


default search action
Critical Infrastructure Protection 2015: Arlington, VA, USA
- Mason Rice, Sujeet Shenoi:

Critical Infrastructure Protection IX - 9th IFIP 11.10 International Conference, ICCIP 2015, Arlington, VA, USA, March 16-18, 2015, Revised Selected Papers. IFIP Advances in Information and Communication Technology 466, Springer 2015, ISBN 978-3-319-26566-7
Themes and Issues
- Adrian Venables, Siraj Ahmed Shaikh

, James Shuttleworth
:
A Model for Characterizing Cyberpower. 3-16 - Kam-Pui Chow, Ken Yau, Frankie Li:

Cyber Attacks and Political Events: The Case of the Occupy Central Campaign. 17-27 - Eric A. M. Luiijf

, Marieke H. A. Klaver:
On the Sharing of Cyber Security Information. 29-46
Control Systems Security
- Marco Caselli, Emmanuele Zambon, Jonathan Petit, Frank Kargl:

Modeling Message Sequences for Intrusion Detection in Industrial Control Systems. 49-71 - Yong Peng, Chong Xiang, Haihui Gao, Dongqing Chen, Wang Ren:

Industrial Control System Fingerprinting and Anomaly Detection. 73-85 - Seungoh Choi, Yeop Chang, Jeong-Han Yun, Woonyon Kim:

Traffic-Locality-Based Creation of Flow Whitelists for SCADA Networks. 87-102 - W. Owen Redwood, Joshua Lawrence, Mike Burmester:

A Symbolic Honeynet Framework for SCADA System Threat Intelligence. 103-118 - Zach Thornton, Thomas H. Morris:

Enhancing a Virtual SCADA Laboratory Using Simulink. 119-133 - Jonathan Butts, Michael Glover:

How Industrial Control System Security Training is Falling Short. 135-149
Cyber-Physical Systems Security
- Jonathan Jenkins, Mike Burmester:

Runtime Integrity for Cyber-Physical Infrastructures. 153-167 - Mark Yampolskiy, Lena Schutzle, Uday Vaidya, Alec Yasinsac:

Security Challenges of Additive Manufacturing with Metals and Alloys. 169-183 - Gerry Howser:

Using Information Flow Methods to Secure Cyber-Physical Systems. 185-205
Infrastructure Security
- Christopher W. Badenhop, Jonathan D. Fuller

, Joseph Hall, Benjamin W. P. Ramsey, Mason Rice:
Evaluating ITU-T G.9959 Based Wireless Systems Used in Critical Infrastructure Assets. 209-227 - Apurva Mohan, Himanshu Khurana:

Implementing Cyber Security Requirements and Mechanisms in Microgrids. 229-244 - Apurva Mohan, Gregory Brainard, Himanshu Khurana, Scott Fischer:

A Cyber Security Architecture for Microgrid Deployments. 245-259
Infrastructure Modeling and Simulation
- Khaled Al-Utaibi

, Abdullah Alsubaie, José R. Martí:
Allocation and Scheduling of Firefighting Units in Large Petrochemical Complexes. 263-279 - Antonio Di Pietro

, Stefano Panzieri
, Andrea Gasparri
:
Situational Awareness Using Distributed Data Fusion with Evidence Discounting. 281-296
Risk and Impact Assessment
- George Stergiopoulos

, Marianthi Theocharidou
, Panayiotis Kotzanikolaou
, Dimitris Gritzalis:
Using Centrality Measures in Dependency Risk Graphs for Efficient Risk Mitigation. 299-314 - Chiara Foglietta

, Cosimo Palazzo
, Riccardo Santini, Stefano Panzieri
:
Assessing Cyber Risk Using the CISIApro Simulator. 315-331

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














