ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
73
views
4
references
Top references
cited by
10
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
2,459
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Mechanisms for Autonomous Management of Networks and Services
Intrusion Detection in SCADA Networks
other
Author(s):
Rafael Ramos Regis Barbosa
,
Aiko Pras
Publication date
(Print):
2010
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Further versions
open (via free pdf)
oa repository (via OAI-PMH doi match)
oa repository (via OAI-PMH doi match)
oa repository (via OAI-PMH doi match)
oa repository (via OAI-PMH doi match)
Powered by
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
ScienceOpen Research
Most cited references
4
Record
: found
Abstract
: not found
Article
: not found
Security issues in SCADA networks
Ronald D Williams
,
Sean A. Laughter
,
Vinay Igure
(2006)
0
comments
Cited
14
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Lessons Learned from the Maroochy Water Breach
Jill Slay
,
Michael O. Miller
(2007)
0
comments
Cited
6
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Conference Proceedings
: not found
Configurable Middleware-Level Intrusion Detection for Embedded Systems
E. Naess
,
D.A. Frincke
,
A.D. McKinnon
…
(2005)
0
comments
Cited
3
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2010
Pages
: 163-166
DOI:
10.1007/978-3-642-13986-4_23
SO-VID:
847e7f88-bc3b-412a-bc00-842a5e98bf97
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 167
Cybermetrics: User Identification through Network Flow Analysis
pp. 163
Intrusion Detection in SCADA Networks
Similar content
2,459
Monitoring of renewable energy systems by IoT‐aided SCADA system
Authors:
Md Qays
,
Musse Ahmed
,
M. Parvez Mahmud
…
Using high-frequency SCADA data for wind turbine performance monitoring: A sensitivity study
Authors:
Elena González
,
David Infield
,
Bruce Stephen
…
Online wind turbine fault detection through automated SCADA data analysis
Authors:
Y. Patel
,
A Zaher
,
S.D.J. McArthur
…
See all similar
Cited by
9
A survey of intrusion detection techniques for cyber-physical systems
Authors:
Ing-Ray Chen
,
Robert Mitchell
Review of Security Issues in Industrial Networks
Authors:
Luca Durante
,
Manuel Cheminod
,
Adriano Valenzano
Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems
Authors:
Ing-Ray Chen
,
Robert Mitchell
See all cited by