Birliktelik Kural Analizi Tabanlı İzleme ve Bayes Ağları ile Operasyonel Teknoloji Sistemlerinde Siber Güvenlik Analizi
Öz
Anahtar Kelimeler
Kaynakça
- Mukkamala, S., Sung, A., & Abraham, A. (2005). Cyber security challenges: Designing efficient intrusion detection systems and antivirus tools. Vemuri, V. Rao, Enhancing Computer Security with Smart Technology.(Auerbach, 2006), 125-163.
- Bhuyan, M. H., Bhattacharyya, D. K., & Kalita, J. K. (2013). Network anomaly detection: methods, systems and tools. Ieee communications surveys & tutorials, 16(1), 303-336.
- Stouffer, K., Falco, J., & Scarfone, K. (2011). Guide to industrial control systems (ICS) security. NIST special publication, 800(82), 16-16.
- Framework, S. (2010). Policy Statement on Improving the Resilience of Critical Infrastructure to Disruption from Natural Hazards. London: Cabinet Office.
- Henrie, M. (2013). Cyber security risk management in the SCADA critical infrastructure environment. Engineering Management Journal, 25(2), 38-45.
- Guan, J., Graham, J. H., & Hieb, J. L. (2011, July). A digraph model for risk identification and mangement in SCADA systems. In Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics (pp. 150-155). IEEE.
- Patel, S., Tantalean, R., Ralston, P., & Graham, J. (2005). Supervisory control and data acquisition remote terminal unit testbed. Intelligent Systems Research Laboratory technical report TR-ISRL-05-01, Department of Computer Engineering and Computer Science. Louisville, Kentucky: University of Louisville, 24, 26.
- Yan, J., Liu, C. C., & Govindarasu, M. (2011, March). Cyber intrusion of wind farm SCADA system and its impact analysis. In 2011 IEEE/PES Power Systems Conference and Exposition (pp. 1-6). IEEE.
Ayrıntılar
Birincil Dil
Türkçe
Konular
Mühendislik
Bölüm
Araştırma Makalesi
Yazarlar
Volkan Altuntaş
*
0000-0003-3144-8724
Türkiye
Yayımlanma Tarihi
31 Aralık 2020
Gönderilme Tarihi
15 Eylül 2020
Kabul Tarihi
27 Ekim 2020
Yayımlandığı Sayı
Yıl 2020 Sayı: 20