


default search action
Critical Infrastructure Protection 2015: Arlington, VA, USA
- Mason Rice, Sujeet Shenoi:
Critical Infrastructure Protection IX - 9th IFIP 11.10 International Conference, ICCIP 2015, Arlington, VA, USA, March 16-18, 2015, Revised Selected Papers. IFIP Advances in Information and Communication Technology 466, Springer 2015, ISBN 978-3-319-26566-7
Themes and Issues
- Adrian Venables, Siraj Ahmed Shaikh
, James Shuttleworth
:
A Model for Characterizing Cyberpower. 3-16 - Kam-Pui Chow, Ken Yau, Frankie Li:
Cyber Attacks and Political Events: The Case of the Occupy Central Campaign. 17-27 - Eric A. M. Luiijf
, Marieke H. A. Klaver:
On the Sharing of Cyber Security Information. 29-46
Control Systems Security
- Marco Caselli, Emmanuele Zambon, Jonathan Petit, Frank Kargl:
Modeling Message Sequences for Intrusion Detection in Industrial Control Systems. 49-71 - Yong Peng, Chong Xiang, Haihui Gao, Dongqing Chen, Wang Ren:
Industrial Control System Fingerprinting and Anomaly Detection. 73-85 - Seungoh Choi, Yeop Chang, Jeong-Han Yun, Woonyon Kim:
Traffic-Locality-Based Creation of Flow Whitelists for SCADA Networks. 87-102 - W. Owen Redwood, Joshua Lawrence, Mike Burmester:
A Symbolic Honeynet Framework for SCADA System Threat Intelligence. 103-118 - Zach Thornton, Thomas H. Morris:
Enhancing a Virtual SCADA Laboratory Using Simulink. 119-133 - Jonathan Butts, Michael Glover:
How Industrial Control System Security Training is Falling Short. 135-149
Cyber-Physical Systems Security
- Jonathan Jenkins, Mike Burmester:
Runtime Integrity for Cyber-Physical Infrastructures. 153-167 - Mark Yampolskiy, Lena Schutzle, Uday Vaidya, Alec Yasinsac:
Security Challenges of Additive Manufacturing with Metals and Alloys. 169-183 - Gerry Howser:
Using Information Flow Methods to Secure Cyber-Physical Systems. 185-205
Infrastructure Security
- Christopher W. Badenhop, Jonathan D. Fuller
, Joseph Hall, Benjamin W. P. Ramsey, Mason Rice:
Evaluating ITU-T G.9959 Based Wireless Systems Used in Critical Infrastructure Assets. 209-227 - Apurva Mohan, Himanshu Khurana:
Implementing Cyber Security Requirements and Mechanisms in Microgrids. 229-244 - Apurva Mohan, Gregory Brainard, Himanshu Khurana, Scott Fischer:
A Cyber Security Architecture for Microgrid Deployments. 245-259
Infrastructure Modeling and Simulation
- Khaled Al-Utaibi
, Abdullah Alsubaie, José R. Martí:
Allocation and Scheduling of Firefighting Units in Large Petrochemical Complexes. 263-279 - Antonio Di Pietro
, Stefano Panzieri
, Andrea Gasparri
:
Situational Awareness Using Distributed Data Fusion with Evidence Discounting. 281-296
Risk and Impact Assessment
- George Stergiopoulos
, Marianthi Theocharidou
, Panayiotis Kotzanikolaou
, Dimitris Gritzalis:
Using Centrality Measures in Dependency Risk Graphs for Efficient Risk Mitigation. 299-314 - Chiara Foglietta
, Cosimo Palazzo
, Riccardo Santini, Stefano Panzieri
:
Assessing Cyber Risk Using the CISIApro Simulator. 315-331

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.