa LJ, Chakrovorty R, Weng N. Lightweight testbed for evaluating worm containment systems. International Journal of Security and Networks 2012; 7(1):616. DOI:10.1504/IJSN.2012.048478
  • 12
    Kandah F, Singh Y, Zhang W, Wang T. A misleading active routing attack in mobile ad-hoc networks. International Journal of Security and Networks 2012; 7(1):1729. DOI:10.1504/IJSN.2012.048492.
  • 13
    Alsubhi K, Alhazmi Y, Bouabdallah N, Boutaba R. Security configuration management in intrusion detection and prevention systems. International Journal of Security and Networks 2012; 7(1):3039. DOI:10.1504/IJSN.2012.048493
  • 14
    Xiao Z, Xiao Y. PeerReview re-evaluation for accountability in distributed systems or networks. International Journal of Security and Networks 2012; 7(1):4058. DOI:10.1504/IJSN.2012.048494
  • 15
    Al-Salloum ZS. Defensive computer worms: an overview. International Journal of Security and Networks 2012; 7(1):5970. DOI:10.1504/IJSN.2012.048479
  • 16
    Mu Y, Chen L, Chen X, et al. Editorial. International Journal of Security and Networks 2007; 2(3/4):171174.
  • 17
    Tartary C, Tartary H. Efficient multicast stream authentication for the fully adversarial network model. International Journal of Security and Networks 2007; 2(3/4):175191.
  • 18
    Bhaskar R, Herranz J, Laguillaumie F. Aggregate designated verifier signatures and application to secure routing. International Journal of Security and Networks 2007; 2(3/4):192201.
  • 19
    Hsu H, Zhu S, Hurson AR. LIP: a lightweight interlayer protocol for preventing packet injection attacks in mobile ad hoc network. International Journal of Security and Networks 2007; 2(3/4):202215.
  • 20
    Oliveira LB, Wong H, Loureiro AAF, Dahab R. On the design of secure protocols for hierarchical sensor networks. International Journal of Security and Networks 2007; 2(3/4):216227.
  • 21
    Michail HE, Panagiotakopoulos GA, Thanasoulis VN, Kakarountas AP, Goutis CE. Server side hashing core exceeding 3 Gbps of throughput. International Journal of Security and Networks 2007; 2(3/4):228238.
  • 22
    Hoeper K, Gong G. Preventing or utilising key escrow in identity-based schemes employed in mobile ad hoc networks. International Journal of Security and Networks 2007; 2(3/4):239250.
  • 23
    Cheng Z, Chen L. On security proof of McCullagh–Barreto's key agreement protocol and its variants. International Journal of Security and Networks 2007; 2(3/4):251259.
  • 24
    Finnigin KM, Mullins BE, Raines RA, Potoczny HB. Cryptanalysis of an elliptic curve cryptosystem for wireless sensor networks. International Journal of Security and Networks 2007; 2(3/4):260271.
  • 25
    Huang D. Pseudonym-based cryptography for anonymous communications in mobile ad hoc networks. International Journal of Security and Networks 2007; 2(3/4):272283.
  • 26
    Abdalla M, Bresson E, Chevassut O, Moller B, Pointcheval D. Strong password-based authentication in TLS using the three-party group Diffie–Hellman protocol. International Journal of Security and Networks 2007; 2(3/4):284296.
  • 27
    Chen H, Guizani M. Editorial. International Journal of Security and Networks 2007; 2(1/2):12.
  • 28
    Li R, Li J, Chen H. DKMS: distributed hierarchical access control for multimedia networks. International Journal of Security and Networks 2007; 2(1/2):310.
  • 29
    Sakarindr P, Ansari N. Adaptive trust-based anonymous network. International Journal of Security and Networks 2007; 2(1/2):1126.
  • 30
    Malaney RA. Securing Wi-Fi networks with position verification: extended version. International Journal of Security and Networks 2007; 2(1/2):2736.
  • 31
    Sun F, Shayman MA. On pairwise connectivity of wireless multihop networks. International Journal of Security and Networks 2007; 2(1/2):3749.
  • 32
    Erdogan O, Cao P. Hash-AV: fast virus signature scanning by cache-resident filters. International Journal of Security and Networks 2007; 2(1/2):5059.
  • 33
    Rabinovich P, Simon R. Secure message delivery in publish/subscribe networks using overlay multicast. International Journal of Security and Networks 2007; 2(1/2):6070.
  • 34
    Chen Z, Ji C. Optimal worm-scanning method using vulnerable-host distributions. International Journal of Security and Networks 2007; 2(1/2):7180.
  • 35
    Pan J, Cai L, Shen X. Vulnerabilities in distance-indexed IP traceback schemes. International Journal of Security and Networks 2007; 2(1/2):8194.
  • 36
    Korkmaz T, Gong C, Sarac K, Dykes SG. 8 Single packet IP traceback in AS-level partial deployment scenario. International Journal of Security and Networks 2007; 2(1/2):9510.
  • 37
    Ling H, Znati T. End-to-end pairwise key establishment using node disjoint secure paths in wireless sensor networks. International Journal of Security and Networks 2007; 2(1/2):109121.
