White Papers

Comparing Electronic Battlefields: Using Mean Time-to-Compromise as a Comparative Security Metric

D. Leversage and E.J. Byres, “Comparing Electronic Battlefields: Using Mean Time-to-Compromise as a Comparative Security Metric,Communications in Computer and Information Science - Computer Network Security, Proceedings of the Fourth International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, St. Petersburg, Russia, Springer, 2007, pp. 213-227.

On Shaky Ground - A Study of Security Vulnerabilities in Control Protocols

E.J. Byres, D. Hoffman and N. Kube; “On Shaky Ground - A Study of Security Vulnerabilities in Control Protocols”, 5th American Nuclear Society International Topical Meeting on Nuclear Plant Instrumentation, Controls, and Human Machine Interface Technology, American Nuclear Society, Albuquerque, NM, November 2006

Finding the Security Holes before the Hackers Do

E.J. Byres and M. Franz; “Finding the Security Holes before the Hackers Do”, ISA Technical Conference, Instrumentation Systems and Automation Society, Chicago, October 2005
 

The Special Needs of SCADA/PCN Firewalls: Architectures and Test Results

E.J. Byres, B. Chauvin, D. Hoffman, J. Karsch and N. Kube; “The Special Needs of SCADA/PCN Firewalls: Architectures and Test Results”, The 11th IEEE International Conference on Emerging Technologies and Factory Automation, Institute of Electrical and Electronics Engineers, Catania Italy, September 2005

Industrial Cybersecurity For Power System And SCADA Networks

E.J. Byres and A. Creery; “Industrial Cybersecurity For Power System And SCADA Networks”, Proceedings of the IEEE Petroleum and Chemical Industries Conference, Institute of Electrical and Electronics Engineers, Denver, September 200

Good Practice Guide on Firewall Deployment for SCADA and Process Control Networks

BCIT Group for Advanced Information Technology, “Good Practice Guide on Firewall Deployment for SCADA and Process Control Networks - Policy and Best Practice ID. 00157”, National Infrastructure Coordination Centre, UK , 23 February 2005

The Use of Attack Trees in Assessing Vulnerabilities in SCADA System

E.J. Byres, M. Franz and D. Miller ; "The Use of Attack Trees in Assessing Vulnerabilities in SCADA Systems", International Infrastructure Survivability Workshop (IISW'04), Institute of Electrical and Electronics Engineers, Lisbon, December 4, 2004

The Myths and Facts behind Cyber Security Risks for Industrial Control Systems

E.J. Byres and J. Lowe; “The Myths and Facts behind Cyber Security Risks for Industrial Control Systems”, VDE 2004 Congress, VDE, Berlin, October 2004

Worlds in Collision: Ethernet on the Plant Floor

E. Byres, J. Carter, A. Elramly and D. Hoffman; “Worlds in Collision: Ethernet on the Plant Floor”, ISA Emerging Technologies Conference, Instrumentation Systems and Automation Society, Chicago, October 2002

Designing Secure Networks for Process Control

 E.J. Byres; “Designing Secure Networks for Process Control”, IEEE Industry Applications Magazine, Institute of Electrical and Electronics Engineers, New York, Vol. 6, No. 5 p. 33 -39, September/October 2000

Pages

Subscribe to RSS - White Papers