Aerospace and Electronic Systems Magazine May 2017 - 43

Do et al.
[27]

[28]
[29]

[30]
[31]
[32]
[33]

[34]

[35]

[36]

[37]

[38]

[39]

[40]

[41]

[42]

[43]
[44]

MAY 2017

Klempous, R., Łysakowska, B., and Nikodem, J. Supervisory control
and data acquisition system for the gas flow networks. In Proceedings of the Computer Aided Systems Theory-EUROCAST'95, 1996,
530-538.
Smyth, E. H., and Totalflow, A. SCADA and telemetry in gas transmission systems. ABB White Paper, 2007.
Do, V. L. Sequential detection and isolation of cyber-physical attacks
on SCADA systems. Ph.D. dissertation, University of Technology of
Troyes, France, 2015.
Byres, E. J., and Eng, P. Cyber security and the pipeline control system. Pipeline & Gas Journal, 236, 2 (2009).
Walk, T. Cyber-attack protection for pipeline SCADA systems. Pipelines International Digest, 2012.
Reed, T. At the Abyss: An Insider's History of the Cold War. Random
House, 2007.
Miller, B., and Rowe, D. A survey SCADA of and critical infrastructure incidents. In Proceedings of the 1st Annual Conference on Research in Information Technology, ACM, 2012, 51-56.
Amin, S., Litrico, X., Sastry, S. S., and Bayen, A. M. Stealthy deception attacks on water SCADA systems. In Proceedings of the 13th
ACM International Conference on Hybrid Systems: Computation and
Control, 2010, 161-170.
Amin, S., Litrico, X., Sastry, S. S., and Bayen, A. M. Cyber security of water SCADA systems-part I: analysis and experimentation
of stealthy deception attacks. IEEE Transactions on Control Systems
Technology, Vol. 21, 5 (2013), 1963-1970.
Amin, S., Litrico, X., Sastry, S. S., and Bayen, A. M. Cyber security
of water SCADA systems-part II: attack detection using enhanced
hydrodynamic models. IEEE Transactions on Control Systems Technology, Vol. 21, 5 (2013), 1679-1693.
Papa, S., Casper, W., and Nair, S. A transfer function based intrusion
detection system for SCADA systems. In Proceedings of the IEEE Conference on Technologies for Homeland Security (HST), 2012, 93-98.
Do. V. L., Fillatre, L., and Nikiforov, I. A statistical method for detecting cyber/physical attacks on SCADA systems. In Proceedings of
the IEEE Conference on Control Applications (CCA), 2014, 364-369.
Do. V. L., Fillatre, L., and Nikiforov, I. Sequential monitoring of SCADA systems against cyber/physical attacks. In Proceedings of the 9th
IFAC Symposium on Fault Detection, Supervision and Safety for Technical Processes (SAFEPROCESS 2015), Paris, France, Sept. 2015.
Do. V. L., Fillatre, L., and Nikiforov, I. Sensitivity analysis of the sequential test for detecting cyber-physical attacks. In Proceedings of
the 23rd European Signal Processing Conference (EUSIPCO 2015),
Nice, France, Sept. 2015.
Cardenas, A., Amin, S., Sinopoli, B., Giani, A., Perrig, A., and Sastry,
S. Challenges for securing cyber physical systems. In Proceedings of
the Workshop on Future Directions in Cyber-Physical Systems Security, DHS, 2009.
Tsang, R. Cyberthreats, vulnerabilities and attacks on SCADA networks. Working Paper, University of California, Berkeley, http://gspp.
berkeley.edu/iths/Tsang_SCADA%20Attacks.pdf 2010, las access
Dec. 28, 2011.
Slay, J., and Miller, M. Lessons learned from the maroochy water
breach. Critical Infrastructure Protection, 73-82, 2007.
Poulsen, K. Ex-employee fingered in Texas power company hack,
http://www.wired.com/2009/05/efh/ May 29, 2009.

