See how this article has been cited at scite.ai
scite shows how a scientific paper has been cited by providing the context of the citation, a classification describing whether it supports, mentions, or contrasts the cited claim, and a label indicating in which section the citation was made.
I. AhmedS. ObermeierM. NaedeleG. G. >Richard III 2012 2018 Scada systems: Challenges for forensic investigators’ Computer 45 12 44 51
CA 2015 Data acquisition: Best practices guide Technical report, CA Technologies
K. ChasonS. DinnageA. LeeJ. SearleD. WidgerWright 2014 Guide to vulnerability assessment for electric utility operations systems Technical report, NESCOR (National Electric Sector Cybersecurity Organization Resource
CPNI 2015 Security for industrial control systems - establish response capabilities: A good practice guide Technical report, CPNI
T. CruzJ. BarrigasJ. ProencaA. GrazianoS. PanzieriL. LevP. Simões 2015 Improving network security monitoring for industrial control systems,in ‘14th IFIP/IEEE Int Symposium on Integrated Management IM 2015
M. FabroE. Cornelius 2008 Recommended practice: Recommended practice: Creating cyber forensics plans for control systems Technical report, Department of Homeland Security
T. GreenR. VandenBrink 2012 Analyzing network traffic with basic linux tools Technical report, SANS Institute InfoSec Reading Room
E. Hjelmvik 2011 ‘Intercepting network traffic’ NETRESEC (Network Forensics and Network Security Monitoring) URL ext-link-type="uri" xlink: href="http://www">http://www.netresec.com/?page=Blogmonth =2011-03post=Sniffing- Tutorial-part-1— Intercepting-Network-Traffic
ICS-CERT 2009 Recommended practice: Developing an industrial control systems cybersecurity incident response capability Technical report U.S. Department of Homeland Security
H. JanickeA. NicholsonS. WebberA. Cau 2015 ‘Runtime-monitoring for industrial control systems’ Electronics 4 4 995 1017
v. d. R. M. Knijff 2014 ‘Control systems/scada forensics, what’s the difference? Digital Investigation 11 3 160 174
B. Muir 2015 Encase imager vs. ftk imager > ext-link-type="uri" xlink: href="http://bsmuir.kinja.com/encase-imager-vs-ftk-imager-1677906594">http://bsmuir.kinja.com/encase-imager-vs-ftk-imager-1677906594 Accessed 21st 06 2016
NERC 2013 Request for information north american electric reliability corporation response Technical report, National Institute of Standards and Technology
NIST 2011 Guide to industrial control systems (ics) security Technical report, National Institution of Standards and Technology
D. J. W. QPM 2012 Good practice guide for digital evidence Technical report, ACPO (Association of Chief Police Officers for England, Wales and Northern Ireland)
J. StirlandK. JonesH. JanickeT. Wu 2014 Developing cyber forensics for scada industrial control systems,in ‘Proceedings of the International Conference on Information Security and Cyber Forensics’ SDIWC Digital Library
A. TorresJ. Williams 2014 ‘Incident response: How to fight back’ SANS Institute InfoSec Reading Room
A. WedgburyK. Jones 2015 Automated asset discovery in industrial control systems -exploring the problem,in ‘Proceedings of the 3rd International Symposium for ICS SCADA Cyber Security Research 2015’ EWIC
T. WuJ. F. P. DissoK. JonesA. Campos 2013 Towards a scada forensics architecture,in ‘Proceedings of the 1st International Symposium for ICS & SCADA Cyber Security Research’ 12