[1]
|
R. L. Krutz, “Securing SCADA Systems,” Wesley Publishing, Inc., Indianapolis, 2006.
|
[2]
|
J. Pollet, “Developing a Solid SCADA Security Strategy,” Proceedings of the Second ISA/IEEE Sensors for Industry Conference, Houston, November 2002, pp. 148156.
|
[3]
|
M. Bishop, “Introduction to Computer Security,” Addison-Wesley, Boston, 2005.
|
[4]
|
J. Nordlander, “What is Special about SCADA System Cyber Security,” Master Dissertation, Royal Institute of Technology, Sweden, 2009.
|
[5]
|
H. Lim, S. Hong, M. S. Choi, S. J. Lee, T. W. Kim, S. W. Lee and B. N. Ha, “Security Protocols Against Cyber Attacks in the Distribution Automation System,” IEEE Transactions on Power Delivery, Vol. 25, No. 1, 2010, pp. 448-455.
|
[6]
|
T. Davis, “RSA Encryption,” October 2003. http://www. geometer.org/mathcircles
|
[7]
|
J. Messy, H. Kh and K. Kuregian, “Nomination of SAFER+ as a Candidate Algorithm for the AES,” 1998. http://csrc.nist.gov/archive/aes/round1
|
[8]
|
A. Schubert and W. Anheier, “Efficient VLSI Implementation of Modern Symmetric Block Ciphers,” 6th IEEE International Conference on Electronics, Circuit and Systems, Pafos, Vol. 2, September 1999, pp. 757-760.
|
[9]
|
S. Mukherjee, D. Ganguly and S. Naskar, “A New Generation Cryptographic Technique,” International Journal of Computer Theory and Engineering, Vol. 1, No. 3, August 2009, pp. 284-287.
|
[10]
|
I. S. Ashour, “Online Data and Voice Encryption System Based on FPGA,” 24th National Radio Science Conference, Cairo, National Republican Senatorial Committee, 2007, pp. 1-7.
|
[11]
|
D. Sharmila and R. Neelaveni, “Performance Analysis of SAFER+ and Triple DES Security Algorithms for Bluetooth Security System,” International Journal of Computer Science and Network Security, Vol. 9, No. 2, 2009, pp. 74-87.
|
[12]
|
J. Kelsey, B. Schneier and D. Wagner, “Key Schedule Weaknesses in SAFER+,” Second Advanced Encryption Standard Candidate Conference, Rome, 1999, pp. 155167.
|
[13]
|
A. West, “Securing DNP3 and Modbus with AGA12-2J,” IEEE Power and Energy Society General Meeting: Conversion and Delivery of Electrical Energy in the 21st Century, Pittsburgh, 20-24 July 2008, pp. 1-4.
|