default search action
International Journal of Critical Infrastructure Protection, Volume 6
Volume 6, Number 1, March 2013
- Sujeet Shenoi:
Editorial. 1-2
- Cindy Finke, Jonathan Butts, Robert F. Mills, Michael R. Grimaila:
Enhancing the security of aircraft surveillance in the next generation air traffic control system. 3-11 - Jeffrey L. Hieb, Jacob Schreiver, James H. Graham:
A security-hardened appliance for implementing authentication and access control in SCADA infrastructures with legacy field devices. 12-24
- Pramode K. Verma:
The role of the network in implementing security and privacy. 25-27
- Aditya K. Sood, Richard J. Enbody:
Crimeware-as-a-service - A survey of commoditized crimeware in the underground market. 28-38 - Austen D. Givens, Nathan E. Busch:
Realizing the promise of public-private partnerships in U.S. critical infrastructure protection. 39-50 - Adam M. Lewis, David Ward, Lukasz Cyra, Naouma Kourti:
European Reference Network for Critical Infrastructure Protection. 51-60
Volume 6, Number 2, June 2013
- Sujeet Shenoi:
Editorial. 61-62
- Niv Goldenberg, Avishai Wool:
Accurate modeling of Modbus/TCP for intrusion detection in SCADA systems. 63-75 - Zachry Basnight, Jonathan Butts, Juan Lopez Jr., Thomas Dubé:
Firmware modification attacks on programmable logic controllers. 76-84
- Thomas E. Palmatier:
Building secure critical infrastructures. 85-86
- Béla Genge, Christos Siaterlis:
Analysis of the effects of distributed denial-of-service attacks on MPLS networks. 87-95 - Stephen M. Papa, William D. Casper, Tyler Moore:
Securing wastewater facilities from accidental and intentional harm: A cost-benefit analysis. 96-106 - Justin Yates, Sujeevraja Sanjeevi:
A length-based, multiple-resource formulation for shortest path network interdiction problems in the transportation sector. 107-119
Volume 6, Numbers 3-4, December 2013
- Sujeet Shenoi:
Editorial. 121-122
- Ginger Armbruster, Barbara Endicott-Popovsky, Jan Whittington:
Threats to municipal information systems posed by aging infrastructure. 123-131 - Luigi Sportiello:
A methodology for designing robust and efficient hybrid monitoring systems. 132-146
- Tyler Moore:
The promise and perils of digital currencies. 147-149
- Rafael Ramos Regis Barbosa, Ramin Sadre, Aiko Pras:
Flow whitelisting in SCADA networks. 150-158 - Panagiotis Vlacheas, Vera Stavroulaki, Panagiotis Demestichas, Scott Cadzow, Demosthenes Ikonomou, Slawomir Gorniak:
Towards end-to-end network resilience. 159-178
- Eric A. M. Luiijf:
Why are we so unconsciously insecure? 179-181
- Rabindra Nepal, Tooraj Jamasb:
Security of European electricity systems: Conceptualizing the assessment criteria and core indicators. 182-196 - Gabriel J. Correa-Henao, José M. Yusta, Roberto Lacal-Arántegui:
Using interconnected risk maps to assess the threats faced by electricity infrastructures. 197-216 - Stefano Marrone, Roberto Nardone, Annarita Tedesco, Pasquale D'Amore, Valeria Vittorini, Roberto Setola, Francesca De Cillis, Nicola Mazzocca:
Vulnerability modeling and analysis for critical infrastructure protection applications. 217-227
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.