Skip to content
Snippets Groups Projects
Commit 282702b7 authored by mwh1g17's avatar mwh1g17
Browse files

Added Latex files and supporting diagrams

parent d126c74b
No related branches found
No related tags found
No related merge requests found
@misc{ Nobody06,
author = "Nobody Jr",
title = "My Article",
year = "2006" }
@article{robles2009assessment,
title={Assessment of the vulnerabilities of SCADA, control systems and critical infrastructure systems},
author={Robles, Rosslin John and Choi, Min-kyu},
journal={Assessment},
volume={2},
number={2},
pages={27--34},
year={2009},
publisher={Citeseer}
}
@ARTICLE{7445139,
author={A. {Sajid} and H. {Abbas} and K. {Saleem}},
journal={IEEE Access},
title={Cloud-Assisted IoT-Based SCADA Systems Security: A Review of the State of the Art and Future Challenges},
year={2016},
volume={4},
number={},
pages={1375-1384},
keywords={cloud computing;critical infrastructures;cyber-physical systems;fault tolerance;industrial control;Internet;Internet of Things;SCADA systems;security of data;wireless sensor networks;cloud-assisted IoT-based SCADA system security;industrial systems;fault tolerance;cyber physical system integration;CPS integration;Internet of Things;cloud computing services;smart industrial systems;industrial CPS;supervisory control and data acquisition systems;critical infrastructure;WebSCADA;industrial SCADA systems;IoT-cloud environment;future Internet;mobile wireless sensor networks;Cloud computing;Security;SCADA systems;Power system stability;Fault tolerant systems;Wireless sensor networks;Internet of things;Stability analysis;APT;Industrial Control System;Internet of Things (IoT);NIST;PRECYSE;Supervisory Control and Data Acquisition;SOA;APT;industrial control system;Internet of Things (IoT);NIST;PRECYSE;supervisory control and data acquisition system;SOA},
doi={10.1109/ACCESS.2016.2549047},
ISSN={2169-3536},
month={},}
@misc{owasp, title={OWASP Internet of Things Project}, url={https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project}, journal={OWASP}, year={2018}}
@inproceedings{bere2015initial,
title={Initial investigation of industrial control system (ICS) security using artificial immune system (AIS)},
author={Bere, Mercy and Muyingi, Hippolyte},
booktitle={2015 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC)},
pages={79--84},
year={2015},
organization={IEEE}
}
@article{Virvilis2013TrustedCV,
title={Trusted Computing vs. Advanced Persistent Threats: Can a Defender Win This Game?},
author={Nikos Virvilis and Dimitris Gritzalis and Theodoros K. Apostolopoulos},
journal={2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing},
year={2013},
pages={396-403}
}
@inproceedings{Bilge:2012:BWK:2382196.2382284,
author = {Bilge, Leyla and Dumitra\c{s}, Tudor},
title = {Before We Knew It: An Empirical Study of Zero-day Attacks in the Real World},
booktitle = {Proceedings of the 2012 ACM Conference on Computer and Communications Security},
series = {CCS '12},
year = {2012},
isbn = {978-1-4503-1651-4},
location = {Raleigh, North Carolina, USA},
pages = {833--844},
numpages = {12},
url = {http://doi.acm.org/10.1145/2382196.2382284},
doi = {10.1145/2382196.2382284},
acmid = {2382284},
publisher = {ACM},
address = {New York, NY, USA},
keywords = {full disclosure, vulnerabilities, zero-day attacks},
}
@article{wang2012sscada,
title={sSCADA: securing SCADA infrastructure communications},
author={Wang, Yongge},
journal={arXiv preprint arXiv:1207.5434},
year={2012}
}
@Inbook{Adams2005,
author="Adams, Carlisle",
editor="van Tilborg, Henk C. A.",
title="Impersonation Attack",
bookTitle="Encyclopedia of Cryptography and Security",
year="2005",
publisher="Springer US",
address="Boston, MA",
pages="286--286",
isbn="978-0-387-23483-0",
doi="10.1007/0-387-23483-7_196",
url="https://doi.org/10.1007/0-387-23483-7_196"
}
@article{patel2016internet,
title={Internet of things-IOT: definition, characteristics, architecture, enabling technologies, application \& future challenges},
author={Patel, Keyur K and Patel, Sunil M and others},
journal={International journal of engineering science and computing},
