See how this article has been cited at scite.ai
scite shows how a scientific paper has been cited by providing the context of the citation, a classification describing whether it supports, mentions, or contrasts the cited claim, and a label indicating in which section the citation was made.
M Naedele 2007 Addressing IT security for critical control systems HICSS ’07: Proceedings of the 40th Annual Hawaii International Conference on System Sciences
M Naedele 2005 IT security for automation systems The Industrial Information Technology Handbook R Zurawski Boca Raton, FL CRC Press 1 14
S ObermeierR SchierholzA Hristova 2014 Sept 16–19 Securing industrial automation and control systems using application whitelisting Proceedings of the 2014 IEEE Emerging Technology and Factory Automation (ETFA) A GrauH Martínez Barcelona, Spain 1 4 Available from http://dx.doi.org/10.1109/ETFA.2014.7005242
S Obermeier 2014 Automatic attack surface reduction in next-generation industrial control systems Proceedings of the IEEE Symposium Series on Computational Intelligence (SSCI) Orlando FL, USA
T Sommestad 2014 Variables influencing information security policy compliance: A systematic review of quantitative studies Inform. Manage. Comput. Security 22 1 42 75
D.-Y Yu 2014 Short paper: Detection of GPS spoofing attacks in power grids Proceedings of the 2014 ACM Conference on Security and Privacy in Wireless & Mobile Networks, ACM 99 104
H HolmW. R FloresG Ericsson, 2013 Cyber security for a smart grid-what about phishing? 4th IEEE/PES Innovative Smart Grid Technologies Europe (ISGT Europe) 1 5
D.-J Kang 2009 Analysis on cyber threats to scada systems IEEE Transmission & Distribution Conference & Exposition: Asia and Pacific 1 4
IEC 61850 International Electrotechnical Commission, IEC TC57
V. M IgureS. A LaughterR. D Williams, 2006 Security issues in SCADA networks Comput. Secur 25 7 498 506
M WhitmanH Mattord 2011 Principles of information security 4th ed Boston, MA Cengage Learning