References
- J. Eisenhauer, P. Donnelly, M. Ellis, and M. O'Brien, "Roadmap to Secure Control Systems in the Energy Sector," Energetics Incorporated, sponsored by the U.S. Department of Energy and the U.S. Department of Homeland Security, January 2006.
- U. S. G. A. Office, Critical infrastructure protection: Multiple efforts to secure control systems are under way, but challenges remain, Technical Report GAO-07-1036, Report to Congressional Requesters, 2007.
- R. J. Turk, Cyber incidents involving control systems, Technical Report INL/EXT-05-00671,Idaho National Laboratory, October 2005.
- L. Lamport, R. Shostak, and M. Pease, "The Byzantine Generals Problem," ACM Trans. Programming Languages and Systems 4(3), 382-401, July 1982. https://doi.org/10.1145/357172.357176
- J. Sykes, K. Koellner, W. Premerlani, B. Kasztenny, and M. Adamiak, "Synchrophasors: A primer and practical applications," Power Systems Conference: Advanced Metering, Protection, Control, Communication, and Distributed Resources, 2007. PSC 2007, pp.213-240, March 13-16, 2007.
- S. Amin, A. Cardenas, and S. Sastry, "Safe and Secure Networked Control Systems Under Denial-of-Service Attacks," Hybrid Systems: Computation and Control, Lecture Notes in Computer Science. Springer Berlin/Heidelberg, 30, pp. 31-45, April 2009.
- "The Smart Grid: An Introduction," prepared for the U.S. Department of Energy by Litos Strategic Communication under contract No. DE-AC26-04NT41817, Subtask 560.01.04, http://www.oe.energy.gov/DocumentsandMedia/DOE_SG_Book_Single_Pages.pdf(checked 9/21/2009).
- IEEE 100, The Authoritative Dictionary of IEEE Standards Terms, Seventh Edition, IEEE, 2000.
- M. Jamshidi, Large-Scale Systems, Series Volume 9, North-Holland Series in System Science and Engineering, Elsevier Science Publishing, Inc., pp. 103-104, 1983.
- H. J. Reekie and R. J. McAdam, A Software Architecture Primer, Angophora Press, Sydney, Australia, 2006.
- "Top 10 Vulnerabilities of Control Systems and their Associated Mitigations-2006," North American Electric Reliability Council, Control Systems Security Working Group, U.S. Department of Energy, National SCADA Test Bed Program, March 16, 2006.
- K. Stouffer et al., "Guide to Industrial Control Systems (ICS) Security," National Institute of Standards and Technology, U.S. Dept. of Commerce, Special Publication 800-82, Draft, September 2008.
- Common Cybersecurity Vulnerabilities Observed in Control System Assessments by the INLNSTB Program, INL/EXT-08-13979, Idaho National Laboratory, November 2008.
- R. Kisner et al., Design Practices for Communications and Workstations in Highly Integrated Control Rooms, NUREG/CR-6991, September 2009.
- L. Xie et al., "Data Mapping and the Prediction of Common Cause Failure Probability," IEEE Trans. on Reliability 54(2), June 2005.
- J. C. Cunha et al., "A Study of Failure Models in Feedback Control Systems," The International Conference on Dependable Systems and Networks (DSN), Göteborg, Sweden, 1-4 July 2001.
- T. Fleury et al., "Towards a Taxonomy of Attacks Against Energy Control Systems," Proceedings of the IFIP International Conference on Critical Infrastructure Protection, March 2008.
- P. Marti et al., "Jitter Compensation for Real-Time Control Systems," Real-Time Systems Symposium, 2001 (RTSS 2001) Proceedings, 22nd IEEE, Dec. 3-6, 2001.
- P. Marti et al., "An Integrated Approach to Real-time Distributed Control Systems Over Fieldbuses," pp. 177-182 in 8th IEEE International Conference on Emerging Technologies and Factory Automation, 2001 Proceedings, Vol. 1, 2001.
- R. Kisner et al., Design Practices for Communications and Workstations in Highly Integrated Control Rooms, NUREG/CR-6991, September 2009.