volume={6},
number={5},
year={2016}
}
@article{yu2011new,
title={The new frontier of smart grids},
author={Yu, Xinghuo and Cecati, Carlo and Dillon, Tharam and Simoes, M Godoy},
journal={IEEE Industrial Electronics Magazine},
volume={5},
number={3},
pages={49--63},
year={2011},
publisher={IEEE}
}
@misc{kuslitskiy_2019,
title={Smart Grid Features - ANSI Blog}, url={https://blog.ansi.org/2011/11/smart-grid-features/},
journal={The ANSI Blog},
publisher={ANSI},
author={Kuslitskiy, Boris},
year={2019},
month={Jul}}
@inproceedings{mcqueen2006quantitative,
title={Quantitative cyber risk reduction estimation methodology for a small SCADA control system},
author={McQueen, Miles A and Boyer, Wayne F and Flynn, Mark A and Beitel, George A},
booktitle={Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06)},
volume={9},
pages={226--226},
year={2006},
organization={IEEE}
}
@article{yang2017survey,
title={A survey on security and privacy issues in Internet-of-Things},
author={Yang, Yuchen and Wu, Longfei and Yin, Guisheng and Li, Lijie and Zhao, Hongbin},
journal={IEEE Internet of Things Journal},
volume={4},
number={5},
pages={1250--1258},
year={2017},
publisher={IEEE}
}
@techreport{arnold2010nist,
title={NIST Framework and Roadmap for Smart Grid Interoperability Standards, Release 1.0},
author={Arnold, George W and Wollman, David A and FitzPatrick, Gerald J and Prochaska, Dean and Holmberg, David G and Su, David H and Hefner Jr, Allen R and Golmie, Nada T and Brewer, Tanya L and Bello, Mark and others},
year={2010}
}
@inproceedings{cremers2008scyther,
title={The Scyther Tool: Verification, falsification, and analysis of security protocols},
author={Cremers, Cas JF},
booktitle={International Conference on Computer Aided Verification},
pages={414--418},
year={2008},
organization={Springer}
}
@inproceedings{meadows1994formal,
title={Formal verification of cryptographic protocols: A survey},
author={Meadows, Catherine A},
booktitle={International Conference on the Theory and Application of Cryptology},
pages={133--150},
year={1994},
organization={Springer}
}
@article{dalal2010comparative,
title={A comparative analysis of tools for verification of security protocols},
author={Dalal, Nitish and Shah, Jenny and Hisaria, Khushboo and Jinwala, Devesh},
journal={International Journal of Communications, Network and System Sciences},
volume={3},
number={10},
pages={779},
year={2010},
publisher={Scientific Research Publishing}
}
@article{yang2016verifying,
title={Verifying Group Authentication Protocols by Scyther.},
author={Yang, Huihui and Oleshchuk, Vladimir A and Prinz, Andreas}
}
@inproceedings{10.1145/1753326.1753384,
author = {Inglesant, Philip G. and Sasse, M. Angela},
title = {The True Cost of Unusable Password Policies: Password Use in the Wild},
year = {2010},
isbn = {9781605589299},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
url = {https://doi.org/10.1145/1753326.1753384},
doi = {10.1145/1753326.1753384},
booktitle = {Proceedings of the SIGCHI Conference on Human Factors in Computing Systems},
pages = {383–392},
numpages = {10},
keywords = {passwords, usable security, password policy},
location = {Atlanta, Georgia, USA},
series = {CHI ’10}
}
@misc{TopPasswords,
author = {OWASP},
title = {Most common password list},
url = {https://github.com/OWASP/passfault/blob/master/wordlists/wordlists/10k-worst-passwords.txt}
}
@phdthesis{cas,
title = "Scyther : semantics and verification of security protocols",
abstract = "Recent technologies have cleared the way for large scale application of electronic communication. The open and distributed nature of these communications implies that the communication medium is no longer completely controlled by the communicating parties. As a result, there has been an increasing demand for research in establishing secure communications over insecure networks, by means of security protocols. In this thesis, a formal model for the description and analysis of security protocols at the process level is developed. At this level, under the assumption of perfect cryptography, the analysis focusses on detecting aws and