


default search action
Critical Infrastructure Protection 2018: Arlington, VA, USA
- Jason Staggs, Sujeet Shenoi:
Critical Infrastructure Protection XII - 12th IFIP WG 11.10 International Conference, ICCIP 2018, Arlington, VA, USA, March 12-14, 2018, Revised Selected Papers. IFIP Advances in Information and Communication Technology 542, Springer 2018, ISBN 978-3-030-04536-4
Themes and Issues
- Richard White:
A Theory of Homeland Security. 3-21 - Atif Hussain, Siraj A. Shaikh
, Alex Chung
, Sneha Dawda, Madeline Carr:
An Evidence Quality Assessment Model for Cyber Security Policymaking. 23-38 - Lynne Graves
, Mark Yampolskiy, Wayne E. King, Sofia Belikovetsky, Yuval Elovici:
Liability Exposure when 3D-Printed Parts Fall from the Sky. 39-64
Infrastructure Protection
- Ammara Gul, Stephen D. Wolthusen:
Error Propagation after Reordering Attacks on Hierarchical State Estimation. 67-79 - Clark Wolfe, Scott R. Graham
, Robert Mills, Scott Nykl, Paul Simon:
Securing Data in Power-Limited Sensor Networks Using Two-Channel Communications. 81-90 - Daniel Celebucki, Scott R. Graham
, Sanjeev Gunawardena:
Reversing a Lattice ECP3 FPGA for Bitstream Protection. 91-111 - Asma Alnemari, Suchith Arodi, Valentina Rodriguez Sosa, Soni Pandey, Carol J. Romanowski, Rajendra K. Raj
, Sumita Mishra
:
Protecting Infrastructure Data via Enhanced Access Control, Blockchain and Differential Privacy. 113-125 - Joshua Lubell:
A New SCAP Information and Data Model for Content Authors. 127-146
Infrastructure Modeling and Simulation
- Rishabh Das, Thomas H. Morris:
Modeling a Midstream Oil Terminal for Cyber Security Risk Evaluation. 149-175 - Marielba Urdaneta, Antoine Lemay, Nicolas Saunier
, José M. Fernandez:
A Cyber-Physical Testbed for Measuring the Impacts of Cyber Attacks on Urban Road Networks. 177-196 - Karl Bentjen, Scott R. Graham
, Scott Nykl:
Persistent Human Control in a Reservation-Based Autonomous Intersection Protocol. 197-212
Industrial Control Systems Security
- Kevin Hemsley, Ronald E. Fisher:
A History of Cyber Incidents and Threats Involving Industrial Control Systems. 215-242 - Eniye Tebekaemi, Duminda Wijesekera, Paulo C. G. Costa
:
An Integrated Control and Intrusion Detection System for Smart Grid Security. 243-264 - Joo-Yeop Song, Woomyo Lee, Jeong-Han Yun, Hyunjae Park, Sin-Kyu Kim, Young-June Choi:
Generating Abnormal Industrial Control Network Traffic for Intrusion Detection System Testing. 265-281 - Luke Bradford, Barry E. Mullins, Stephen Dunlap, Timothy H. Lacey:
Variable Speed Simulation for Accelerated Industrial Control System Cyber Training. 283-306

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.