A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2013; you can also visit the original URL.
The file type is application/pdf
.
Intrusion detection for resource-constrained embedded control systems in the power grid
2012
International Journal of Critical Infrastructure Protection
A B S T R A C T The power grid depends on embedded control systems or SCADA systems to function properly. Securing these systems presents unique challenges-in addition to the resource restrictions inherent to embedded devices, SCADA systems must accommodate strict timing requirements that are non-negotiable, and their massive scale greatly amplifies costs such as power consumption. Together, these constraints make the conventional approach to host intrusion detection -using a hypervisor to
doi:10.1016/j.ijcip.2012.02.002
fatcat:fzokapdpefharfzhljx24yb53a