Quantcast
Channel: CPS-VO - IEC standards
Browsing latest articles
Browse All 45 View Live

An Empirical Study of Web Software Trustworthiness Measurement

Xie, X. L., Xue, W. X..  2018.  An Empirical Study of Web Software Trustworthiness Measurement. 2018 2nd IEEE Advanced Information Management,Communicates,Electronic and Automation Control Conference...

View Article



Coverage-Based Heuristics for Selecting Assessment Items from Security...

Rosa, F. De Franco, Jino, M., Bueno, P. Marcos Siqueira, Bonacin, R..  2018.  Coverage-Based Heuristics for Selecting Assessment Items from Security Standards: A Core Set Proposal. 2018 Workshop on...

View Article

Cybersecurity assurance control baselining for smart grid communication systems

Ogundokun, A., Zavarsky, P., Swar, B..  2018.  Cybersecurity assurance control baselining for smart grid communication systems. 2018 14th IEEE International Workshop on Factory Communication Systems...

View Article

Evaluation of Two RFID Traffic Models with Potential in Anomaly Detection

Alkadi, A., Chi, H., Prodanoff, Z. G., Kreidl, P..  2018.  Evaluation of Two RFID Traffic Models with Potential in Anomaly Detection. SoutheastCon 2018. :1–5.

View Article

Stealthy Injection Attacks Against IEC61850's GOOSE Messaging Service

Wright, James G., Wolthusen, Stephen D..  2018.  Stealthy Injection Attacks Against IEC61850's GOOSE Messaging Service. 2018 IEEE PES Innovative Smart Grid Technologies Conference Europe (ISGT-Europe)....

View Article


Developing Battery of Vulnerability Tests for Industrial Control Systems

Fujdiak, Radek, Blazek, Petr, Mlynek, Petr, Misurec, Jiri.  2019.  Developing Battery of Vulnerability Tests for Industrial Control Systems. 2019 10th IFIP International Conference on New Technologies,...

View Article

Information Inconsistencies in Smart Distribution Grids under Different...

Muka, Romina, Haugli, Fredrik Bakkevig, Vefsnmo, Hanne, Heegaard, Poul E..  2019.  Information Inconsistencies in Smart Distribution Grids under Different Failure Causes modelled by Stochastic Activity...

View Article

Risk and avoidance strategy for blocking mechanism of SDN-based security service

Byun, Minjae, Lee, Yongjun, Choi, Jin-Young.  2019.  Risk and avoidance strategy for blocking mechanism of SDN-based security service. 2019 21st International Conference on Advanced Communication...

View Article


The Actual Problems of IT-Security Process Assurance

Livshitz, Ilva I., Lontsikh, Pawel A., Lontsiklr, Natalia P., Karascv, Sergey, Golovina, Elena.  2019.  The Actual Problems of IT-Security Process Assurance. 2019 International Conference "Quality...

View Article


Automated IT Audit of Windows Server Access Control

PONGSRISOMCHAI, Sutthinee, Ngamsuriyaroj, Sudsanguan.  2019.  Automated IT Audit of Windows Server Access Control. 2019 21st International Conference on Advanced Communication Technology (ICACT)....

View Article

Attacking IEC-60870-5-104 SCADA Systems

Radoglou-Grammatikis, Panagiotis, Sarigiannidis, Panagiotis, Giannoulakis, Ioannis, Kafetzakis, Emmanouil, Panaousis, Emmanouil.  2019.  Attacking IEC-60870-5-104 SCADA Systems. 2019 IEEE World...

View Article

ERAMIS: A Reference Architecture-Based Methodology for IoT Systems

Kearney, Paul, Asal, Rasool.  2019.  ERAMIS: A Reference Architecture-Based Methodology for IoT Systems. 2019 IEEE World Congress on Services (SERVICES). 2642-939X:366—367.

View Article

Securing GOOSE: The Return of One-Time Pads

Boakye-Boateng, Kwasi, Lashkari, Arash Habibi.  2019.  Securing GOOSE: The Return of One-Time Pads. 2019 International Carnahan Conference on Security Technology (ICCST). :1—8.

View Article


Research on a General Fast Analysis Algorithm Model for Pd Acoustic Detection...

Si, Wen-Rong, Fu, Chen-Zhao, Gao, Kai, Zhang, Jia-Min, He, Lin, Bao, Hai-Long, Wu, Xin-Ye.  2019.  Research on a General Fast Analysis Algorithm Model for Pd Acoustic Detection System: The Algorithm...

View Article

Privacy and Security of Big Data in AI Systems: A Research and Standards...

Dilmaghani, Saharnaz, Brust, Matthias R., Danoy, Grégoire, Cassagnes, Natalia, Pecero, Johnatan, Bouvry, Pascal.  2019.  Privacy and Security of Big Data in AI Systems: A Research and Standards...

