X hits on this document

Powerpoint document

Unifying the Conceptual levels of Network Security through use of Patterns. - page 29 / 30

70 views

0 shares

0 downloads

0 comments

29 / 30

References

[Bar04]  K. Barnes, B. Johnson and R Nickelson. “Review of Supervisory Control and Data Acquisition (SCADA) Systems. “ Idaho National Engineering and Environmental Laboratory, Bechtel BWXT, Idaho.

http://www.inl.gov/technicalpublications/Documents/3310858.pdf

[Cla04] Practical Modern SCADA Protocols: DNP3, 60870.5 and Related Systems GR Clarke, D Reynders - 2004 - books.google.com

[Fer07] Eduardo B. Fernandez. Class Notes COT5930 – Fall 2007, Florida Atlantic University.

[Fer05] Eduardo B. Fernandez, Jose Ballesteros, Ana C. Desouza-Doucet, and Maria M.

Larrondo-Petrie. “Security Patterns for Physical Access Control Systems.” Class Notes COT5930 – Fall 2007, Florida Atlantic University.

[Jeo07] Jeon Il Moon, Jung Sub Kim, Jong Bae Kim, Kye Young Lim and Byoung Wook Choi,  “A hardware implementation of distributed network protocol.” Computer Standards & Interfaces, Volume 27, Issue 3, Pages 221-232

[Pat07] S C  Patel and Y Yu, “Analysis of SCADA security Models.” International Management Review. Vol.3 No.2., 2007 Pages 68 – 76.

[Sto06] K. Stouffer, J. Falco, and K. Kent, “Guide to supervisory control and data acquisition (SCADA) and industrial control systems security”, Spec. Pub. 800-82, National Institute of Standards and Technology (NIST),

http://csrc.nist.gov/publications/drafts/800-82/Draft-SP800-82.pdf

               Secure Systems Research GroupFlorida Atlantic University

Document info
Document views70
Page views70
Page last viewedSat Dec 03 16:11:38 UTC 2016
Pages30
Paragraphs286
Words1349

Comments