Paranoid Penguin: AppArmor in Ubuntu 9, Linux Journal, issue, vol.185, 2009. ,
, Version 1.8, Verl, Germany (download.beckhoff.com/download/document/ipc/em bedded-pc/embedded-pc-cx/cx9020_hwen, p.2017
How Stuxnet Spreads ? A Study of Infection Paths in Best Practice Systems, Version 1, 2011. ,
An Industrial Control System Cybersecurity Performance Testbed, National Institute of Standards and Technology, vol.8089, 2015. ,
DOI : 10.6028/NIST.IR.8089
, , p.2017
Industrial cybersecurity for power system and SCADA networks, Proceedings of the Industry Applications Society Fifty- Second Annual Petroleum and Chemical Industry Conference, pp.303-309, 2005. ,
DOI : 10.1109/pcicon.2005.1524567
, , 2016.
Avoiding inconsistencies in the Security Content Automation Protocol, 2013 IEEE Conference on Communications and Network Security (CNS), pp.454-461, 2013. ,
DOI : 10.1109/CNS.2013.6682760
Android 4 Benchmark V1.0.0, Center for Internet Security, East Greenbush, p.2012 ,
Testing the Digital Thread in Support of Model-Based Manufacturing and Inspection, Journal of Computing and Information Science in Engineering, vol.16, issue.2, p.2016 ,
DOI : 10.1115/1.4032697
SCAP benchmark for Cisco router security configuration compliance, 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST), pp.270-276, 2015. ,
DOI : 10.1109/ICITST.2015.7412104
, Advisory (ICSA-16-278-02), Beckhoff Embedded PC Images and TwinCAT Components Vulnerabilities, Industrial Control Systems Cyber Emergency Response Team, 2014.
Security Automation and Threat Information-Sharing Options, IEEE Security & Privacy, vol.12, issue.5, pp.42-51, 2014. ,
DOI : 10.1109/MSP.2014.99
Hyperdocument authoring link management using Git and XQuery in service of an abstract hyperdocument management model applied to DITA hyperdocuments, Proceedings of Balisage: The Markup Conference, 2015. ,
Security Design for Configuration Management of Android Devices, 2015 IEEE 39th Annual Computer Software and Applications Conference, pp.249-254, 2015. ,
DOI : 10.1109/COMPSAC.2015.239
, Case Study Paper , SANS Institute, Bethesda, Maryland (ics.sans.org/media/ICS- CPPE-case-Study-2-German-Steelworks_Facility.pdf), 2014.
Extending the cybersecurity digital thread with XForms, Proceedings of Balisage: The Markup Conference, 2015. ,
The State of Security Automation Standards ? 2011, A Survey, MP110439, MITRE Corporation, 2011. ,
The Cybersecurity Landscape in Industrial Control Systems, Proceedings of the IEEE, vol.104, issue.5, pp.1039-1057, 2016. ,
DOI : 10.1109/JPROC.2015.2512235
RGB-D Human Detection and Tracking for Industrial Environments, Proceedings of the Thirteenth Conference on Intelligent Autonomous Systems, pp.1655-1668, 2014. ,
DOI : 10.1007/978-3-319-08338-4_119
, National Cybersecurity and Communications Integration Center/Industrial Control Systems Cyber Emergency Response Team, NCCIC/ICS- CERT Industrial Control Systems Assessment Summary Report, FY 2015
, National Institute of Standards and Technology, Security and Privacy Controls for Federal Information Systems and Organizations, NIST Special Publication 800-53, 2013.
, National Institute of Standards and Technology, Framework for Improving Critical Infrastructure Cybersecurity, Version 1.0, 2014.
, National Institute of Standards and Technology, The United States Government Configuration Baseline (USGCB), p.2017
, Darwin Information Typing Architecture (DITA) Version 1.3 Part 0: Overview (Plus Errata 01, OASIS Standard (Incorporating Approved Errata), 2016.
, Version 2.5, Document No. Formal, OMG UML), 2015.
Guide (www.open-scap.org/security-poli cies/scap-security-guide, p.2017 ,
, , p.2017
Contributing to SCAP Security Guide ? Part 1 (martin.preisler.mecontributing-to-scap-security-gui de-part-1), 2016. ,
Guide to Adopting and Using the Security Content Automation Protocol (SCAP), Version 1.2 (Draft), NIST Special Publication 800-117, Revision 1, National Institute of Standards and Technology, 2012. ,
National Checklist Program for IT Products ? Guidelines for Checklist Users and Developers, NIST Special Publication National Institute of Standards and Technology, vol.80070, issue.3, 2015. ,
Managing Security: The Security Content Automation Protocol, IT Professional, vol.13, issue.1, pp.9-11, 2011. ,
DOI : 10.1109/MITP.2011.11
Security and privacy challenges in industrial internet of things, Proceedings of the 52nd Annual Design Automation Conference on, DAC '15, 2015. ,
DOI : 10.1016/j.arcontrol.2010.02.008
, , p.2017
The Perils of Android Security Configuration, Computer, vol.49, issue.6, pp.15-21, 2016. ,
DOI : 10.1109/MC.2016.184
Forming Common Platform Enumeration (CPE) Names from Software Identification (SWID) Tags, NISTIR 8085 (Draft), National Institute of Standards and Technology, 2015. ,
Guidelines for the Creation of Interoperable Software Identification (SWID) Tags, NIS- TIR 8060, National Institute of Standards and Technology, 2016. ,
Specification for the Extensible Configuration Checklist Description Format (XCCDF), Version 1.2, NISTIR 7275, National Institute of Standards and Technology, vol.4, 2012. ,
SROS: Securing ROS over the wire, the graph and through the kernel, presented at the IEEE-RAS International Conference on Humanoid Robots, 2016. ,
, Extensible Markup Language (XML) 1.0 (Fifth Edition), W3C Recommendation, Massachusetts Institute of Technology, World Wide Web Consortium, 2008.
Metrics and Key Performance Indicators for Robotic Cybersecurity Performance Analysis, NISTIR 8177, National Institute of Standards and Technology, 2017. ,