  • 38
    Artan NS, Chao HJ. Design and analysis of a multipacket signature detection system. International Journal of Security and Networks 2007; 2(1/2):122136.
  • 39
    Zhu Y, Fu X, Bettati R, Zhao W. Analysis of flow-correlation attacks in anonymity network. International Journal of Security and Networks 2007; 2(1/2):137153.
  • 40
    Gu Q, Liu P, Chu C, Zhu S. Defence against packet injection in ad hoc networks. International Journal of Security and Networks 2007; 2(1/2):154169.
  • 41
    Hwu J, Hsu S, Lin Y-B, Chen R. End-to-end security mechanisms for SMS. International Journal of Security and Networks 2006; 1(3/4):177183.
  • 42
    Wang X. The loop fallacy and deterministic serialisation in tracing intrusion connections through stepping stones. International Journal of Security and Networks 2006; 1(3/4):184197.
  • 43
    Jiang Y, Lin C, Shi M, Shen X. A self-encryption authentication protocol for teleconference services. International Journal of Security and Networks 2006; 1(3/4):198205.
  • 44
    Owens SF, Levary RR. An adaptive expert system approach for intrusion detection. International Journal of Security and Networks 2006; 1(3/4):206217.
  • 45
    Chen Y, Susilo W, Mu Y. Convertible identity-based anonymous designated ring signatures. International Journal of Security and Networks 2006; 1(3/4):218225.
  • 46
    Teo J, Tan C, Ng J. Low-power authenticated group key agreement for heterogeneous wireless networks. International Journal of Security and Networks 2006; 1(3/4):226236.
  • 47
    Tan C. A new signature scheme without random oracles. International Journal of Security and Networks 2006; 1(3/4):237242.
  • 48
    Liu Y, Comaniciu C, Man H. Modelling misbehaviour in ad hoc networks: a game theoretic approach for intrusion detection. International Journal of Security and Networks 2006; 1(3/4):243254.
  • 49
    Karyotis V, Papavassiliou S, Grammatikou M, Maglaris V. A novel framework for mobile attack strategy modelling and vulnerability analysis in wireless ad hoc networks. International Journal of Security and Networks 2006; 1(3/4):255265.
  • 50
    Xiao Y, Jia X, Sun B, Du X. Editorial: security issues on sensor networks. International Journal of Security and Networks 2006; 1(3/4):125126.
  • 51
    Wang H, Sheng B, Li Q. Elliptic curve cryptography-based access control. International Journal of Security and Networks 2006; 1(3/4):127137.
  • 52
    Zheng J, Li J, Lee MJ, Anshel M. A lightweight encryption and authentication scheme for wireless sensor networks. International Journal of Security and Networks 2006; 1(3/4):138146.
  • 53
    Al-Karaki JN. Analysis of routing security-energy trade-offs in wireless sensor networks. International Journal of Security and Networks 2006; 1(3/4):147157.
  • 54
    Araz O, Qi H. Load-balanced key establishment methodologies in wireless sensor networks. International Journal of Security and Networks 2006; 1(3/4):158166.
  • 55
    Deng J, Han R, Mishra S. Limiting DoS attacks during multihop data delivery in wireless sensor networks. International Journal of Security and Networks 2006; 1(3/4):167178.
  • 56
    Duong T. “The design of next generation SCADA systems,” in Power Industry Computer Application Conference, 1995. Conference Proceedings, 1995 IEEE. 1995; 431436.
  • 57
    Sciacca SC, Block WR. Advanced SCADA concepts. Computer Applications in Power IEEE 1995; 8:2328.
  • 58
    Medida S, et al. “SCADA-EMS on the Internet,” in Energy Management and Power Delivery, 1998. Proceedings of EMPD '98. International Conference on, 1998. 1998; 2: 656660.
  • 59
    Kwok-Hong M, Holland BL. Migrating electrical power network SCADA systems to TCP/IP and Ethernet networking. Power Engineering Journal 2002; 16:305311.
  • 60
    McClanahan RH. “The benefits of networked SCADA systems utilizing IP-enabled networks,” in Rural Electric Power Conference, 2002. 2002 IEEE. 2002; 7: C5C5.
  • 61
    Ebata Y, et al. “Development of the Intranet-based SCADA (supervisory control and data acquisition system) for power system,” in Power Engineering Society Winter Meeting, 2000. IEEE. 2000; 3: 16561661.
  • 62
    Zecevic G. “Web based interface to SCADA system,” in Power System Technology, 1998. Proceedings. POWERCON '98. International Conference on, 1998. 1998; 2: 12181221.
  • 63
    Zhihao L, Jinshou Y. “The design of SCADA based on industrial Ethernet,” in Intelligent Control and Automation, 2002. Proceedings of the 4th World Congress on, 2002, pp. 2786–2789 vol.4.
  • 64
    Qiu B, Gooi HB. Web-based SCADA display systems (WSDS) for access via Internet. Power Systems, IEEE Transactions on 2000l; 15:681686.
