Most Supervisory Control and Data Acquisition (SCADA) systems have been in operation for decades and they in general have 24x7 availability requirement, hence upgrading or adding ...
The increased complexity of today's distributed, composite, Web-based systems presents difficult and unique systems management problems. The way these systems interact, and th...
Jeffery Li, Patrick Martin, Wendy Powley, Kirk Wil...
We address the dependence of critical infrastructures— including electric power, telecommunications, finance and transportation—on vulnerable information systems. Our approach...
Kevin J. Sullivan, John C. Knight, Xing Du, Steve ...
The premise of automated alert correlation is to accept that false alerts from a low level intrusion detection system are inevitable and use attack models to explain the output in ...
Efforts toward automated detection and identification of multistep cyber attack scenarios would benefit significantly from a methodology and language for modeling such scenario...