Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2014, Article ID 348305, 13 pages
Research Article

Advanced Approach to Information Security Management System Model for Industrial Control System

Center for Information Security Technologies (CIST), Korea University, Seoul 136-713, Republic of Korea

Received 13 April 2014; Accepted 6 June 2014; Published 21 July 2014

Academic Editor: Sang-Soo Yeo

Copyright © 2014 Sanghyun Park and Kyungho Lee. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Citations to this Article [5 citations]

The following is the list of published articles that have cited the current article.

  • Hao Li, Guangjie Liu, Weiwei Jiang, and Yuewei Dai, “Designing snort rules to detect abnormal DNP3 network data,” 2015 International Conference on Control, Automation and Information Sciences (ICCAIS), pp. 343–348, . View at Publisher · View at Google Scholar
  • Hwankuk Kim, Jongin Lim, and Kyungho Lee, “A Study of K-ISMS Fault Analysis for Constructing Secure Internet of Things Service,” International Journal of Distributed Sensor Networks, vol. 2015, pp. 1–12, 2015. View at Publisher · View at Google Scholar
  • Yulia Cherdantseva, Pete Burnap, Andrew Blyth, Peter Eden, Kevin Jones, Hugh Soulsby, and Kristan Stoddart, “A review of cyber security risk assessment methods for SCADA systems,” Computers & Security, vol. 56, pp. 1–27, 2016. View at Publisher · View at Google Scholar
  • Junseob Yoon, and Kyungho Lee, “Advanced assessment model for improving effectiveness of information security measurement,” International Journal of Advanced Media and Communication, vol. 6, no. 1, pp. 4–19, 2016. View at Publisher · View at Google Scholar
  • Saqib Ali, Taiseera Al Balushi, Zia Nadir, and Omar Khadeer Hussain, “ICS/SCADA system security for CPS,” Studies in Computational Intelligence, vol. 768, pp. 89–113, 2018. View at Publisher · View at Google Scholar