Team for Research in
Ubiquitous Secure Technology

Applying policy-based intrusion detection to scada networks
Adrian Lauf, William H. Robinson, Gabor Karsai, Jon Wiley, Tanya Roosta

Citation
Adrian Lauf, William H. Robinson, Gabor Karsai, Jon Wiley, Tanya Roosta. "Applying policy-based intrusion detection to scada networks". Talk or presentation, 11, November, 2008.

Abstract
(No abstract.)

Electronic downloads

  • SCADA%20IDS.pptx · application/vnd.openxmlformats-officedocument.presentationml.pre · 2987 kbytes
Citation formats  
  • HTML
    Adrian Lauf, William H. Robinson, Gabor Karsai, Jon Wiley,
    Tanya Roosta. <a
    href="http://www.truststc.org/pubs/506.html"
    ><i>Applying policy-based intrusion detection to
    scada networks</i></a>, Talk or presentation, 
    11, November, 2008.
  • Plain text
    Adrian Lauf, William H. Robinson, Gabor Karsai, Jon Wiley,
    Tanya Roosta. "Applying policy-based intrusion
    detection to scada networks". Talk or presentation, 
    11, November, 2008.
  • BibTeX
    @presentation{LaufRobinsonKarsaiWileyRoosta08_ApplyingPolicybasedIntrusionDetectionToScadaNetworks,
        author = {Adrian Lauf and William H. Robinson and Gabor
                  Karsai and Jon Wiley and Tanya Roosta},
        title = {Applying policy-based intrusion detection to scada
                  networks},
        day = {11},
        month = {November},
        year = {2008},
        abstract = {(No abstract.)},
        URL = {http://www.truststc.org/pubs/506.html}
    }
    

Posted by Adrian Lauf, Ph.D. on 4 Feb 2009.
Groups: trust
For additional information, see the Publications FAQ or contact webmaster at www truststc org.

Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.