[45]
[46]
[47]
[48]

[49]

[50]
[51]
[52]

[53]

[54]
[55]

[56]

[57]
[58]

[59]
[60]

[61]
[62]

[63]

[64]

[65]

IEEE A&E SYSTEMS MAGAZINE

Zetter, K. Attack on city water station destroys pump, http://www.wired.
com/threatlevel/2011/11/hackers-destroy-water-pump/ Nov. 2011.
Poulsen, K. Slammer worm crashed Ohio nuke plant network. Security Focus, Vol. 19 (2003).
Falliere, N., Murchu, L., and Chien, E. W32. Stuxnet dossier. White
Paper, Symantec Security Response, 2011.
Bencsáth, B., Pék, G., Buttyán, L., and Félegyházi, M. The cousins
of Stuxnet: Duqu, flame, and gauss. Future Internet, Vol. 4, 4 (2012),
971-1003.
Ratledge, M. Infowar: cyber terrorism in the 21st century can SCADA
systems be successfully defended, or are they our "Achilles heel"?
SANS Institute, InfoSec Reading Room, 2002.
Kushner, D. The real story of Stuxnet, http://spectrum.ieee.org/telecom/security/the-real-story-of-stuxnet Feb. 26, 2013.
Krebs, B. Cyber incident blamed for nuclear power plant shutdown.
Washington Post, Vol. 5 (June 2008), 2008.
Liscouski, B., and Elliot, W. Final report on the Aug. 14, 2003 blackout in the united states and Canada: causes and recommendations. Report to US Department of Energy, Vol. 40, 4 (2004).
Zhu, B., Joseph, A., and Sastry, S. A taxonomy of cyber attacks on
SCADA systems. In Proceedings of the 4th International Conference
on Cyber, Physical and Social Computing Internet of Things (iThings/
CPSCom), 2011, 380-388.
Kabay, M. Attacks on power systems: hackers, malware. Network
World, Sept. 2010.
Gao, W., Morris, T., Reaves, B., and Richey, D. On SCADA control system command and response injection and intrusion detection. In Proceedings of the eCrime Researchers Summit (eCrime), IEEE, 2010, 1-9.
Reaves, B., and Morris, T. Discovery, infiltration, and denial of service in a process control system wireless network. In Proceedings of
the eCrime Researchers Summit (eCrime), IEEE, 2009, 1-9.
Turk, R. Cyber Incidents Involving Control Systems. Idaho National
Engineering and Environmental Laboratory, 2005.
Cárdenas, A., Amin, S., and Sastry, S. Research challenges for the security of control systems. In Proceedings of the 3rd Conference on
Hot Topics in Security, USENIX Association, 2008, 1-6.
Quinn-Judge, P. Cracks in the system. Time Magazine, Jan. 9, 2002.
Rogers, J. D., and Watkins, C. M. Overview of the Taum Sauk pumped
storage power plant upper reservoir failure, Reynolds County, MO. In
Proceedings of the 6th International Conference on Case Histories in
Geotechnical Engineering, Arlington, VA, 2008.
Gorman, S. Electricity grid in us penetrated by spies. Wall Street Journal, Vol. 8 (2009).
Brunner, M., Hofinger, H., Krauss, C., Roblee, C., Schoo, P., and
Todt, S. Infiltrating critical infrastructures with next-generation attacks. Munich: Fraunhofer Institute for Secure Information Technology (SIT), 2010.
Byres, E., Leversage, D., and Kube, N. Security incidents and trends
in SCADA and process industries. Industrial Ethernet Book, Vol. 39,
2 (2007), 12-20.
Rashid, F. Y. Telvent hit by sophisticated cyber-attack, SCADA admin
tool compromised, http://www.securityweek.com/telvent-hit-sophisticated-cyber-attack-SCADA-admin-tool-compromised/ Sept. 26, 2012.
Credeur, M. J. FBI probes Georgia water plant break-in on terror
concern, http://www.bloomberg.com/news/2013-04-30/fbi-probesgeorgia-water-plant-break-in-on-terror-concern.html/ April 30, 2013.

