Security enhancement for SCADA communication protocols using augmented vulnerability trees.
Sandip C. PatelJames H. GrahamPatricia A. S. RalstonPublished in: CAINE (2006)
Keyphrases
- communication protocols
- control system
- communication protocol
- key management
- decision trees
- protocol specification
- cyber security
- communication networks
- information security
- risk assessment
- security issues
- model checking
- computer simulation
- wireless sensor networks
- security vulnerabilities
- supervisory control
- protocol stack
- buffer overflow
- neural network