Intrusion detection for resource-constrained embedded control systems in the power grid
- 1 July 2012
- journal article
- Published by Elsevier in International Journal of Critical Infrastructure Protection
- Vol. 5 (2), 74-83
- https://doi.org/10.1016/j.ijcip.2012.02.002
Abstract
No abstract availableKeywords
This publication has 11 references indexed in Scilit:
- Was Stuxnet an Act of War? Decoding a CyberattackIEEE Security & Privacy, 2011
- VM-based security overkillPublished by Association for Computing Machinery (ACM) ,2010
- Security Economics and Critical National InfrastructurePublished by Springer Nature ,2010
- Countering kernel rootkits with lightweight hook protectionPublished by Association for Computing Machinery (ACM) ,2009
- Cumulative Attestation Kernels for Embedded SystemsLecture Notes in Computer Science, 2009
- Guest-Transparent Prevention of Kernel Rootkits with VMM-Based Memory ShadowingLecture Notes in Computer Science, 2008
- Lares: An Architecture for Secure Active Monitoring Using VirtualizationPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2008
- Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstructionPublished by Association for Computing Machinery (ACM) ,2007
- Automated detection of persistent kernel control-flow attacksPublished by Association for Computing Machinery (ACM) ,2007
- Control-flow integrityPublished by Association for Computing Machinery (ACM) ,2005