43


http://www.wired.com/threatlevel/2011/11/hackers-destroy-water-pump/ http://www.wired.com/threatlevel/2011/11/hackers-destroy-water-pump/ http://spectrum.ieee.org/telecom/security/the-real-story-of-stuxnet http://spectrum.ieee.org/telecom/security/the-real-story-of-stuxnet http://gspp.berkeley.edu/iths/Tsang_SCADA%20Attacks.pdf http://gspp.berkeley.edu/iths/Tsang_SCADA%20Attacks.pdf http://www.securityweek.com/telvent-hit-sophisticated-cyber-attack-SCADA-admin-tool-compromised/ http://www.securityweek.com/telvent-hit-sophisticated-cyber-attack-SCADA-admin-tool-compromised/ http://www.bloomberg.com/news/2013-04-30/fbi-probes-georgia-water-plant-break-in-on-terror-concern.html/ http://www.bloomberg.com/news/2013-04-30/fbi-probes-georgia-water-plant-break-in-on-terror-concern.html/ http://www.wired.com/2009/05/efh/

Table of Contents for the Digital Edition of Aerospace and Electronic Systems Magazine May 2017

No label
Aerospace and Electronic Systems Magazine May 2017 - No label
Aerospace and Electronic Systems Magazine May 2017 - Cover2
Aerospace and Electronic Systems Magazine May 2017 - 1
Aerospace and Electronic Systems Magazine May 2017 - 2
Aerospace and Electronic Systems Magazine May 2017 - 3
Aerospace and Electronic Systems Magazine May 2017 - 4
Aerospace and Electronic Systems Magazine May 2017 - 5
Aerospace and Electronic Systems Magazine May 2017 - 6
Aerospace and Electronic Systems Magazine May 2017 - 7
Aerospace and Electronic Systems Magazine May 2017 - 8
Aerospace and Electronic Systems Magazine May 2017 - 9
Aerospace and Electronic Systems Magazine May 2017 - 10
Aerospace and Electronic Systems Magazine May 2017 - 11
Aerospace and Electronic Systems Magazine May 2017 - 12
Aerospace and Electronic Systems Magazine May 2017 - 13
Aerospace and Electronic Systems Magazine May 2017 - 14
Aerospace and Electronic Systems Magazine May 2017 - 15
Aerospace and Electronic Systems Magazine May 2017 - 16
Aerospace and Electronic Systems Magazine May 2017 - 17
Aerospace and Electronic Systems Magazine May 2017 - 18
Aerospace and Electronic Systems Magazine May 2017 - 19
Aerospace and Electronic Systems Magazine May 2017 - 20
Aerospace and Electronic Systems Magazine May 2017 - 21
Aerospace and Electronic Systems Magazine May 2017 - 22
Aerospace and Electronic Systems Magazine May 2017 - 23
Aerospace and Electronic Systems Magazine May 2017 - 24
Aerospace and Electronic Systems Magazine May 2017 - 25
Aerospace and Electronic Systems Magazine May 2017 - 26
Aerospace and Electronic Systems Magazine May 2017 - 27
Aerospace and Electronic Systems Magazine May 2017 - 28
Aerospace and Electronic Systems Magazine May 2017 - 29
Aerospace and Electronic Systems Magazine May 2017 - 30
Aerospace and Electronic Systems Magazine May 2017 - 31
Aerospace and Electronic Systems Magazine May 2017 - 32
Aerospace and Electronic Systems Magazine May 2017 - 33
Aerospace and Electronic Systems Magazine May 2017 - 34
Aerospace and Electronic Systems Magazine May 2017 - 35
Aerospace and Electronic Systems Magazine May 2017 - 36
Aerospace and Electronic Systems Magazine May 2017 - 37
