


default search action
Critical Infrastructure Protection 2007: Hanover, New Hampshire, USA
- Eric Goetz, Sujeet Shenoi:
Critical Infrastructure Protection, Post-Proceedings of the First Annual IFIP Working Group 11.10 International Conference on Critical Infrastructure Protection, Dartmouth College, Hanover, New Hampshire, USA, March 19-21, 2007. IFIP 253, Springer 2007, ISBN 978-0-387-75461-1
Themes and Issues
- Neil Robinson, Lorenzo Valeri:
On the Security Implications of Disruptive Technologies. 3-14 - Scott Dynes, Eric Goetz, Michael Freeman:
Cyber Security: Are Economic Incentives Adequate? 15-27 - Dan Assaf:
Government Intervention in Information Infrastructure Protection. 29-39
Infrastructure Security
- Han Tang, Bruce M. McMillin
:
Security of Information Flow in the Electric Power Grid. 43-56 - Mark Hartong, Rajni Goel, Duminda Wijesekera:
Securing Positive Train Control Systems. 57-72 - Jill Slay
, Michael Miller:
Lessons Learned from the Maroochy Water Breach. 73-82 - Stig Ole Johnsen, Rune Ask, Randi Roisli:
Reducing Risk in Oil and Gas Production Operations. 83-95
Control Systems Security
- Robert K. Cunningham, Steven Cheung, Martin W. Fong, Ulf Lindqvist
, David M. Nicol, Ronald Pawlowski, Eric Robinson, William H. Sanders, Sankalp Singh, Alfonso Valdes, Bradley Woodworth, Michael Zhivich:
Securing Current and Future Process Control Systems. 99-115 - Rodrigo Chandia, Jesús González, Tim Kilpatrick, Mauricio Papa
, Sujeet Shenoi:
Security Strategies for SCADA Networks. 117-131 - Jeffrey L. Hieb, James H. Graham, Sandip C. Patel:
Security Enhancements for Distributed Control Systems. 133-146 - Suvda Myagmar, Roy H. Campbell, Marianne Winslett:
Security Challenges of Reconfigurable Devices in the Power Grid. 147-160 - Paul W. Oman, Matthew Phillips:
Intrusion Detection and Event Monitoring in SCADA Networks. 161-173 - Jesús González, Mauricio Papa
:
Passive Scanning in Modbus Networks. 175-187 - Bruno Dutertre:
Formal Modeling and Analysis of the Modbus Protocol. 189-204 - Janica Edmonds, Mauricio Papa
, Sujeet Shenoi:
Security Analysis of Multilayer SCADA Protocols. 205-221 - Regis Friend Cassidy, Adrian R. Chavez, Jason Trent, Jorge Mario Urrea:
Remote Forensic Analysis of Process Control Systems. 223-235 - Henrik Christiansson, Eric A. M. Luiijf
:
Creating a European SCADA Security Testbed. 237-247
Network Infrastructure Security
- Yajuan Tang, Xiapu Luo
, Rocky K. C. Chang:
Protecting Internet Services from Low-Rate DoS Attacks. 251-265 - Yurong Xu, Guanling Chen, James Ford, Fillia Makedon:
Detecting Wormhole Attacks in Wireless Sensor Networks. 267-279 - Daniel Cross, Justin Hoeckle, Michael K. Lavine, Jason Rubin, Kevin Snow:
Detecting Non-Discoverable Bluetooth Devices. 281-293
Infrastructure Interdependendencies
- Yacov Y. Haimes, Joost R. Santos
, Kenneth G. Crowther, Matthew Henry, Chenyang Lian, Zhenyu Yan:
Risk Analysis in Interdependent Infrastructures. 297-310 - Roberto Setola
:
Analysis of Interdependencies Between Italy's Economic Sectors. 311-321 - Felix Flentge
, Uwe Beyer:
The ISE Metamodel for Critical Infrastructures. 323-336 - Nils Kalstad Svendsen, Stephen D. Wolthusen:
Multigraph Dependency Models for Heterogeneous Infrastructures. 337-350 - Jason K. Kopylec, Anita D'Amico, John R. Goodall:
Visualizing Cascading Failures in Critical Cyber Infrastructures. 351-364
Risk Assessment
- Marcelo Masera, Igor Nai Fovino:
A Service-Oriented Approach for Assessing Infrastructure Security. 367-379 - Jeffrey S. Simonoff
, Carlos E. Restrepo, Rae Zimmerman, Zvia Naphtali:
Analysis of Electrical Power and Oil and Gas Pipeline Failures. 381-394

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.