Environmental Engineering Reference
In-Depth Information
IEC 62645. (2011).
Nuclear power plants - In-
strumentation and control systems - Requirements
for security programmes for computer-based
systems.
IEC.
ISO/IEC 27008. (2011).
Information technology
- Security techniques - Guidelines for auditors
on information security management systems
controls.
ISO/IEC.
ISO/IEC 27001. (2005).
Information technol-
ogy - Security techniques - Information security
management systems - Requirements.
ISO/IEC.
Karry, R., et al. (2010, October). Trustworthy
hardware: Identifying and classifying hardware
trojans.
Computer Magazine
, 39-46. Christian-
sen, B. (2006).
Active FPGA security through
decoy circuits
. (MS Thesis). Air Force Institute
of Technology.
ISO/IEC 27002. (2005).
Information technol-
ogy - Security techniques - Code of practice for
information security management.
ISO/IEC.
Kharchenko, V., et al. (2011). Critical infra-
structures safety: Mathematical and engineering
methods of analysis and assurance. Department
of Education and Science of Ukraine, National
Aerospace University named after N. Zhukovsky
KhAI. IEC 61508: Ed. 2. (2010).
Functional safety
of electrical/electronic/programmable electronic
safety-related systems.
IEC.
ISO/IEC 17799. (2005).
Information technol-
ogy - Security techniques - Code of practice for
information security management
. ISO/IEC.
ISO/IEC 27000. (2009).
Information technol-
ogy - Security techniques - Information security
management systems - Overview and vocabulary
.
ISO/IEC.
ISO/IEC 27004. (2009).
Information technol-
ogy - Security techniques - Information security
management - Measurement.
ISO/IEC.
Kharchenko, V., et al. (2012a). Cyber security of
FPGA-based NPP I&C systems: Challenges and
solutions. In
Proceeding of the 8th International
Conference on Nuclear Plant Instrumentation,
Control, and Human-Machine Interface Tech-
nologies
(NPIC & HMIT 2012). San Diego, CA:
NPIC & HMIT.
ISO/IEC 15408. (2009).
Information technology
- Security techniques - Evaluation criteria for IT
security
. ISO/IEC.
ISO/IEC 27003. (2010).
Information technol-
ogy - Security techniques - Information security
management system implementation guidance.
ISO/IEC.
Kharchenko, V. et al. (2012b). GAP- and HTT-
based analysis of safety-critical systems.
Radio-
electronic and Computer Systems
,
7
(59), 198-204.
Kharchenko, V. et al. (2012c). Gap-and-IMECA-
based assessment of I&C systems cyber security.
Advances in Intelligent and soft
.
Computing
,
170
,
149-164.
ISO/IEC 27005. (2011).
Information technology
- Security techniques - Information security risk
management.
ISO/IEC.
ISO/IEC 27006. (2011).
Information technology
- Security techniques - Requirements for bodies
providing audit and certification of information
security management systems.
ISO/IEC.
Kharchenko, V., et al. (2012d). Cyber security
lifecycle and assessment technique for FPGA-
based I&C systems. In
Proceeding of IEEE East-
West Design & Test Symposium
(EWDTS'2012).
Kharkov, Ukraine: IEER.
ISO/IEC 27007. (2011).
Information technology -
Security techniques - Guidelines for information
security management systems auditing.
ISO/IEC.
NEI 08-09. (2010).
Cyber security plan for nuclear
power reactors
. Nuclear Energy Institute.
Search WWH ::
Custom Search