Attacks and accidents: Policy to protect the power grid’s critical computing and communication needs. Senior interdisciplinary honors thesis in international security studies (2004)


Download Links

by John Cieslewicz , John Cieslewicz
Citations:4 - 0 self

Documents Related by Co-Citation

6 Resilient state machine replication – Paulo Sousa, Nuno Ferreira Neves, Nuno Ferreira Neves, Paulo Veríssimo, Paulo Veríssimo - 2005
5 Organization-based access control – A A El Kalam, R Elbaida, P Balbiani, S Benferhat, F Cuppens, Y Deswarte, A Mige, C Saurel, G Trouessin - 2003
7 NISCC good practice guide on firewall deployment for SCADA and process control networks – E Byres, J Karsch, J Carter - 2005
7 Getting a grip on the grid – V Madani, D Novosel - 2005
6 Common vulnerabilities in critical infrastructure control systems – Jason Stamp, John Dillinger, William Young, Jennifer Depoy - 2003
6 Developing a solid SCADA security strategy – J Pollet - 2002
17 Intrusion-Tolerant Middleware: The Road to Automatic Security – P E Veríssimo, N F Neves, C Cachin, J Poritz, D Powell, Y Deswarte, R Stroud, I Welch - 2006
13 Effective fault treatment for improving the dependability of COTS and legacy-based applications – Andrea Bondavalli, Silvano Chiaradonna, Domenico Cotroneo, Luigi Romano - 2004
8 Strategic power infrastructure defense – Hao Li, Gary W. Rosenwald, Juhwan Jung, Chen-ching Liu - 2005
11 Guide to supervisory control and data acquisition (SCADA) and industrial control systems security – Keith Stouffer, Joe Falco, Karen Scarfone, Keith Stouffer, Joe Falco, Karen Scarfone - 2006
13 Using attack injection to discover new vulnerabilities – Nuno Neves, João Antunes, Miguel Correia, Paulo Veríssimo - 2006
8 Security of critical control systems sparks concern – D Geer - 2006
21 Redundancy and Diversity in Security – Bev Littlewood, Lorenzo Strigini - 2004
17 Symantec internet security threat report: Trends for january - june 07 – D Turner - 2007
62 Intrusion-Tolerant Architectures: Concepts and Design – Paulo Esteves Veríssimo, Paulo Esteves Veríssimo, Nuno Ferreira Neves, Nuno Ferreira Neves, Miguel Pupo Correia, Miguel Pupo Correia
30 How resilient are distributed f fault/intrusion-tolerant systems – Paulo Sousa, Nuno Ferreira Neves, Paulo Veríssimo - 2005
37 Travelling through Wormholes: a new look at Distributed Systems Models – P Veríssimo - 2006
13 Terrorist capabilities for cyber-attack – C Wilson - 2006
7 Bruijne, “The enemy within: System complexity and organizational – M van Eeten, E Roe, P Schulman, M de - 2006