See how this article has been cited at scite.ai
scite shows how a scientific paper has been cited by providing the context of the citation, a classification describing whether it supports, mentions, or contrasts the cited claim, and a label indicating in which section the citation was made.
V. M IgureA. L SeanD. W Ronald 2006 Security issues in SCADA networks Comput. Secur 25 7 498 506
M RobinsonJ KevinJ Helge 2015 Cyber warfare: Issues and challenges Comput. Secur 49 70 94
A Carcano 2008 SCADA malware: A proof of concept Third International Workshop on Critical Information Infrastructure Security Berlin, Germany Springer
W Ashford 2013 Oct 18 US Researchers find 25 security vulnerabilities in SCADA systems ComputerWeekly.com. Available from http://www.computerweekly.com/news/2240207488/ USresearchers-find-25-security-vulnerabilities-inSCADA-systems
A. M LeandrosJ JianminJ. C Tiago 2014 Integrated OCSVM Mechanism for intrusion detection in SCADA systems Electron. Lett 50 25 1935 1936
J. C Tiago 2014 A distributed IDS for industrial control systems Int. J. Cyber Warfare and Terrorism (IJCWT) 4 2 1 22
P. M Gil 2013 RepCIDN: A reputation-based collaborative intrusion detection network to lessen the impact of malicious alarms J. Netw. Syst. 730 Manage, 21 1 128 167
A Crenshaw 2011 Plug and prey: Malicious USB devices Available from http://www.irongeek. com/downloads/Malicious%20USB%20Devices.pdf
H Khurana 2010 Smart-grid security issues IEEE Security & Privacy 8 1 81 85