Detecting Cyber Attacks On Nuclear Power Plants

作者: Julian Rrushi , Roy Campbell

DOI: 10.1007/978-0-387-88523-0_4

关键词: Intrusion detection systemNuclear powerComputer scienceComputer securityNuclear plant

摘要:

参考文章(11)
Ronald L. Krutz, Securing SCADA systems ,(2005)
John F. Meyer, William Harry Sanders, Construction and solution of performability models based on stochastic activity networks University of Michigan. ,(1988)
William H. Sanders, John F. Meyer, Stochastic activity networks: formal definitions and concepts formal methods. pp. 315- 343 ,(2002) , 10.1007/3-540-44667-2_9
John F. Meyer, A. Movaghar, William H. Sanders, Stochastic Activity Networks: Structure, Behavior, and Application International Workshop on Timed Petri Nets. pp. 106- 115 ,(1985)
Brian Randell, Carl E. Landwehr, Luca Simoncini, Dependable Computing for Critical Applications ,(1991)
W.H. Sanders, Integrated frameworks for multi-level and multi-formalism modeling international workshop on petri nets and performance models. pp. 2- 9 ,(1999) , 10.1109/PNPM.1999.796527
J. Pathak, Yong Jiang, V. Honavar, J. McCalley, Condition Data Aggregation with Application to Failure Rate Calculation of Power Transformers hawaii international conference on system sciences. ,vol. 10, pp. 241- ,(2006) , 10.1109/HICSS.2006.93
D.D. Deavours, G. Clark, T. Courtney, D. Daly, S. Derisavi, J.M. Doyle, W.H. Sanders, P.G. Webster, The Mobius framework and its implementation IEEE Transactions on Software Engineering. ,vol. 28, pp. 956- 969 ,(2002) , 10.1109/TSE.2002.1041052
Carlo Bellettini, Julian L. Rrushi, Vulnerability Analysis of SCADA Protocol Binaries through Detection of Memory Access Taintedness information assurance and security. pp. 341- 348 ,(2007) , 10.1109/IAW.2007.381952