Attacks against process control systems
Top Cited Papers
- 22 March 2011
- conference paper
- conference paper
- Published by Association for Computing Machinery (ACM)
- p. 355-366
- https://doi.org/10.1145/1966913.1966959
Abstract
No abstract availableKeywords
Funding Information
- Division of Computer and Network Systems (0720882 (CSR-EHS: PRET)0931843 (ActionWebs))
- Army Research Office (W911NF-07-2-0019)
- Air Force Office of Scientific Research (FA9550-06-0312)
- National Science Foundation (0720882 (CSR-EHS: PRET)0931843 (ActionWebs))
This publication has 21 references indexed in Scilit:
- Rethinking security properties, threat models, and the design space in sensor networks: A case study in SCADA systemsAd Hoc Networks, 2009
- Lessons Learned from the Maroochy Water BreachPublished by Springer Science and Business Media LLC ,2007
- Cyber security risk assessment for SCADA and DCS networksISA Transactions, 2007
- Security issues in SCADA networksComputers & Security, 2006
- Security of Critical Control Systems Sparks ConcernComputer, 2006
- Fast Detection of Scanning Worm InfectionsLecture Notes in Computer Science, 2004
- Low-Latency Cryptographic Protection for SCADA CommunicationsLecture Notes in Computer Science, 2004
- A survey of industrial model predictive control technologyControl Engineering Practice, 2002
- Detection of stochastic processesIEEE Transactions on Information Theory, 1998
- Model predictive control of a continuous, nonlinear, two-phase reactorJournal of Process Control, 1993