vulnerabilities of the security protocol. Starting from ??rst principles, operational semantics are developed to describe security protocols and their behaviour. The resulting model is parameterized, and can e.g. capture various intruder models, ranging from a secure network with no intruder, to the strongest intruder model known in literature. Within the security protocol model various security properties are de??ned, such as secrecy and various forms of authentication. A number of new results about these properties are formulated and proven correct. Based on the model, an automated veri??cation procedure is developed, which signi ??cantly improves over existing methods. The procedure is implemented in a prototype, which outperforms other tools. Both the theory and tool are applied in two novel case studies. Using the tool prototype, new results are established in the area of protocol composition, leading to the discovery of a class of previously undetected attacks. Furthermore, a new protocol in the area of multiparty authentication is developed. The resulting protocol is proven correct within the framework.",
author = "C.J.F. Cremers",
year = "2006",
doi = "10.6100/IR614943",
language = "English",
isbn = "90-386-0804-7",
publisher = "Technische Universiteit Eindhoven",
school = "Department of Mathematics and Computer Science",
}
@InProceedings{10.1007/3-540-61770-1_46,
author="Meadows, Catherine A.",
editor="Bertino, Elisa
and Kurth, Helmut
and Martella, Giancarlo
and Montolivo, Emilio",
title="Analyzing the Needham-Schroeder public key protocol: A comparison of two approaches",
booktitle="Computer Security --- ESORICS 96",
year="1996",
publisher="Springer Berlin Heidelberg",
address="Berlin, Heidelberg",
pages="351--364",
abstract="In this paper we contrast the use of the NRL Protocol Analyzer and Gavin Lowe's use of the model checker FDR [8] to analyze the Needham-Schroeder public key protocol. This is used as a basis for comparing and contrasting the two systems and to point out possible future directions for research.",
isbn="978-3-540-70675-5"
}
@article{hung2018power,
title={Power consumption and calculation requirement analysis of AES for WSN IoT},
author={Hung, Chung-Wen and Hsu, Wen-Ting},
journal={Sensors},
volume={18},
number={6},
pages={1675},
year={2018},
publisher={Multidisciplinary Digital Publishing Institute}
}
@article{grassi2017nist,
title={NIST 800-63B digital identity guidelines: Authentication and lifecycle management},
author={Grassi, Paul A and Newton, EM and Perlner, RA and Regenscheid, AR and Burr, WE and Richer, JP},
journal={McLean, VA, Tech. Rep},
year={2017}
}
@article{souppaya2013guide,
title={Guide to enterprise patch management technologies},
author={Souppaya, Murugiah and Scarfone, Karen},
journal={NIST Special Publication},
volume={800},
pages={40},
year={2013}
}
@article{mattei2017privacy,
title={Privacy, confidentiality, and security of health care information: Lessons from the recent Wannacry cyberattack},
author={Mattei, Tobias A},
journal={World neurosurgery},
volume={104},
pages={972--974},
year={2017},
publisher={Elsevier}
}
@misc{kaspersky_2019, title={Phishing Prevention Tips}, url={https://www.kaspersky.com/resource-center/threats/ransomware-wannacry}, journal={www.kaspersky.com}, author={Kaspersky}, year={2019}, month={Nov}}
@article{case2016analysis,
title={Analysis of the cyber attack on the Ukrainian power grid},
author={Case, Defense Use},
journal={Electricity Information Sharing and Analysis Center (E-ISAC)},
volume={388},
year={2016}
}
@inproceedings{kambourakis2017mirai,
title={The mirai botnet and the iot zombie armies},
author={Kambourakis, Georgios and Kolias, Constantinos and Stavrou, Angelos},
booktitle={MILCOM 2017-2017 IEEE Military Communications Conference (MILCOM)},
pages={267--272},
year={2017},
organization={IEEE}
}
\ No newline at end of file
This diff is collapsed.
Design Files/Latex/sprint1.PNG

27.2 KiB

Design Files/Latex/sprint2.PNG

16.9 KiB

Design Files/Latex/sprint3.PNG

20.7 KiB

0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Please register or to comment