See how this article has been cited at scite.ai
scite shows how a scientific paper has been cited by providing the context of the citation, a classification describing whether it supports, mentions, or contrasts the cited claim, and a label indicating in which section the citation was made.
P. Garcia-Teodoro et al 2009 Anomaly-based network intrusion detection: Techniques systems and challenges Computers & Security 28 1 18 28
W. ParkS. Ahn 2016 Performance comparison and detection analysis in Snort and Suricata environment Wireless Personal Communications 1 12
B. CaswellJ. BealeA. Baker 2007 Snort IDS and IPS toolkit New York Syngress
Suricata Suricata user guide ext-link-type="uri" xlink: href="https://redmine.openinfosecfoundation.org/projec">https://redmine.openinfosecfoundation.org/projects/suricata/wiki/Suricata_User_Guide Accessed 17 05 2016
D. Kushner 2013 The real story of Stuxnet IEEE Spectrum 50 48 53
M. J. Assante 2016 Confirmation of a coordinated attack on the Ukrainian power grid > ext-link-type="uri" xlink: href="https://ics.sans.org/blog/2016/01/09/confirmation-of-a-coordinated-attack-on-the-ukrainian-power-grid">https://ics.sans.org/blog/2016/01/09/confirmation-of-a-coordinated-attack-on-the-ukrainian-power-grid 17 05 2016
IEC 2007 Power systems management and associated information exchange - data and communications security IEC Standard 62351
F. Cleveland 2005 IEC TC57 security standards for the power system’s information infrastructure - beyond simple encryption Proc. of the IEEE PES Transmission and Distribution Conference and Exhibition 1079 1087
S. CheungB. DutertreM. FongU. LindqvistK. SkinnerA. Valdes 2007 Using model-based intrusion detection for SCADA networks Proc. of the SCADA Security Scientific Symposium 127 134
B. GengeD. A. RusuP. Haller 2014 A connection pattern-based approach to detect network traffic anomalies in critical infrastructures Proc. of the 7th European Workshop on System Security 1 6
R. C. B. HinkJ. M. BeaverM. A. BucknerT. MorrisU. AdhikariS. Pan 2014 Machine learning for power system disturbance and cyber-attack discrimination Proc. of the 7th International Symposium on Resilient Control Systems 1 8
H. YooT. Shon 2014 Novel approach for detecting network anomalies for substation automation based on IEC 61850 Multimedia Tools and Applications 1 16
A. AlmalawiX. YuZ. TariA. FahadI. Khalil 2014 An unsupervised anomaly-based detection approach for integrity attacks on SCADA systems Computers & Security 46 94 110
U. K. PremaratneJ. SamarabanduT. S. SidhuR. BereshJ. Tan 2010 An intrusion detection system for IEC 61850 automated substations IEEE Transactions on Power Delivery 25 4 2376 2383
M. CaselliE. ZambonF. Kargl 2015 Sequence-aware intrusion detection in industrial control systems Proc. of the 1st ACM Workshop on Cyber-Physical System Security 13 24
J. HongC. LiuM. Govindarasu 2014 Detection of cyber intrusions using network-based messages for substation automation Proc. of the IEEE PES Innovative Smart Grid Technologies Conference 1 5
S. PanT. MorrisU. Adhikari 2015 Developing a hybrid intrusion detection system using data mining for power systems IEEE Transactions on Smart Grid 6 6 3104 3113
Digital Bond, Quickdraw SCADA IDS >https ://www.digitalbond.com/tools/quickdraw/ Accessed 17 05 2016
B. Kang et al 2015 Investigating cyber-physical attacks against IEC 61850 photovoltaic inverter installations Proc. of 20th IEEE International Conference on Emerging Technologies and Factory Automation 1 8
R. E. Mackiewicz 2006 Overview of IEC 61850 and benefits Proc. of IEE Power Systems Conference and Exposition (PSCE) 623 630
R. Bründlinger et al 2015 Lab tests: verifying that smart grid power converters are truly smart IEEE Power and Energy Magazine 13 2 30 42