Team for Research in
Ubiquitous Secure Technology

Poster - Applying Policy-Based Intrusion Detection to SCADA Networks
Adrian Lauf, Tanya Roosta, Jon Wiley, William H. Robinson, Gabor Karsai

Citation
Adrian Lauf, Tanya Roosta, Jon Wiley, William H. Robinson, Gabor Karsai. "Poster - Applying Policy-Based Intrusion Detection to SCADA Networks". Talk or presentation, 11, November, 2008.

Abstract
(No abstract.)

Electronic downloads

  • PolicyIDS.pptx · application/vnd.openxmlformats-officedocument.presentationml.pre · 808 kbytes
Citation formats  
  • HTML
    Adrian Lauf, Tanya Roosta, Jon Wiley, William H. Robinson,
    Gabor Karsai. <a
    href="http://www.truststc.org/pubs/511.html"
    ><i>Poster - Applying Policy-Based Intrusion
    Detection to SCADA Networks</i></a>, Talk or
    presentation,  11, November, 2008.
  • Plain text
    Adrian Lauf, Tanya Roosta, Jon Wiley, William H. Robinson,
    Gabor Karsai. "Poster - Applying Policy-Based Intrusion
    Detection to SCADA Networks". Talk or presentation, 
    11, November, 2008.
  • BibTeX
    @presentation{LaufRoostaWileyRobinsonKarsai08_PosterApplyingPolicyBasedIntrusionDetectionToSCADA,
        author = {Adrian Lauf and Tanya Roosta and Jon Wiley and
                  William H. Robinson and Gabor Karsai},
        title = {Poster - Applying Policy-Based Intrusion Detection
                  to SCADA Networks},
        day = {11},
        month = {November},
        year = {2008},
        abstract = {(No abstract.)},
        URL = {http://www.truststc.org/pubs/511.html}
    }
    

Posted by Adrian Lauf, Ph.D. on 4 Feb 2009.
Groups: trust
For additional information, see the Publications FAQ or contact webmaster at www truststc org.

Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.