Aerospace and Electronic Systems Magazine May 2017 - 38
Aerospace and Electronic Systems Magazine May 2017 - 39
Aerospace and Electronic Systems Magazine May 2017 - 40
Aerospace and Electronic Systems Magazine May 2017 - 41
Aerospace and Electronic Systems Magazine May 2017 - 42
Aerospace and Electronic Systems Magazine May 2017 - 43
Aerospace and Electronic Systems Magazine May 2017 - 44
Aerospace and Electronic Systems Magazine May 2017 - 45
Aerospace and Electronic Systems Magazine May 2017 - 46
Aerospace and Electronic Systems Magazine May 2017 - 47
Aerospace and Electronic Systems Magazine May 2017 - 48
Aerospace and Electronic Systems Magazine May 2017 - 49
Aerospace and Electronic Systems Magazine May 2017 - 50
Aerospace and Electronic Systems Magazine May 2017 - 51
Aerospace and Electronic Systems Magazine May 2017 - 52
Aerospace and Electronic Systems Magazine May 2017 - 53
Aerospace and Electronic Systems Magazine May 2017 - 54
Aerospace and Electronic Systems Magazine May 2017 - 55
Aerospace and Electronic Systems Magazine May 2017 - 56
Aerospace and Electronic Systems Magazine May 2017 - 57
Aerospace and Electronic Systems Magazine May 2017 - 58
Aerospace and Electronic Systems Magazine May 2017 - 59
Aerospace and Electronic Systems Magazine May 2017 - 60
Aerospace and Electronic Systems Magazine May 2017 - 61
Aerospace and Electronic Systems Magazine May 2017 - 62
Aerospace and Electronic Systems Magazine May 2017 - 63
Aerospace and Electronic Systems Magazine May 2017 - 64
Aerospace and Electronic Systems Magazine May 2017 - Cover3
Aerospace and Electronic Systems Magazine May 2017 - Cover4
http://www.brightcopy.net/allen/aesm/34-2s
http://www.brightcopy.net/allen/aesm/34-2
http://www.brightcopy.net/allen/aesm/34-1
http://www.brightcopy.net/allen/aesm/33-12
http://www.brightcopy.net/allen/aesm/33-11
http://www.brightcopy.net/allen/aesm/33-10
http://www.brightcopy.net/allen/aesm/33-09
http://www.brightcopy.net/allen/aesm/33-8
http://www.brightcopy.net/allen/aesm/33-7
http://www.brightcopy.net/allen/aesm/33-5
http://www.brightcopy.net/allen/aesm/33-4
http://www.brightcopy.net/allen/aesm/33-3
http://www.brightcopy.net/allen/aesm/33-2
http://www.brightcopy.net/allen/aesm/33-1
http://www.brightcopy.net/allen/aesm/32-10
http://www.brightcopy.net/allen/aesm/32-12
http://www.brightcopy.net/allen/aesm/32-9
http://www.brightcopy.net/allen/aesm/32-11
http://www.brightcopy.net/allen/aesm/32-8
http://www.brightcopy.net/allen/aesm/32-7s
http://www.brightcopy.net/allen/aesm/32-7
http://www.brightcopy.net/allen/aesm/32-6
http://www.brightcopy.net/allen/aesm/32-5
http://www.brightcopy.net/allen/aesm/32-4
http://www.brightcopy.net/allen/aesm/32-3
http://www.brightcopy.net/allen/aesm/32-2
http://www.brightcopy.net/allen/aesm/32-1
http://www.brightcopy.net/allen/aesm/31-12
http://www.brightcopy.net/allen/aesm/31-11s
http://www.brightcopy.net/allen/aesm/31-11
http://www.brightcopy.net/allen/aesm/31-10
http://www.brightcopy.net/allen/aesm/31-9
http://www.brightcopy.net/allen/aesm/31-8
http://www.brightcopy.net/allen/aesm/31-7
https://www.nxtbookmedia.com