The Academic Perspective Procedia publishes Academic Platform symposiums papers as three volumes in a year. DOI number is given to all of our papers.
Publisher : Academic Perspective
Journal DOI : 10.33793/acperpro
Journal eISSN : 2667-5862
[1] L. A. Maglaras, K. H. Kim, H. Janicke, M. A. Ferrag, S. Rallis, P. Fragkou, A. Maglaras and T. J. Cruz. "Cyber security of critical infrastructures." Ict Express 4.1 (2018): 42-45.
[2] İ. Özçelik, M. İskefiyeli, M. Balta, K. O. Akpinar and F. S.Toker. "Center water: a secure testbed infrastructure proposal for waste and potable water management." 2021 9th International Symposium on Digital Forensics and Security (ISDFS). IEEE, 2021.
[3] Ulusal Siber Güvenlik Stratejisi ve Eylem Stratejisi, Ulaştırma ve Altyapı Bakanlığı, https://hgm.uab.gov.tr//uploads/pages/siber-guvenlik/ulusal-siber-guvenlik-stratejisi-ep-2020-2023.pdf [Accessed 20 June 2022].
[4] The White House, Office of the Press Secretary, “Presidential Policy Directive 21 (PPD-21): Critical Infrastructure Security and Resilience”. Available: https://obamawhitehouse.archives.gov/the-press-office/2013/02/12/presidential-policy-directive-critical-infrastructure-security-and-resil [Accessed 24 June 2022].
[5] NIST, “Special Publication 800-82 Revision 2 Guide to Industrial Control Systems (ICS) Security”, 2015. Available: 10.6028/NIST.SP.800-82r2 [Accessed 26 April 2022].
[6] R. Janke, M. E. Tryby, and R. M. Clark. "Protecting water supply critical infrastructure: An overview." Securing water and wastewater systems (2014): 29-85.
[7] Gondim J., Albuquerque R., Orozco A., “Mirror saturation in amplified reflection Distributed Denial of Service: A case of study using SNMP, SSDP, NTP and DNS protocols”, Future Generation Computer Systems, Vol 108, July 2020, Pages 68-81.
[8] M. A. Brdys. "Integrated monitoring, control and security of Critical Infrastructure Systems." Annual Reviews in Control 38.1 (2014): 47-70.
[9] U. Ani, J. Watson, B. Green, B. Craggs and J. Nurse, "Design Considerations for Building Credible Security Testbeds: Perspectives from Industrial Control System Use Cases", Journal of Cyber Security Technology, pp. 1-49, 2020. Available: 10.1080/23742917.2020.1843822.
[10] Y. Geng, Y. Wang, W. Liu, Q. Wei, K. Liu and H. Wu, "A survey of industrial control system testbeds", IOP Conference Series: Materials Science and Engineering, vol. 569, p. 042030, 2019. Available: 10.1088/1757-899x/569/4/042030 [Accessed 26 April 2021].
[11] A. Almalawi, Z. Tari, I. Khalil and A. Fahad, "SCADAVT-A framework for SCADA security testbed based on virtualization technology", 38th Annual IEEE Conference on Local Computer Networks, 2013. Available: 10.1109/lcn.2013.6761301 [Accessed 6 May 2022].
[12] MPV. Wadal and S. R. Gupta. "An Overview of Network Management System." International Journal Of Computer Science And Applications 6.2 (2013).
[13] D. Mauro, and K. Schmidt. Essential SNMP: Help for System and Network Administrators. " O'Reilly Media, Inc.", 2005.
[14] Boyko A., Varkentin V., Polyakova, “Advantages and Disadvantages of the Data Collection’s Method Using SNMP”, International Multi-Conference on Industrial Engineering and Modern Technologies (FarEastCon), 01-04 Oct 2019.
[15] Almseidin M., Alkasassbeh M., Kovacs S., “Fuzzy Rule Interpolation and SNMP-MIB for Emerging Network Abnormality”, Cornell University, Networking and Internet Architecture, 21 Nov 2018.
[16] Naymat G., Kasassbeh M., Hawari E., “Using machine learning methods for detecting network anomalies within SNMP-MIB dataset”, Int. J. Wireless and Mobile Computing, Vol. 15, No. 1, 2018.