This thesis investigates security mechanisms for utility control and protection networks using IP-based protocol interaction. It proposes flexible, cost-effective solutions in strategic locations to protect transitioning legacy and full IP-standards architectures. It also demonstrates how operational signatures can be defined to enact organizationally-unique standard operating procedures for zero failure in environments with varying levels of uncertainty and trust. The research evaluates layering encryption, authentication, traffic filtering, content checks, and event correlation mechanisms over time-critical primary and backup control/protection signaling to prevent disruption by internal and external malicious activity or errors. Finally,...
The Internet has become a global computing phenomenon, and during the 1990's has had more influence ...
Simple attacks can be countered by simple technical measures, but a defence against organized attack...
This work was supported by the MINECO grant TIN2013-46469-R (SPINY: Security and Privacy in the Inte...
This thesis demonstrates the benefits of utility communication based on Internet technology, some da...
This paper evaluates the prospects for protecting critical social functions from “cyber” attacks car...
This dissertation explores technological advances for network programmability and softwarization to ...
Today's critical infrastructures like the Power Grid are essentially physical processes controlled b...
As utility companies develop and incorporate new technologies, such as moving to utility Internet te...
As utility companies develop and incorporate new technologies, such as moving to utility Internet te...
As utility companies develop and incorporate new technologies, such as moving to utility Internet te...
This thesis reviews traditional ransomware attack trends in order to present a taxonomy for ransomwa...
Today's critical infrastructures like the Power Grid are essentially physical processes controlled b...
PhD thesis in Information technologyInformation and Communication Technologies (ICT) are permeating ...
PhD thesis in Information technologyInformation and Communication Technologies (ICT) are permeating ...
This work was supported by the MINECO grant TIN2013-46469-R (SPINY: Security and Privacy in the Inte...
The Internet has become a global computing phenomenon, and during the 1990's has had more influence ...
Simple attacks can be countered by simple technical measures, but a defence against organized attack...
This work was supported by the MINECO grant TIN2013-46469-R (SPINY: Security and Privacy in the Inte...
This thesis demonstrates the benefits of utility communication based on Internet technology, some da...
This paper evaluates the prospects for protecting critical social functions from “cyber” attacks car...
This dissertation explores technological advances for network programmability and softwarization to ...
Today's critical infrastructures like the Power Grid are essentially physical processes controlled b...
As utility companies develop and incorporate new technologies, such as moving to utility Internet te...
As utility companies develop and incorporate new technologies, such as moving to utility Internet te...
As utility companies develop and incorporate new technologies, such as moving to utility Internet te...
This thesis reviews traditional ransomware attack trends in order to present a taxonomy for ransomwa...
Today's critical infrastructures like the Power Grid are essentially physical processes controlled b...
PhD thesis in Information technologyInformation and Communication Technologies (ICT) are permeating ...
PhD thesis in Information technologyInformation and Communication Technologies (ICT) are permeating ...
This work was supported by the MINECO grant TIN2013-46469-R (SPINY: Security and Privacy in the Inte...
The Internet has become a global computing phenomenon, and during the 1990's has had more influence ...
Simple attacks can be countered by simple technical measures, but a defence against organized attack...
This work was supported by the MINECO grant TIN2013-46469-R (SPINY: Security and Privacy in the Inte...