


default search action
Critical Infrastructure Protection 2011: Hanover, NH, USA
- Jonathan Butts, Sujeet Shenoi:
Critical Infrastructure Protection V - 5th IFIP WG 11.10 International Conference on Critical Infrastructure Protection, ICCIP 2011, Hanover, NH, USA, March 23-25, 2011, Revised Selected Papers. IFIP Advances in Information and Communication Technology 367, Springer 2011, ISBN 978-3-642-24863-4
Themes and Issues
- Mason Rice, Daniel Guernsey, Sujeet Shenoi:
Using Deception to Shield Cyberspace Sensors. 3-18 - Eric Koziel, David Robinson:
Botnets as an Instrument of Warfare. 19-28
Control Systems Security
- Jason Reeves, Ashwin Ramaswamy, Michael E. Locasto, Sergey Bratus, Sean W. Smith:
Lightweight Intrusion Detection for Resource-Constrained Embedded Control Systems. 31-46 - Thomas Richard McEvoy, Stephen D. Wolthusen:
A Plant-Wide Industrial Process Control Security Problem. 47-56 - Rebecca Shapiro, Sergey Bratus, Edmond Rogers, Sean W. Smith:
Identifying Vulnerabilities in SCADA Systems via Fuzz-Testing. 57-72 - Sanaz Rahimi, Mehdi R. Zargham:
Security Analysis of VPN Configurations in Industrial Control Environments. 73-88
Infrastructure Security
- Daniel Guernsey, Mason Rice, Sujeet Shenoi:
Implementing Novel Defense Functionality in MPLS Networks Using Hyperspeed Signaling. 91-106 - Hamed Okhravi
, Adam Comella, Eric Robinson, Stephen Yannalfo, Peter Michaleas, Joshua W. Haines:
Creating a Cyber Moving Target for Critical Infrastructure Applications. 107-123 - Yujue Wang, Carl Hauser:
An Evidence-Based Trust Assessment Framework for Critical Infrastructure Decision Making. 125-135 - Paul Ngo, Duminda Wijesekera:
Enhancing the Usability of the Commercial Mobile Alert System. 137-149 - Anyi Liu, Jim X. Chen, Li Yang:
Real-Time Detection of Covert Channels in Highly Virtualized Environments. 151-164
Infrastructure Modeling and Simulation
- Béla Genge, Igor Nai Fovino, Christos Siaterlis, Marcelo Masera:
Analyzing Cyber-Physical Attacks on Networked Industrial Control Systems. 167-183 - Christos Siaterlis, Andres Perez-Garcia, Marcelo Masera:
Using an Emulation Testbed for Operational Cyber Security Exercises. 185-199 - Qi Fang, Peng Liu, John Yen, Jonathan H. Morgan, Donald Shemanski, Frank E. Ritter:
Analyzing Intelligence on WMD Attacks Using Threaded Event-Based Simulation. 201-216

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.