박사

Integrated Security Framework for Industrial IoT-based Control System

이석철 2018년
논문상세정보
' Integrated Security Framework for Industrial IoT-based Control System' 의 주제별 논문영향력
논문영향력 선정 방법
논문영향력 요약
주제
  • Assessment
  • Control System
  • Industrial IoT
  • framework
  • security
동일주제 총논문수 논문피인용 총횟수 주제별 논문영향력의 평균
1,192 0

0.0%

' Integrated Security Framework for Industrial IoT-based Control System' 의 참고문헌

  • iSEEk, https://www.iseek.com/
  • Z-map, https://zmap.io/
  • X. Liang and Y. Xiao, "Game Theory for Network Security," in IEEE Communications Surveys & Tutorials, vol. 15, no. 1, pp. 472-486, First Quarter 2013.
  • X. Ji, H. Yu, G. Fan and W. Fu, "Attack-defense trees based cyber security analysis for CPSs," 2016 17th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), Shanghai, May. 2016.
  • Whos Talkin, https://thenextweb.com/apps/2010/03/09/whos-talkin-takes-socialmedia-search-level/
  • W. Wang and Z. Lu, “Cyber security in the smart grid: Survey and challenges,” Computer Networks, vol. 57, no. 5, pp 1344-1371, April 2013.
  • W. He, et al, "A Game Theoretical Attack-Defense Model Oriented to Network Security Risk Assessment", International Conference on Computer Science and Software Engineering, 2008.
  • US Department of the Army, “Open-Source Intelligence,” July 2012.
  • UK NPIA, "Guidance on The Management of Police Information 2nd Ed.," 2010.
  • Telecommunications Technology Association (TTA), "Security Requirements for Industrial Control System - Part 1: Concepts and Reference Model", Mar. 2017.
  • Social Mention, http://www.socialmention.com/
  • Smartgridgrid Standardization Forum, "Requirements for Ensuring the Security of Smartgrid Standards," Dec. 2014.
  • Shodan, https://www.shodan.io/
  • Seokcheol Lee, Sungjin Kim, Ken Choi, Taeshik Shon, Game theory-based Security Vulnerability Quantification for Social Internet of Things, Future Generation Computer Systems, Volume 82, 2018, Pages 752-760.
  • SANS, "Secure Architecture for Industrial Control Systems," Sep. 2015.
  • S. Lee, J. Kim, T. Shon, "User privacy-enhanced security architecture for home area network of smartgrid," Multimedia Tools and Applications. vol. 75, no.20, 2016.
  • S. Lee and T. Shon, "Open source intelligence base cyber threat inspection framework for critical infrastructures," 2016 Future Technologies Conference (FTC), pp. 1030-1033, 2016.
  • R. Hewett, S. Rudrapattana and P. Kijsanayothin, "Smart Grid security: Deriving informed decisions from cyber attack game analysis," 2014 IEEE International Conference on Smart Grid Communications (SmartGridComm), Venice, 2014.
  • R. Arai, K. Yamamoto, T. Nishio, and M. Morikura, "Differential game-theoretic framework for a demand-side energy management system," Proc. IEEE SmartGridComm 2013, Vancouver, Canada, Oct. 2013.
  • Ping Wang, Wen-Hui Lin, Pu-Tsun Kuo, Hui-Tang Lin and Tzu Chia Wang, "Threat risk analysis for cloud security based on Attack-Defense Trees," 2012 8th International Conference on Computing Technology and Information Management (NCM and ICNIT), Seoul, 2012, pp. 106-111.
  • Pastebin, https://pastebin.com/
  • Osborne, M. J. and Rubinstein, A, “A Course in Game Theory,” The MIT Press, 1994.
  • National Institute of Standards and Technology, "Framework for Improving Critical Infrastructure Cybersecurity", Feb. 2014.
  • NATO, "NATO Open Source Intelligence Handbook," November 2001.
  • M. Felegyhazi, J.-P. Hubaux, "Game Theory in Wireless Networks: A Tutorial", EPFL Technical Report LCA-REPORT-2006–002, 2006.
