Theory of Modeling and Simulation
Theory of Modeling and Simulation
Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems
Proceedings of the twentieth ACM symposium on Operating systems principles
SCUBA: Secure Code Update By Attestation in sensor networks
WiSe '06 Proceedings of the 5th ACM workshop on Wireless security
Trust management systems for wireless sensor networks: Best practices
Computer Communications
Development of the PowerCyber SCADA security testbed
Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research
UPBOT: a testbed for cyber-physical systems
CSET'10 Proceedings of the 3rd international conference on Cyber security experimentation and test
Critical infrastructure security curriculum modules
Proceedings of the 2011 Information Security Curriculum Development Conference
NCS security experimentation using DETER
Proceedings of the 1st international conference on High Confidence Networked Systems
Hi-index | 0.00 |
The Supervisory Control and Data Acquisition System (SCADA) monitor and control real-time systems. SCADA systems are the backbone of the critical infrastructure, and any compromise in their security can have grave consequences. Therefore, there is a need to have a SCADA testbed for checking vulnerabilities and validating security solutions. In this paper we develop such a SCADA testbed.