  • 65
    “IEEE Standard for SCADA and automation systems,” IEEE Std C37.1-2007 (revision of IEEE Std C37.1-1994). 2008; c1133.
  • 66
    “IEEE recommended practice for master/remote supervisory control and data acquisition (SCADA) communications,” IEEE Std. 999–1992, p. 0_1, 1993.
  • 67
    IBM Internet security systems. Available: http://www.iss.net/
  • 68
    Bruce AG. Reliability analysis of electric utility SCADA systems. IEEE Transactions on Power Systems 1998; 13(3):844849 Aug.
  • 69
    Creery A, Byres EJ. Industrial cybersecurity for power system and SCADA networks. Paper No. PCIC-2005-34.
  • 70
    Shyh-Jier H, Chih-Chieh L. Application of ATM-based network for an integrated distribution SCADA-GIS system. Power Systems IEEE Transactions on 2002; 17:8086.
  • 71
    Toshida N, et al. Open distributed EMS/SCADA system. Hitachi Review 1998; 47:208213.
  • 72
    Goel A, Mishra R. Remote data acquisition using wireless-SCADA system. International Journal of Engineering (IJE) 2009; 3:58.
  • 73
    Molina F, et al. “Automated meter reading and SCADA application for wireless sensor network,” Ad-Hoc, Mobile, and Wireless Networks. 2003; 223234.
  • 74
    Ozdemir E, Karacor M. Mobile phone based SCADA for industrial automation. ISA Transactions 2006; 45:6775.
  • 75
    Ozimek I, Kandus G. SCADA system using TETRA communication network. Recent advances in computers, computing and communications. 164166.
  • 76
    Beaver C, et al. “Key management for SCADA,” Cryptog. Information Sys. Security Dept., Sandia Nat. Labs, Tech. Rep. SAND2001-3252. 2002.
  • 77
    Wright A, et al. Low-latency cryptographic protection for SCADA communications. 2004; 263277.
  • 78
    Donghyun C, et al. Advanced key-management architecture for secure SCADA communications. Power Delivery IEEE Transactions on 2009; 24:11541163.
  • 79
    Marihart DJ. Communications technology guidelines for EMS/SCADA systems. Power Delivery IEEE Transactions on 2001; 16:181188.
  • 80
    Parniani M, Nasri A. “SCADA based under frequency load shedding integrated with rate of frequency decline,” in Power Engineering Society General Meeting, 2006. IEEE, 2006; 6.
  • 81
    “Trends in security incidents in the SCADA and process industries: a summary – part II” Eric Byres, David Leversage, Nate Kube, Symantec Corporation. 2007.
  • 82
    “SQL slammer worm lessons learned for consideration by the electricity sector,” North American Electric Reliability Council, Princeton NJ, June 20. 2003.
  • 83
    IBM internet security systems white paper, “A Strategic Approach to Protecting SCADA and Process Control Systems”.
  • 84
    C1Working group members of power system relying committee. Cyber Security Issues for Protective Relays, Power Engineering Society general meeting. 2007.
  • 85
    Oman P, Edmund O. S, Frincke D. Concerns about intrusions into remotely accessible substation controllers and SCADA systems. 2000.
  • 86
    IEEE Power Engineering Society. IEEE Standard 1402–2000: IEEE Guide for Electric Power Substation Physical and Electronic Security, IEEE. New York, NY, Apr. 4, 2000.
  • 87
    National Security Telecommunications Advisory Committee Information Assurance Task Force. Electric Power Risk Assessment. March, 1997.
  • 88
    Poulsen K. “Lights out: NIPC unveils plan to monitor cyber attacks on the power grid,” an InfoSec News Article Ported to Security Focus Web Page. May 25, 2000: http://www.securityfocus.com/news/41
  • 89
    McQueen MA, Boyer WF, Flynn MA, Beitel GA. Quantitative cyber risk reduction estimation methodology for a small SCADA control system. International Conference on System Sciences. 2006
  • 90
    NISCC good practice guide, “Firewall Deployment for SCADA and Process Control Networks 1.4” British Columbia Institute of Technology. 2005.
  • 91
    “Trends in security incidents in the SCADA and process industries: a summary – part I” Eric Byres, David Leversage, Nate Kube, Symantec Corporation. 2007.
  • 92
    Marcuse J, et al. Servers in SCADA applications. Industry Applications IEEE Transactions on 1997; 33:12951299.
  • 93
    Gacek D, et al. “Migrating from SCADA to automation,” in Transmission and Distribution Conference and Exposition, 2001 IEEE/PES. 2001; 1: 343348.
  • 94
    Davidson EM, et al. “Applying multi-agent system technology in practice: automated management and analysis of SCADA and digital fault recorder data ,” in Power Engineering Society General Meeting, 2006. IEEE. 2006; 1.
  • 95
    Horng J. SCADA system of DC motor with implementation of fuzzy logic controller on neural network. Advances in Engineering Software 2002; 33:361364.
  • 96
    Ye W, Heidemann J. “Enabling interoperability and extensibility of future SCADA systems,” University Southern California, USC/ISI Technical Report, ISITR-625, 2006.