Software vulnerability design and approaches for securing SCADA control systems

被引:0
|
作者
Cagalaban, Giovanni [1 ]
Song, Jae-Gu [1 ]
Jung, Sungmo [1 ]
Kim, Seok Soo [1 ]
机构
[1] Department of Multimedia Engineering, Hannam University, Korea, Republic of
来源
International Journal of Smart Home | 2009年 / 3卷 / 01期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:49 / 56
相关论文
共 50 条
  • [21] Cyber Threats and Defence Approaches in SCADA systems
    Kang, Dong-Ho
    Kim, Byoung-Koo
    Na, Jung-Chan
    2014 16TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2014, : 324 - 327
  • [22] A comparison of market approaches to software vulnerability disclosure
    Boehme, Rainer
    EMERGING TRENDS IN INFORMATION AND COMMUNICATION SECURITY, PROCEEDINGS, 2006, 3995 : 298 - 311
  • [23] Securing Distributed Control of Software Defined Networks
    Othman, Othman M. M.
    Okamura, Koji
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2013, 13 (09): : 5 - 14
  • [24] A Software-Defined Security Approach for Securing Field Zones in Industrial Control Systems
    Yang, Jun
    Zhou, Chunjie
    Tian, Yu-Chu
    Yang, Shuang-Hua
    IEEE ACCESS, 2019, 7 : 87002 - 87016
  • [25] Securing industrial control systems
    Ginter, A., 1600, Access Intelligence (120):
  • [26] Securing a control systems network
    Neilson, Carl
    ASHRAE Journal, 2013, 55 (11)
  • [27] Securing Industrial Control Systems
    Ginter, Andrew
    CHEMICAL ENGINEERING, 2013, 120 (07) : 32 - 37
  • [28] Securing Legacy Control Systems
    Welander, Peter
    CONTROL ENGINEERING, 2009, 56 (07) : 26 - 31
  • [29] Vulnerability assessment of cybersecurity for SCADA systems using attack trees
    Ten, Chee-Wooi
    Liu, Chen-Ching
    Govindarasu, Manimaran
    2007 IEEE POWER ENGINEERING SOCIETY GENERAL MEETING, VOLS 1-10, 2007, : 2527 - +
  • [30] POWERFUL COMPUTERS, SOFTWARE CHANGING PIPELINE SCADA SYSTEMS
    TRUE, WR
    OIL & GAS JOURNAL, 1992, 90 (13) : 39 - 44