


default search action
International Journal of Critical Infrastructure Protection, Volume 5
Volume 5, Number 1, March 2012
- Sujeet Shenoi:

Editorial. 1-2
- Sanaz Rahimi, Mehdi R. Zargham:

Analysis of the security of VPN configurations in industrial control environments. 3-13 - Marco Beccuti

, Silvano Chiaradonna, Felicita Di Giandomenico, Susanna Donatelli, Giovanna Dondossola
, Giuliana Franceschinis:
Quantification of dependencies between electrical and information infrastructures. 14-27
- David P. Fidler:

Tinker, Tailor, Soldier, Duqu: Why cyberespionage is more dangerous than you think. 28-29
- Hamed Okhravi

, Adam Comella, Eric Robinson, Joshua W. Haines:
Creating a cyber moving target for critical infrastructure applications using platform diversity. 30-39 - Daniel Guernsey, Mason Rice, Sujeet Shenoi:

Implementing novel reactive defense functionality in MPLS networks using hyperspeed signaling. 40-52
Volume 5, Number 2, July 2012
- Sujeet Shenoi:

Editorial. 53-54
- Ginger Armbruster, Barbara Endicott-Popovsky, Jan Whittington:

Are we prepared for the economic risk resulting from telecom hotel disruptions? 55-65 - Samuel J. Stone, Michael A. Temple:

Radio-frequency-based anomaly detection for programmable logic controllers in the critical infrastructure. 66-73 - Jason Reeves, Ashwin Ramaswamy, Michael E. Locasto, Sergey Bratus, Sean W. Smith:

Intrusion detection for resource-constrained embedded control systems in the power grid. 74-83
- Robert A. Miller:

Cyber war realities - What lies ahead. 84-85
- Marco Castrucci, Alessandro Neri

, Filipe Caldeira
, Jocelyn Aubert
, Djamel Khadraoui, Matthieu Aubigny, Carlo Harpes, Paulo Simões
, Vincenzo Suraci
, Paolo Capodieci:
Design and implementation of a mediation system enabling secure communication among Critical Infrastructures. 86-97 - Casey T. Deccio:

Maintenance, mishaps and mending in deployments of the domain name system security extensions (DNSSEC). 98-103
Volume 5, Numbers 3-4, December 2012
- Sujeet Shenoi:

Editorial. 105-107
- Yakup Koç, Almerima Jamakovic, Bart Gijsen:

A global reference model of the domain name system. 108-117 - Mike Burmester, Emmanouil Magkos, Vassilios Chrissikopoulos:

Modeling security in cyber-physical systems. 118-126 - Gerry Howser, Bruce M. McMillin

:
Modeling and reasoning about the security of drive-by-wire automobile systems. 127-134
- Alec Yasinsac:

Precision in elections - Extracting a precise result from an inherently imprecise process. 135-136
- Cristina Alcaraz

, Javier López
:
Analysis of requirements for critical control systems. 137-145 - Daniel P. Shepard, Todd E. Humphreys

, Aaron A. Fansler:
Evaluation of the vulnerability of phasor measurement units to GPS spoofing attacks. 146-153 - Bradley Reaves, Thomas H. Morris:

Analysis and mitigation of vulnerabilities in short-range wireless communications for industrial control systems. 154-174

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














