default search action
Critical Infrastructure Protection 2022: Virtual Event
- Jason Staggs, Sujeet Shenoi:
Critical Infrastructure Protection XVI - 16th IFIP WG 11.10 International Conference, ICCIP 2022, Virtual Event, March 14-15, 2022, Revised Selected Papers. IFIP Advances in Information and Communication Technology 666, Springer 2022, ISBN 978-3-031-20136-3
Themes and Issues
- Neal Ziring:
National Cyber Resilience and Roles for Public and Private Sector Stakeholders. 3-46 - Øyvind Anders Arntzen Toftegaard, Janne Merete Hagen, Bernhard M. Hämmerli:
Are European Security Policies Ready for Advanced Metering Systems with Cloud Back-Ends? 47-69
Industrial Control Systems Security
- Laura Tinnel, Ulf Lindqvist:
Importance of Cyber Security Analysis in the Operational Technology System Lifecycle. 73-101 - James Cervini, Daniel Muller, Alexander Beall, Joseph Maurio, Aviel Rubin, Lanier A. Watkins:
Trusted Virtualization-Based Programmable Logic Controller Resilience Using a Backfit Approach. 103-117
Additive Manufacturing Systems
- Alyxandra Van Stockum, Elizabeth Kurkowski, Tiffany Potok, Curtis Taylor, Joel A. Dawson, Mason Rice, Sujeet Shenoi:
Attack-Defense Modeling of Material Extrusion Additive Manufacturing Systems. 121-153 - Elizabeth Kurkowski, Alyxandra Van Stockum, Joel A. Dawson, Curtis Taylor, Tricia Schulz, Sujeet Shenoi:
Manipulation of G-Code Toolpath Files in 3D Printers: Attacks and Mitigations. 155-174 - Elizabeth Kurkowski, Mason Rice, Sujeet Shenoi:
Detecting Part Anomalies Induced by Cyber Attacks on a Powder BED Fusion Additive Manufacturing System. 175-203 - Muhammad Haris Rais, Muhammad Ahsan, Vaibhav Sharma, Radhika Barua, Rob Prins, Irfan Ahmed:
Low-Magnitude Infill Structure Manipulation Attacks on Fused Filament Fabrication 3D Printers. 205-232
Infrastructure Device Security
- Samuel Chadwick, Scott R. Graham, James Dean, Matthew Dallmeyer:
Leveraging Confidential Computing to Enable Secure Information Sharing. 235-252 - Calvin Muramoto, Scott R. Graham, Stephen Dunlap:
Evaluating the Use of Boot Image Encryption on the TALOS II Architecture. 253-273
Telecommunications Systems Security
- Noah Diamond, Scott R. Graham, Gilbert Clark:
Securing Infiniband Traffic with Bluefield-2 Data Processing Units. 277-300
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.