A. Islam and T. Sabrina, Detection of various denial of service and Distributed Denial of Service attacks using RNN ensemble, 2009 12th International Conference on Computers and Information Technology, pp.603-608, 2009.
DOI : 10.1109/ICCIT.2009.5407308

M. Brownfield, Y. Gupta, and N. Davis, Wireless sesnsor network denialof-sleep attack, Proceedings of the Sixth Annual IEEE SMC Information Assurance Workshop, pp.356-364, 2005.
DOI : 10.1109/iaw.2005.1495974

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.133.8865

L. Buttyan, D. Gessner, A. Hessler, and P. Langendoerfer, Application of wireless sensor networks in critical infrastructure protection: challenges and design options [Security and Privacy in Emerging Wireless Networks, IEEE Wireless Communications, vol.17, issue.5, pp.44-49, 2010.
DOI : 10.1109/MWC.2010.5601957

K. Claffy, S. Bradner, and S. Meinrath, The (un)Economic Internet?, IEEE Internet Computing, vol.11, issue.3, pp.53-58, 2007.
DOI : 10.1109/MIC.2007.72

L. Coppolino, S. D. Antonio, L. Romano, and G. Spagnuolo, An Intrusion Detection System for Critical Information Infrastructures using Wireless Sensor Network technologies, 2010 5th International Conference on Critical Infrastructure (CRIS), 2010.
DOI : 10.1109/CRIS.2010.5617547

L. Coyle, M. Hinchey, B. Nuseibeh, and J. Fiadeiro, Guest Editors' Introduction: Evolving Critical Systems, Computer, vol.43, issue.5, pp.28-33, 2010.
DOI : 10.1109/MC.2010.139

F. Deng, A. Luo, Y. Zhang, Z. Chen, X. Peng et al., A holistic solution to secure enterprise networks, Proceedings of the Ninth IEEE International Conference for Young Computer Scientists, pp.2240-2245, 2008.

C. Esposito, D. Cotroneo, R. Barbosa, and N. Silva, Qualification and Selection of Off-the-Shelf Components for Safety Critical Systems: A Systematic Approach, 2011 Fifth Latin-American Symposium on Dependable Computing Workshops, pp.52-57, 2011.
DOI : 10.1109/LADCW.2011.13

M. Golling and B. Stelte, Requirements for a future EWS ? Cyber defense in the Internet of the future, Proceedings of the Third International Conference on Cyber Conflict, 2011.

R. Guha, Z. Furqan, and S. Muhammad, Discovering Man-in-the-Middle Attacks in Authentication Protocols, MILCOM 2007, IEEE Military Communications Conference, 2007.
DOI : 10.1109/MILCOM.2007.4455039

M. Hashim, Malaysia's national cyber security policy: The country's cyber defense initiatives, Proceedings of the Second Worldwide Cybersecurity Summit, 2011.

W. Hurst, M. Merabti, and P. Fergus, Behavioral observation for critical infrastructure security support, Proceedings of the Seventh IEEE European Modeling Symposium, pp.36-41, 2013.

M. Kaaniche, Resilience Assessment of Critical Infrastructures: From Accidental to Malicious Threats, 2011 Fifth Latin-American Symposium on Dependable Computing Workshops, pp.35-36, 2011.
DOI : 10.1109/LADCW.2011.27

D. Kang, J. Lee, S. Kim, and J. Park, Analysis on cyber threats to SCADA systems, 2009 Transmission & Distribution Conference & Exposition: Asia and Pacific, 2009.
DOI : 10.1109/TD-ASIA.2009.5357008

E. Kartaltepe and S. Xi, Towards Blocking Outgoing Malicious Impostor Emails, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06), pp.657-661, 2006.
DOI : 10.1109/WOWMOM.2006.109

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.81.4738

P. Katsumata, J. Hemenway, and W. Gavins, Cybersecurity risk management, 2010, MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE, pp.890-895, 2010.
DOI : 10.1109/MILCOM.2010.5680181

M. Kumar, D. Mukhopadhyay, H. Lele, and K. Vaze, Evaluation of operator actions for beyond design basis events for AHWR, 2010 2nd International Conference on Reliability, Safety and Hazard, Risk-Based Technologies and Physics-of-Failure Methods (ICRESH), pp.579-582, 2010.
DOI : 10.1109/ICRESH.2010.5779614

R. Langner, Stuxnet: Dissecting a Cyberwarfare Weapon, IEEE Security & Privacy Magazine, vol.9, issue.3, pp.49-51, 2011.
DOI : 10.1109/MSP.2011.67

P. Li, Z. Wang, and X. Tan, Characteristic Analysis of Virus Spreading in Ad Hoc Networks, 2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007), pp.538-541, 2007.
DOI : 10.1109/CISW.2007.4425552

A. Macdermott, W. Hurst, Q. Shi, and M. Merabti, Simulating Critical Infrastructure Cascading Failure, 2014 UKSim-AMSS 16th International Conference on Computer Modelling and Simulation, pp.323-328, 2014.
DOI : 10.1109/UKSim.2014.85

