Environmental Engineering Reference
In-Depth Information
IEC 62645. (2011). Nuclear power plants - In-
strumentation and control systems - Requirements
for security programmes for computer-based
systems. IEC.
ISO/IEC 27008. (2011). Information technology
- Security techniques - Guidelines for auditors
on information security management systems
controls. ISO/IEC.
ISO/IEC 27001. (2005). Information technol-
ogy - Security techniques - Information security
management systems - Requirements. ISO/IEC.
Karry, R., et al. (2010, October). Trustworthy
hardware: Identifying and classifying hardware
trojans. Computer Magazine , 39-46. Christian-
sen, B. (2006). Active FPGA security through
decoy circuits . (MS Thesis). Air Force Institute
of Technology.
ISO/IEC 27002. (2005). Information technol-
ogy - Security techniques - Code of practice for
information security management. ISO/IEC.
Kharchenko, V., et al. (2011). Critical infra-
structures safety: Mathematical and engineering
methods of analysis and assurance. Department
of Education and Science of Ukraine, National
Aerospace University named after N. Zhukovsky
KhAI. IEC 61508: Ed. 2. (2010). Functional safety
of electrical/electronic/programmable electronic
safety-related systems. IEC.
ISO/IEC 17799. (2005). Information technol-
ogy - Security techniques - Code of practice for
information security management . ISO/IEC.
ISO/IEC 27000. (2009). Information technol-
ogy - Security techniques - Information security
management systems - Overview and vocabulary .
ISO/IEC.
ISO/IEC 27004. (2009). Information technol-
ogy - Security techniques - Information security
management - Measurement. ISO/IEC.
Kharchenko, V., et al. (2012a). Cyber security of
FPGA-based NPP I&C systems: Challenges and
solutions. In Proceeding of the 8th International
Conference on Nuclear Plant Instrumentation,
Control, and Human-Machine Interface Tech-
nologies (NPIC & HMIT 2012). San Diego, CA:
NPIC & HMIT.
ISO/IEC 15408. (2009). Information technology
- Security techniques - Evaluation criteria for IT
security . ISO/IEC.
ISO/IEC 27003. (2010). Information technol-
ogy - Security techniques - Information security
management system implementation guidance.
ISO/IEC.
Kharchenko, V. et al. (2012b). GAP- and HTT-
based analysis of safety-critical systems. Radio-
electronic and Computer Systems , 7 (59), 198-204.
Kharchenko, V. et al. (2012c). Gap-and-IMECA-
based assessment of I&C systems cyber security.
Advances in Intelligent and soft . Computing , 170 ,
149-164.
ISO/IEC 27005. (2011). Information technology
- Security techniques - Information security risk
management. ISO/IEC.
ISO/IEC 27006. (2011). Information technology
- Security techniques - Requirements for bodies
providing audit and certification of information
security management systems. ISO/IEC.
Kharchenko, V., et al. (2012d). Cyber security
lifecycle and assessment technique for FPGA-
based I&C systems. In Proceeding of IEEE East-
West Design & Test Symposium (EWDTS'2012).
Kharkov, Ukraine: IEER.
ISO/IEC 27007. (2011). Information technology -
Security techniques - Guidelines for information
security management systems auditing. ISO/IEC.
NEI 08-09. (2010). Cyber security plan for nuclear
power reactors . Nuclear Energy Institute.
Search WWH ::




Custom Search