Skip to search formSkip to main contentSkip to account menu

p0f

p0f is a versatile passive OS fingerprinting tool. p0f can identify the system on machines that connect to your box, machines you connect to, and… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
This paper proposes a general framework for the state estimation of plants given by hybrid systems with linear flow and jump maps… 
Highly Cited
2014
Highly Cited
2014
A challenge facing industrial control network administrators is protecting the typically large number of connected assets for… 
2014
2014
...................................................................................................................................... iv Table of Contents ...................................................................................................................... v List of Figures ........................................................................................................................... xi Chapter 1. Introduction ......................................................................................................... 1 1.1 Problem Statement .................................................................................................... 2 1.2 Contribution ................................................................................................................ 3 1.3 Thesis Organization .................................................................................................. 4 Chapter 2. Background .......................................................................................................... 6 2.1 Origins of SCADA ........................................................................................................ 7 2.2 SCADA Architecture ................................................................................................... 8 2.2.1 Control Center ................................................................................................................................... 8 2.2.2 Operator Interface ........................................................................................................................ 10 2.2.3 Field Devices ................................................................................................................................... 10 2.3 Wide-­‐Area SCADA Networks ............................................................................... 11 2.3.1 Wired Communications .............................................................................................................. 11 2.3.2 Wireless Communications ......................................................................................................... 11 2.4 Common SCADA Communication Protocols ................................................... 12 2.4.1 Modbus Protocol ............................................................................................................................ 12 2.4.2 DNP3 Protocol ................................................................................................................................ 13 2.5 SCADA Convergence ............................................................................................... 14 Chapter 3. SCADA and Security ........................................................................................ 16 3.1 Current State of SCADA Security ........................................................................ 16 3.1.1 The Importance of SCADA Security ....................................................................................... 17 3.1.2 SCADA Security Incidents .......................................................................................................... 18 3.1.3 SCADA Security Standards ........................................................................................................ 19 3.1.3.1 NIST System Protection Profile .......................................................................... 20 3.1.3.2 ISA-­‐SP99 ....................................................................................................................... 20 3.1.3.3 AGA-­‐12 Documents .................................................................................................. 20 
2011
2011
We construct an operator 𝑅 whose restriction onto weighted pluriharmonic Bergman Space 𝑏2𝜇(𝔹𝑛) is an isometric isomorphism… 
Highly Cited
2005
Highly Cited
2005
Two novel distributed particle filters with Gaussian mixer approximation are proposed to localize and track multiple moving… 
2005
2005
Large-scale streamwise vortices in the vicinity of a perforated wall in the supersonic part of the nozzle are studied. The… 
Highly Cited
2004
Highly Cited
2004
Modern technology in the area of intrusion detection is honeypot technology that, unlike common IDSs, tends to provide the… 
2004
2004
A modern technology in the area of intrusion detection is honeypot technology that unlike common IDSs tends to provide the… 
2000
2000
Bornat has recently described an approach to reasoning about pointers, building on work of Morris. Here we describe a semantics… 
1998
1998
Let $\{P_t\}_{t\ge 0}$ be the transition semigroup of a diffusion process. It is known that $P_t$ sends continuous functions into…