산업 제어시스템 보안관제 모델

논문상세정보
' 산업 제어시스템 보안관제 모델' 의 주제별 논문영향력
논문영향력 선정 방법
논문영향력 요약
주제
  • 전산공학
  • cyberthreats
  • industrialcontrolsystem
  • security
동일주제 총논문수 논문피인용 총횟수 주제별 논문영향력의 평균
1,360 1

0.0%

' 산업 제어시스템 보안관제 모델' 의 참고문헌

  • 빅데이터 기술을 활용한 사이버 위협 예측 분석 모델
    전덕조 한국정보기술학회논문지 12 (05) : 81 ~ 100 [2014]
  • http://www.tofinosecurity.com
  • http://www.cyberoam.com
  • W32.stuxnet dossier Version 1.4, Symantec Security Response White Paper
  • Using Host-Based Antivirus Software on Industrial Control Systems: Integration Guidance and a Test Methodology for Assessing Performance Impacts
    Joe Falco [2006]
  • Tofino endbox documentation
  • To Kill a Centrifuge
  • Strategies to Mitigate Targeted Cyber Intrusions
  • Sophia: Passive, Human-in-the-Loop Situational Awareness of SCADA/ICS network communication
  • Self-configuring deep protocol network whitelisting
  • Quickdraw SCADA IDS
  • On the infeasibility of modeling polymorphic shellcode
    Y. Song Proceedings of the 14th ACM conference on Computer and communications security(CCS '07) : 541 ~ 551 [2007]
  • N-gram against the machine: On the feasibility of the n-gram network analysis for binary protocols, In Proceedings of the 15th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2012)
    D. Hadziosmanovic Lecture Notes in Computer Science 7462 : 354 ~ 373 [2012]
  • Monitoring and Securing SCADA Networks
    [2011]
  • Monitoring Industrial Control Systems to improve operations and security
  • Mo Malware Mo Problems - CUCKOO Sandbox to the Rescue
  • MetaFlows MSS User Guide
  • Magic Quadrant for Security Information and Event Management
    Kelly M. Kavanagh Gartner [2014]
  • HOT KNIVES THROUGH BUTTER
  • Guide to Industrial Control Systems (ICS)Security
  • FailSafe Datasheet
  • Datasheet
  • Cyber Threats to ICS Sustems : You Don’t Have to be a Target to Become a Victim
    [2014]
  • Correlating risk events and process trends
    B. Singer Proceedings of the SCADA security Scientific Symposium(S4) [2010]
  • Continuous Security Monitoring in Industrial Control System Networks through Blueprinting
  • Competition, and Productivity
    J. Manyika McKinsey Global Institute [2011]
  • Application Whitelisting - Extend Your Security Arsenal?
    Mike Baldi ICSJWG 2012 Fall Conference Presentations [2012]