View Article


A Security Reference Architecture for Blockchains

Homoliak, Ivan, Venugopalan, Sarad, Hum, Qingze, Szalachowski, Pawel.  2019.  A Security Reference Architecture for Blockchains. 2019 IEEE International Conference on Blockchain (Blockchain). :390–397.

View Article

Efficient Modeling of HIL Multi-Grid System for Scalability Concurrency in...

Ravikumar, Gelli, Hyder, Burhan, Govindarasu, Manimaran.  2019.  Efficient Modeling of HIL Multi-Grid System for Scalability Concurrency in CPS Security Testbed. 2019 North American Power Symposium...

View Article


A Collaborative Defense for Securing Protective Relay Settings in Electrical...

Nuqui, Reynaldo, Hong, Junho, Kondabathini, Anil, Ishchenko, Dmitry, Coats, David.  2018.  A Collaborative Defense for Securing Protective Relay Settings in Electrical Cyber Physical Systems. 2018...

View Article

Security Development Lifecycle for Cyber-Physical Production Systems

Eckhart, Matthias, Ekelhart, Andreas, Lüder, Arndt, Biffl, Stefan, Weippl, Edgar.  2019.  Security Development Lifecycle for Cyber-Physical Production Systems. IECON 2019 - 45th Annual Conference of...

View Article

A Top Down Approach for Eliciting Systems Security Requirements for a...

Mailloux, L. O., Span, M., Mills, R. F., Young, W..  2019.  A Top Down Approach for Eliciting Systems Security Requirements for a Notional Autonomous Space System. 2019 IEEE International Systems...

View Article

A Symbolic Analysis of ECC-Based Direct Anonymous Attestation

Whitefield, J., Chen, L., Sasse, R., Schneider, S., Treharne, H., Wesemeyer, S..  2019.  A Symbolic Analysis of ECC-Based Direct Anonymous Attestation. 2019 IEEE European Symposium on Security and...

View Article


Adversary Model for Attacks Against IEC 61850 Real-Time Communication Protocols

Nweke, L. O., Weldehawaryat, G. Kahsay, Wolthusen, S. D..  2020.  Adversary Model for Attacks Against IEC 61850 Real-Time Communication Protocols. 2020 16th International Conference on the Design of...

View Article


Cyber-security considerations for domestic-level automated demand-response...

Hastings, John C., Laverty, David M., Jahic, Admir, Morrow, D John, Brogan, Paul.  2020.  Cyber-security considerations for domestic-level automated demand-response systems utilizing public-key...

View Article

Cyber Attacks on Power System Automation and Protection and Impact Analysis

Rajkumar, Vetrivel Subramaniam, Tealane, Marko, \c Stefanov, Alexandru, Presekal, Alfan, Palensky, Peter.  2020.  Cyber Attacks on Power System Automation and Protection and Impact Analysis. 2020 IEEE...

View Article

Communication and Information Security Assessment of a Digital Substation

Claveria, Joevis J., Kalam, Akhtar.  2020.  Communication and Information Security Assessment of a Digital Substation. 2020 Australasian Universities Power Engineering Conference (AUPEC). :1–7.

View Article


Towards a Threat Modeling Approach Addressing Security and Safety in OT...

Hollerer, Siegfried, Kastner, Wolfgang, Sauter, Thilo.  2021.  Towards a Threat Modeling Approach Addressing Security and Safety in OT Environments. 2021 17th IEEE International Conference on Factory...

View Article

Information Security Culture Model. A Case Study

Marchand-Niño, William-Rogelio, Samaniego, Hector Huamán.  2021.  Information Security Culture Model. A Case Study. 2021 XLVII Latin American Computing Conference (CLEI). :1–10.

View Article

Cybersecurity Certification for Agile and Dynamic Software Systems – a...

Lotz, Volkmar.  2020.  Cybersecurity Certification for Agile and Dynamic Software Systems – a Process-Based Approach. 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). :85–88.

View Article

Anomaly Detection of ICS Communication Using Statistical Models

Burgetová, Ivana, Matoušek, Petr, Ryšavý, Ondřej.  2021.  Anomaly Detection of ICS Communication Using Statistical Models. 2021 17th International Conference on Network and Service Management (CNSM)....

View Article



Comparative Analysis of Specialized Standards and Methods on Increasing the...

Stefanova-Stoyanova, Varbinka, Danov, Petko.  2022.  Comparative Analysis of Specialized Standards and Methods on Increasing the Effectiveness and Role of PDCA for Risk Control in Management Systems....

View Article
Browsing latest articles
Browse All 45 View Live




Latest Images