I. N. Fovino, M. Masera, L. Guidi, and G. Carpi, An experimental platform for assessing SCADA vulnerabilities and countermeasures in power plants, 3rd International Conference on Human System Interaction, pp.679-686, 2010.
DOI : 10.1109/HSI.2010.5514494

N. Nicholson, S. Webber, S. Dyer, T. Patel, and H. Janicke, SCADA security in the light of Cyber-Warfare, Computers & Security, vol.31, issue.4, pp.418-436, 2012.
DOI : 10.1016/j.cose.2012.02.009

S. Roschke, F. Cheng, and C. Meinel, A Flexible and Efficient Alert Correlation Platform for Distributed IDS, 2010 Fourth International Conference on Network and System Security, pp.24-31, 2010.
DOI : 10.1109/NSS.2010.26

C. Scarlat, C. Simion, and E. Scarlat, Managing new technology projects: Some considerations on risk assessment in the case of NPP critical infrastructures, 2011 2nd IEEE International Conference on Emergency Management and Management Sciences, pp.911-915, 2011.
DOI : 10.1109/ICEMMS.2011.6015831

E. Schweitzer, D. Whitehead, A. Risley, and R. Smith, How would we know? Proceedings of the Sixty-Fourth Annual Conference for Protective Relay Engineers, pp.310-321, 2011.

W. Seah, A. Zhi, and H. Tan, Wireless sensor networks powered by ambient energy harvesting (WSN-HEAP) - Survey and challenges, 2009 1st International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology, 2009.
DOI : 10.1109/WIRELESSVITAE.2009.5172411

F. Shiri, B. Shanmugam, and N. Idris, A parallel technique for improving the performance of signature-based network intrusion detection system, 2011 IEEE 3rd International Conference on Communication Software and Networks, pp.692-696, 2011.
DOI : 10.1109/ICCSN.2011.6014986

S. Tang, The Detection of Trojan Horse Based on the Data Mining, 2009 Sixth International Conference on Fuzzy Systems and Knowledge Discovery, pp.311-314, 2009.
DOI : 10.1109/FSKD.2009.354

J. Walker, B. Williams, and G. Skelton, Cyber security for emergency management, 2010 IEEE International Conference on Technologies for Homeland Security (HST), pp.476-480, 2010.
DOI : 10.1109/THS.2010.5654965

C. Wang, L. Fang, and Y. Dai, A Simulation Environment for SCADA Security Analysis and Assessment, 2010 International Conference on Measuring Technology and Mechatronics Automation, pp.342-347, 2010.
DOI : 10.1109/ICMTMA.2010.603

J. Wang, R. Phan, J. Whitley, and D. Parish, Augmented Attack Tree Modeling of Distributed Denial of Services and Tree Based Attack Detection Method, 2010 10th IEEE International Conference on Computer and Information Technology, pp.1009-1014, 2010.
DOI : 10.1109/CIT.2010.185

Y. Wang, H. Wang, Z. Li, and J. Huang, Man-in-the-middle attack on BB84 protocol and its defense, Proceedings of the Second IEEE International Conference on Computer Science and Information Technology, pp.438-439, 2009.

W. Wen, An improved intrusion detection system, Proceedings of the International Conference on Computer Applications and System Modeling, pp.212-215, 2010.

T. Wilson, C. Stewart, V. Sword-daniels, G. Leonard, D. Johnston et al., Volcanic ash impacts on critical infrastructure, Physics and Chemistry of the Earth, pp.45-46, 2011.

S. Wolthusen, GIS-based Command and Control Infrastructure for Critical Infrastructure Protection, First IEEE International Workshop on Critical Infrastructure Protection (IWCIP'05), pp.40-50, 2005.
DOI : 10.1109/IWCIP.2005.12

H. Xue, MultiCore systems architecture design and implementation of UTM, Proceedings of the International Symposium on Information Science and Engineering, pp.441-445, 2008.

W. Yu, S. Nargundkar, and N. Tiruthani, A phishing vulnerability analysis of web based systems, 2008 IEEE Symposium on Computers and Communications, pp.326-331, 2008.
DOI : 10.1109/ISCC.2008.4625681

F. Yusufovna, F. Alisherovich, M. Choi, E. Cho, F. Abdurashidovich et al., Research on Critical Infrastructures and Critical Information Infrastructures, 2009 Symposium on Bio-inspired Learning and Intelligent Systems for Security, pp.97-101, 2009.
DOI : 10.1109/BLISS.2009.32

URL : http://ecite.utas.edu.au/62298/2/Research%20on%20Critical%20Infrastructures%20and%20Critical%20Information%20Infrastructures%5B1%5D.pdf

Y. Zhang, F. Deng, Z. Chen, Y. Xue, and C. Lin, UTM-CM: A Practical Control Mechanism Solution for UTM System, 2010 International Conference on Communications and Mobile Computing, pp.86-90, 2010.
DOI : 10.1109/CMC.2010.267