See how this article has been cited at scite.ai
scite shows how a scientific paper has been cited by providing the context of the citation, a classification describing whether it supports, mentions, or contrasts the cited claim, and a label indicating in which section the citation was made.
Tenable passive vulnerability scanner data sheet 2013 Sept Tenable Network Security White Paper
Optimizing it technology refresh policies 2015 An approach to balancing capital spending, operating efficiency, and risk mitigation Archstone Consulting White Paper Available from http://www.archstoneconsulting. com/services/it-strategyopeations/white-papers/ optimizing-it-technology.jsp
R. C Bodenheim 2014 Mar Impact of the Shodan computer search engine on internet-facing industrial control system devices M.S. thesis, Air Force Institute of Technology Wrightpatterson AFB Oh Graduate School of Engineering and Management
E Byres 2012 July #1 ICS and SCADA security myth: Protection by air gap Tofino Security White Paper
M Choi 2013 Wireless communications for SCADA systems utilizing mobile nodes Int. J. Smart Home 7 5 1 8
C Dumont 2014 Jan NERC (CIP-002) identification of critical cyber assets
B GallowayG Hancke 2013 Introduction to industrial control networks IEEE Commun. Surveys Tuts 15 2 860 880
ICS-CERT 2014 Feb The ICS-CERT year in review 2013. USA Homeland Security ICS-CERT, Tech Rep
G LiuN Neufeld 2009 Nov Management of the LHCB network based on SCADA system CERN The European Organization for Nuclear Research Technical Report
V Mohan 2013 Nov It asset management benefits & best practices SolarWinds Worldwide LLC White Paper
A Nicholson H JanickeA Cau 2014 Safety and security monitoring in ICS/SCADA systems Proceedings of the 2nd International Symposium for ICS & SCADA Cyber Security Research
A Nicholson 2012 SCADA security in the light of cyber-warfare Comput. Secur 31 4 418 436
S. A OlivaB Crowe 2003 Feb Network system and method for automatic discovery of topology using overhead bandwidth
A PaunaK Moulinos 2013 Dec Window of exposure a real problem for SCADA systems? recommendations for Europe on SCADA patching European Union Agency for Network and Information Security (ENISA), Tech Rep
M. R PermannK. C Rohde 2005 Assessment methods for SCADA security Proceedings of 15th Annual Joint ISA POWID/EPRI Controls and Instrumentation Conference
D Peterson 2006 Nov Using the Nessus vulnerability scanner on control systems Digital Bond White Paper
D Peterson 2012 Using cyber security assessment tools on industrial control systems Digital Bond White Paper
A Scott 2012 Apr SCADA security and the data link layer Available from http://blog.cimation.com/ blog/scada-security-and-theosi-data-link-layer
J Stirland 2014 Dec Developing cyber forensics for SCADA industrial control systems Proceedings of the International Conference on Information Security and Cyber Forensics Universiti Sultan Zainal Abidin Kuala Terengganu, Malaysia
Z TrabelsiW El-Hajj 2010 On investigating ARP spoofing security solutions Internet Protocol Technology 5 1/2
C Valladares 2012 Dec 20 critical security controls control 1: Inventory of authorized and unauthorized devices
R van der Knijff 2014 Control systems/SCADA forensics, what’s the difference? Digital Investigation 11 3 160 174 Special Issue: Embedded Forensics
K. C Wiberg 2006 Sept Identifying supervisory control and data acquisition (SCADA) systems on a network via remote reconnaissance M.S. thesis, Naval Postgraduate School Monterey, California
P Williams 2014 June Distinguishing internet-facing ICS devices using PLC programming information M.S. Thesis, USA Air Force Institute of Technology
T Wu 2013 Towards a SCADA forensics architecture Proceedings of the 1st International Symposium for ICS & SCADA Cyber Security Research
F ZhuM MutkaL Ni 2002 Sept Classification of service discovery in pervasive computing environments Michigan State University