See how this article has been cited at scite.ai
scite shows how a scientific paper has been cited by providing the context of the citation, a classification describing whether it supports, mentions, or contrasts the cited claim, and a label indicating in which section the citation was made.
K. D. BettenhausenS. Kowalewski “Cyberphysical systems: Chancen und Nutzen aus Sicht der Automation” VDI/VDE-Gesellschaft Mess-und Automatisierungstechnik 2013
N. FalliereL. O. MurchuE. Chien “W32. stuxnet dossier” White paper, Symantec Corp., Security Response 5 2011
D. U. Case “Analysis of the cyber attack on the ukrainian power grid” Electricity Information Sharing and Analysis Center (E-ISAC) 2016
D. FormbyS. DurbhaR. Beyah “Out of control: Ransomware for industrial control systems” 2017
Electrical Engineering Blog “The top most used plc systems around the world.” http://engineering.electricalequipment.org/electrical-distribution/the-topmost-used-plc-systems-around-the-world.html May 2013
D. Beresford “Exploiting siemens simatic s7 plcs” Black Hat USA 16 2 723 733 2011
A. KleinmannA. Wool “Accurate modeling of the Siemens S7 scada protocol for intrusion detection and digital forensics” Journal of Digital Forensics, Security and Law 9 2 4 2014
R. R. R. BarbosaR. SadreA. Pras “A first look into scada network traffic” 2012 IEEE Network Operations and Management Symposium 518 521 April 2012
T. M. Chen “Stuxnet, the real start of cyber warfare?. [editor’s note]” IEEE Network 24 2 3 November 2010
J. ZhangS. GanX. LiuP. Zhu “Intrusion detection in scada systems by traffic periodicity and telemetry analysis” 2016 IEEE Symposium on Computers and Communication (ISCC) 318 325 IEEE June 2016
R. Al-DalkyO. AbduljaleelK. SalahH. OtrokM. Al-Qutayri “A modbus traffic generator for evaluating the security of scada systems” 2014 9th International Symposium on Communication Systems, Networks Digital Sign (CSNDSP) 809 814 July 2014
A. AlmalawiZ. TariA. FahadI. Khalil “A framework for improving the accuracy of unsupervised intrusion detection for scada systems” 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications 292 301 July 2013
I. GaritanoR. UribeetxeberriaU. Zurutuza “A review of scada anomaly detection systems” Soft Computing Models in Industrial and Environmental Applications, 6th International Conference SOCO 2011 357 366 Springer 2011
M. MantereM. SailioS. Noponen “Network traffic features for anomaly detection in specific industrial control system network” Future Internet 5 4 460 473 2013
Y. PengC. XiangH. GaoD. ChenW. Ren Industrial Control System Fingerprinting and Anomaly Detection 73 85 Cham Springer International Publishing 2015
S. CheungB. DutertreM. FongU. LindqvistK. SkinnerA. Valdes “Using modelbased intrusion detection for scada networks” Proceedings of the SCADA Security Scientific Symposium Miami Beach, Florida Jan. 2007
S. JeonJ.-H. YunS. ChoiW.-N. Kim “Passive Fingerprinting of SCADA in Critical Infrastructure Network without Deep Packet Inspection” ArXiv e-prints Aug. 2016
O. EignerP. KreimelP. Tavolato “Detection of man-in-the-middle attacks on industrial control networks” 2016 International Conference on Software Security and Assurance (ICSSA) 64 69 Aug 2016
P. KreimelO. EignerP. Tavolato “Anomaly-based detection and classification of attacks in cyber-physical systems” Proceedings of the 12th International Conference on Availability, Reliability and Security, ARES ’17 New York, NY, USA 40:1 40:6 ACM 2017