Back to Results
First PageMeta Content



Int. J. Inf. Secur:231–251 DOIs10207SPECIAL ISSUE PAPER A log mining approach for process monitoring in SCADA
Add to Reading List

Document Date: 2012-07-28 10:48:23


Open Document

File Size: 1,30 MB

Share Result on Facebook

Company

SCADA Systems / Modify A / Add No Modify A / /

Country

United States / Netherlands / Australia / /

Currency

USD / /

/

Event

Product Issues / Reorganization / /

Facility

P. H. Hartel University of Twente / /

IndustryTerm

data mining process / chemical components / Large systems / chosen algorithm / software implementation vulnerability / software/configuration vulnerabilities / log mining approach / main system server / interdependent equipment / intrusion detection systems / physical field devices / power grid systems / data mining algorithm / data mining / communication protocol / log mining / oil and gas distribution systems / typical intrusion detection systems / log processing / communication protocols / control software / public networks / log analysis tools / software architectures / chemicals / real-time overview / pattern mining / threats exploiting software vulnerabilities / food / energy / security technologies / /

Organization

University of Twente / /

Person

Pieter H. Hartel Published / /

Position

system automation An engineer / Author / forward them / Misconfiguration /functional An engineer / Domain Controller / chemical components Misconfiguration /functional An engineer / auditing Misconfiguration /control An engineer / threat Threat Example Scripting error An engineer / engineer / /

Product

Aspect / process automation scripts / Aspect Server / /

Technology

security technologies / chosen algorithm / DNS / mining algorithm / communication protocol / data mining / communication protocols / process control / data mining algorithm / /