default search action
Critical Infrastructure Protection 2014: Arlington, VA, USA
- Jonathan Butts, Sujeet Shenoi:
Critical Infrastructure Protection VIII - 8th IFIP WG 11.10 International Conference, ICCIP 2014, Arlington, VA, USA, March 17-19, 2014, Revised Selected Papers. IFIP Advances in Information and Communication Technology 441, Springer 2014, ISBN 978-3-662-45354-4
Control Systems Security
- Chad Arnold, Jonathan Butts, Krishnaprasad Thirunarayan:
Detecting Integrity Attacks on Industrial Control Systems. 3-13 - Carlos Aguayo Gonzalez, Alan Hinton:
Detecting Malicious Software Execution in Programmable Logic Controllers Using Power Fingerprinting. 15-27 - Marina Krotofil, Alvaro A. Cárdenas, Kishore Angrishi:
Timing of Cyber-Physical Attacks on Process Control Systems. 29-45 - Cristina Alcaraz, Stephen D. Wolthusen:
Recovery of Structural Controllability for Control Systems. 47-63 - Thomas H. Morris, Wei Gao:
Industrial Control System Traffic Data Sets for Intrusion Detection Research. 65-78 - Haihui Gao, Yong Peng, Zhonghua Dai, Ting Wang, Xuefeng Han, Hanjing Li:
An Industrial Control System Testbed Based on Emulation, Physical Devices and Simulation. 79-91
Infrastructure Security
- Riccardo Santini, Chiara Foglietta, Stefano Panzieri:
Evidence Theory for Cyber-Physical Systems. 95-109 - Mohammad Ababneh, Malek Athamnah, Duminda Wijesekera, Paulo C. G. Costa:
An Automated Dialog System for Conducting Security Interviews for Access Control. 111-125 - William Hurst, Madjid Merabti, Paul Fergus:
A Survey of Critical Infrastructure Security. 127-138
Infrastructure Modeling and Simulation
- Simona Cavallini, Cristina d'Alessandro, Margherita Volpe, Stefano Armenia, Camillo Carlini, Elisabeth Brein, Pierluigi Assogna:
A System Dynamics Framework for Modeling Critical Infrastructure Resilience. 141-154 - Mohammed Talat Khouj, Sarbjit Sarkaria, Cesar Lopez Castellanos, José R. Martí:
Reinforcement Learning Using Monte Carlo Policy Estimation for Disaster Mitigation. 155-172 - Okan Pala, David C. Wilson, Russell Bent, Steve Linger, James Arnold:
Accuracy of Service Area Estimation Methods Used for Critical Infrastructure Recovery. 173-191
Risk and Impact Assessment
- Richard White, Aaron Burkhart, Edward Chow, Logan Maynard:
A Decision Support Tool for a Unified Homeland Security Strategy. 195-211 - Valerio Formicola, Antonio Di Pietro, Abdullah Alsubaie, Salvatore D'Antonio, José R. Martí:
Assessing the Impact of Cyber Attacks on Wireless Sensor Nodes That Monitor Interdependent Physical Systems. 213-229 - Simona Cavallini, Fabio Bisogni, Marco Bardoscia, Roberto Bellotti:
Assessing Potential Casualties in Critical Events. 231-242
Advanced Techniques
- Richard Agbeyibor, Jonathan Butts, Michael R. Grimaila, Robert F. Mills:
Evaluation of Format- Preserving Encryption Algorithms for Critical Infrastructure Protection. 245-261 - Goitom Weldehawaryat, Stephen D. Wolthusen:
Asynchronous Binary Byzantine Consensus over Graphs with Power-Law Degree Sequence. 263-276
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.