2012 IEEE Conference on Technologies for Homeland Security (HST) 2012
DOI: 10.1109/ths.2012.6459830
|View full text |Cite
|
Sign up to set email alerts
|

Host protection strategies for industrial control systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2014
2014
2018
2018

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 0 publications
0
1
0
Order By: Relevance
“…Similarly, McIntyre, Lindqvist, Peterson, and Tudor, also analyze application whitelisting as a way to lower complexity, cost and administrative overhead [10]. Munro discusses the limitations of traditional defenses in the case of the Flame virus and argues for proactive defenses such as application whitelisting as part of a layered security approach [11].…”
Section: Related Workmentioning
confidence: 99%
“…Similarly, McIntyre, Lindqvist, Peterson, and Tudor, also analyze application whitelisting as a way to lower complexity, cost and administrative overhead [10]. Munro discusses the limitations of traditional defenses in the case of the Flame virus and argues for proactive defenses such as application whitelisting as part of a layered security approach [11].…”
Section: Related Workmentioning
confidence: 99%