See how this article has been cited at scite.ai
scite shows how a scientific paper has been cited by providing the context of the citation, a classification describing whether it supports, mentions, or contrasts the cited claim, and a label indicating in which section the citation was made.
J Beale 2007 Snort: IDS and IPS Toolkit Jay Beale’s open source security series Boston, MA Syngress
R Bodenheim 2014 Evaluation of the ability of the Shodan search engine to identify internet-facing industrial control devices International J. Critical Infrastructure Protection 7 2 11 123
D. I Buza 2014 CryPLH: Protecting smart energy systems from targeted attacks with a PLC honeypot In smart grid security, lecture notes in computer science Berlin, Germany Springer International Publishing Available from http://dx.doi.org/10.1007/978-3-319-10329-7 12
Y DengS Shukla 2013 A distributed real-time event correlation architecture for SCADA security Critical infrastructure protection VII, volume 417 of IFIP advances in information and communication technology Berlin Heidelberg, Germany Springer Available from http://dx.doi.org/10.1007/978-3-642-45330-4 6
H Englert 2014 Neue kommunikationskonzepte für den netzbetrieb - aktuelle entwicklungen in der IEC 61850 Hannover Messe 2014 – Smart Grids Forum Available from https://www.vde.com/de/smart-grid/forum/ beitraege/Documents/2014-04-09-neuekommunikationskonzepte-englert.pdf
S Fries 2014 The value of security protocols on the example of smart grid. Keynote at IARIA – InfoWare 2014 Available from http://www.iaria.org/conferences2014/files INTELLI14/20140625 keynote sec prot sfries.pdf
Modbus.org 2012 Modbus application protocol specification V1.1b3 Available from http://www.modbus.org/docs/Modbus Application Protocol V1 1b3.pdf
T. H MorrisW Gao 2013 Industrial control system cyber attacks Proceedings of the 1st International Symposium for ICS & SCADA Cyber Security Research Available from http://ewic.bcs. org/content/ConWebDoc/51165
M Patton 2014 Uninvited connections: A Study of vulnerable devices on the internet of things (IoT) IEEE Joint Intelligence and Security Informatics Conference (JISIC) 232 235
M Robinson 2013 The SCADA threat landscape Proceedings of the 1st International Symposium for ICS & SCADA Cyber Security Research Available from http://ewic.bcs.org/content/ConWebDoc/51166
C Scott 2014. Designing and implementing a honeypot for a SCADA network Fredericksburg, VA The SANS Institute. Tech Rep
A SerbanescuS ObermeierD Yu 2015 July 20–22 A flexible architecture for industrial control system honeypots SECRYPT 2015– Proceedings of the 12th International Conference on Security and Cryptography Colmar, France [to be published]
S. M Wade 2011 SCADA honeynets: The attractiveness of honeypots as critical infrastructure security tools for the detection and analysis of advanced threats M.S. Thesis, Iowa State University Ames, Iowa Available from http://lib.dr.iastate.edu/ cgi/viewcontent.cgi?article=3130&context=etd
B. M WilamowskiJ. D Irwin 2011 The industrial electronics handbook – industrial communications systems, volume 2 of the industrial electronics handbook 2 ed Boca Raton, FL CRC Press and Taylor & Francis Group
K Wilhoit 2013 The SCADA that didnt cry wolf – whos really attacking your ICS equipment?—Part deux! Black Hat US
Y. G ZengD CoffeyJ Viega 2014 How vulnerable are unprotected machines on the Internet? Passive and Active Measurement, volume 8362 of Lecture Notes in Computer Science Berlin Heidelberg, Germany Springer International Publishing