SCADA communication and security issues

J Gao, J Liu, B Rajan, R Nori, B Fu… - Security and …, 2014 - Wiley Online Library
Supervisory control and data acquisition (SCADA) systems are widely used to monitor and
control industrial processes. They provide the key functionality of real‐time monitoring …

Achieving accountability in smart grid

J Liu, Y Xiao, J Gao - IEEE Systems Journal, 2013 - ieeexplore.ieee.org
Smart grid is a promising power infrastructure that is integrated with communication and
information technologies. Nevertheless, privacy and security concerns arise simultaneously …

Accountability and Q-Accountable logging in wireless networks

B Fu, Y Xiao - Wireless personal communications, 2014 - Springer
In this paper, we first present a scheme called flow-net, which is designed to record events
and their relations through the collaboration of the nodes in a network. Flow-net can be used …

Networked IDS configuration in heterogeneous networks—A game theory approach

M Ghorbani, MR Hashemi - 2015 23rd Iranian Conference on …, 2015 - ieeexplore.ieee.org
Intrusion Detection Systems (IDSs) are an essential component of any network security
architecture. Their importance is emphasized in today's heterogeneous and complex …

Cipher feedback mode under go‐back‐N and selective‐reject protocols in error channels

X Liang, Y Xiao, S Ozdemir… - Security and …, 2013 - Wiley Online Library
To produce ciphertexts, two modes of encryption are applied—block ciphers, which encrypt
a fixed size block of plaintext at a time, and stream ciphers, which encrypt stream data, one …

Nonintrusive tracing in the Internet

A Olteanu, Y Xiao, J Liu, TM Chen… - Security and …, 2013 - Wiley Online Library
Intruders that log in through a series of machines when conducting an attack are hard to
trace because of the complex architecture of the Internet. The thumbprinting method …

[PDF][PDF] MULTI-LEVEL ACCESS CONTROL SYSTEM FOR INTERNET FINANCIAL TRANSACTIONS

O Afolabi Olaitan, O Oluwatope Ayodeji… - European Journal of …, 2016 - idpublications.org
This study developed an improved multi-level access control system for internet financial
transactions. It formulated, simulated and evaluated the performance of the model. This was …

A Stochastic Modelling Approach for the Performance Analysis of an Intrusion Detection System

E Kamalanaban, R Seshadri - … of the International Conference on Soft …, 2016 - Springer
In this paper, an architecture of an intrusion detection system (IDS) based on a two-server
queueing model is considered and studied. By using an integral equation approach, an …

[引用][C] Framework for choosing best intrusion detection and prevention system for an organization

BM Beigh, MA Peer - UACEE Internal Journal of Advances in Ccomputer …, 2013