Secure VM for monitoring industrial process controllers
Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research
A layer cyber security defense strategy for smart grid programmable logic controllers
Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research
Veracity, plausibility, and reputation
WISTP'12 Proceedings of the 6th IFIP WG 11.2 international conference on Information Security Theory and Practice: security, privacy and trust in computing systems and ambient intelligent ecosystems
Protecting the WSN zones of a critical infrastructure via enhanced SIEM technology
SAFECOMP'12 Proceedings of the 2012 international conference on Computer Safety, Reliability, and Security
Security of interdependent and identical networked control systems
Automatica (Journal of IFAC)
Proceedings of the 14th ACM SIGPLAN/SIGBED conference on Languages, compilers and tools for embedded systems
On the feasibility of online malware detection with performance counters
Proceedings of the 40th Annual International Symposium on Computer Architecture
A Systematic Survey of Self-Protecting Software Systems
ACM Transactions on Autonomous and Adaptive Systems (TAAS) - Special Section on Best Papers from SEAMS 2012
A botnet-based command and control approach relying on swarm intelligence
Journal of Network and Computer Applications
Secure embedded system hardware design - A flexible security and trust enhanced approach
Computers and Electrical Engineering
Hi-index | 0.00 |
Ralph Langner, an expert in industrial control system security, explores the technical side of Stuxnet, dangerous malware that attacks SCADA systems.