Читать книгу SCADA Security - Xun Yi - Страница 2

Table of Contents

Оглавление

Cover

Title Page

Copyright Page

FOREWORD

PREFACE

ACRONYMS

CHAPTER 1: Introduction 1.1 Overview 1.2 EXISTING SOLUTIONS 1.3 SIGNIFICANT RESEARCH PROBLEMS 1.4 BOOK FOCUS 1.5 BOOK ORGANIZATION

CHAPTER 2: Background 2.1 SCADA SYSTEMS 2.2 INTRUSION DETECTION SYSTEM (IDS) 2.3 IDS Approaches

CHAPTER 3: SCADA‐Based Security Testbed 3.1 MOTIVATION 3.2 GUIDELINES TO BUILDING A SCADA SECURITY TESTBED 3.3 SCADAVT DETAILS 3.4 SCADAVT APPLICATION 3.5 ATTACK SCENARIOS 3.6 CONCLUSION 3.7 APPENDIX FOR THIS CHAPTER

10  CHAPTER 4: Efficient k‐Nearest Neighbour Approach Based on Various‐Widths Clustering 4.1 INTRODUCTION 4.2 RELATED WORK 4.3 THE NNVWC APPROACH 4.4 EXPERIMENTAL EVALUATION 4.5 CONCLUSION

11  Chapter 5: SCADA Data‐Driven Anomaly Detection 5.1 INTRODUCTION 5.2 SDAD APPROACH 5.3 EXPERIMENTAL SETUP 5.4 RESULTS AND ANALYSIS 5.5 SDAD LIMITATIONS 5.6 CONCLUSION

12  CHAPTER 6: A Global Anomaly Threshold to Unsupervised Detection 6.1 INTRODUCTION 6.2 RELATED WORK 6.3 GATUD APPROACH 6.4 EXPERIMENTAL SETUP 6.5 RESULTS AND DISCUSSION 6.6 CONCLUSION

13  CHAPTER 7: Threshold Password‐Authenticated Secret Sharing Protocols 7.1 MOTIVATION 7.2 EXISTING SOLUTIONS 7.3 DEFINITION OF SECURITY 7.4 TPASS PROTOCOLS 7.5 SECURITY ANALYSIS 7.6 EXPERIMENTS 7.7 CONCLUSION

14  CHAPTER 8: Conclusion SUMMARY FUTURE WORK

15  REFERENCES

16  INDEX

17  Wiley Series on Parallel and Distributed Computing

18  End User License Agreement

SCADA Security

Подняться наверх