  • Jung-kuk Seo et al, "Adapted Attack Tree for Internet Attack Simulation," Proceedings of Symposium of the Korean Institute of communications and Information Sciences, Nov. 2002.
  • Jason D. Christopher, Foward Muneer, et al. "Cybersecurity Capability Maturity Model Facilitator Guide", The Department of Energy, Feb. 2014.
  • Industrial Control Systems Cyber Emergency Response Team, "Recommended Practice: Improving Industrial Control System Cybersecurity with Defense-in-Depth Strategies," Sep. 2016.
  • Industrial Control System Cyber Emergency Response Team, "NCCIC/ICS-CERT Year in Review FY 2016", 2017.
  • IEC TS 62443-1-1, Industrial communication networks - Network and system security - Part 1-1: Terminology, concepts and models, 2009
  • Google, https://www.google.com/search
  • Forum of Incident Response and Security Teams (FIRST), "Common Vulnerability Scoring System v3.0: Specification Document".
  • Edge-Security, "theharvester - The Information Gathering Suite," http://www.edgesecurity.com/theharvester.php.
  • Du S. and Zhu H, "Attack-Defense Tree Based Security Assessment," Security Assessment in Vehicular Net works, Springer New York, Oct. 2013.
  • D. Midi, E. Serra and E. Bertino, "A Game of Things: Strategic Allocation of Security Resources for IoT," 2017 IEEE/ACM Second International Conference on Internet-of- Things Design and Implementation (IoTDI), Pittsburgh, PA, 2017, pp. 185-190.
  • D. Chismon and M. Ruks, “Threat Intelligence: Collecting, Analysing, Evaluating,” March 2015.
  • Common Vulnerability Scoring System (CVSS) v3.0 Calculator, https://www.first.org/cvss/calculator/3.0
  • Common Vulnerability Exposure (CVE), https://cve.mitre.org/
  • Common Vulnerability Exposure (CVE) Database, https://www.cvedetails.com/
  • Censys, https://censys.io/
  • Carrot2, https://project.carrot2.org/
  • CVE-2017-12739, https://www.cvedetails.com/cve/CVE-2017-12739/
  • CVE-2017-12738, https://www.cvedetails.com/cve/CVE-2017-12738/
  • CVE-2017-12737, https://www.cvedetails.com/cve/CVE-2017-12737/
  • CVE-2015-2823, https://www.cvedetails.com/cve/CVE-2015-2823/
  • CVE-2015-2822, https://www.cvedetails.com/cve/CVE-2015-2822/
  • CVE-2015-1601, https://www.cvedetails.com/cve/CVE-2015-1601/
  • CVE-2013-0664, https://www.cvedetails.com/cve/CVE-2013-0664/
  • CVE-2013-0663, https://www.cvedetails.com/cve/CVE-2013-0663/
  • CVE-2012-0931, https://www.cvedetails.com/cve/CVE-2012-0931/
  • CVE-2012-0930, https://www.cvedetails.com/cve/CVE-2012-0930/
  • CVE-2012-0929, https://www.cvedetails.com/cve/CVE-2012-0929/
  • C. W. Ten, C. C. Liu and M. Govindarasu, "Vulnerability Assessment of Cybersecurity for SCADA Systems Using Attack Trees," 2007 IEEE Power Engineering Society General Meeting, Tampa, FL, Feb. 2007.
  • Boehmer W, "Dynamic Systems Approach to Analyzing Event Risks and Behavioral Risk with Game Theory," IEEE Third international conference on Privacy, security, risk and trust and social computing, 2011.
  • B. Schneier, “Attack Trees,” Dr. Dobb’s Journal, 1999.
  • Agence nationale de la s curit des syst mes d'information, “Cybersecurity for Industrial Control System Detailed Measures", Jan. 2014
  • A. Sajid, H. Abbas and K. Saleem, “Cloud-Assisted IoT-Based SCADA Systems Security: A Review of the State of the Art and Future Challenges,” IEEE Access, vol. 4, pp. 1375-1384, April 2016.
  • A. Chhabra, V. Vashishth and D. K. Sharma, "A game theory based secure model against Black hole attacks in Opportunistic Networks," 2017 51st Annual Conference on Information Sciences and Systems (CISS), Baltimore, MD, 2017, pp. 1-6.