default search action
Critical Infrastructure Protection 2019: Arlington, VA, USA
- Jason Staggs, Sujeet Shenoi:
Critical Infrastructure Protection XIII - 13th IFIP WG 11.10 International Conference, ICCIP 2019, Arlington, VA, USA, March 11-12, 2019, Revised Selected Papers. IFIP Advances in Information and Communication Technology 570, Springer 2019, ISBN 978-3-030-34646-1
Themes and Issues
- Siddharth Dongre, Sumita Mishra, Carol J. Romanowski, Manan Buddhadev:
Quantifying the Costs of Data Breaches. 3-16
Infrastructure Protection
- Michael Locasto, David M. Balenson:
A Comparative Analysis Approach for Deriving Failure Scenarios in the Natural Gas Distribution Infrastructure. 19-50 - Matthew Jablonski, Yongxin Wang, Chaitanya Yavvari, Zezhou Wang, Xiang Liu, Keith Holt, Duminda Wijesekera:
An Attack-Fault Tree Analysis of a Movable Railroad Bridge. 51-71 - Michael C. Millian, Prashant Anantharaman, Sergey Bratus, Sean W. Smith, Michael E. Locasto:
Converting an Electric Power Utility Network to Defend Against Crafted Inputs. 73-85 - Trevor MacLean, Robert Borrelli, Michael Haney:
Cyber Security Modeling of Non-Critical Nuclear Power Plant Digital Instrumentation. 87-100
Vehicle Infrastructure Security
- Rahn Lassiter, Scott R. Graham, Timothy J. Carbino, Stephen Dunlap:
Electronic Control Unit Discrimination Using Wired Signal Distinct Native Attributes. 103-121 - Kenneth Hacker, Scott R. Graham, Stephen Dunlap:
Vehicle Identification and Route Reconstruction via TPMS Data Leakage. 123-136 - Luis Cintron, Scott R. Graham, Douglas D. Hodson, Barry E. Mullins:
Modeling Liability Data Collection Systems for Intelligent Transportation Infrastructure Using Hyperledger Fabric. 137-156
Telecommunications Infrastructure Security
- Jason Staggs, Sujeet Shenoi:
Securing Wireless Coprocessors from Attacks in the Internet of Things. 159-178 - Daryl Schmitt, Scott R. Graham, Patrick Sweeney, Robert F. Mills:
Vulnerability Assessment of InfiniBand Networking. 179-205
Cyber-Physical Systems Security
- Michael A. Haney:
Leveraging Cyber-Physical System Honeypots to Enhance Threat Intelligence. 209-233 - J. Peter Brady, Sergey Bratus, Sean W. Smith:
Dynamic Repair of Mission-Critical Applications with Runtime Snap-Ins. 235-252 - Seungoh Choi, Yesol Kim, Jeong-Han Yun, Byung-Gil Min, HyoungChun Kim:
Data-Driven Field Mapping of Security Logs for Integrated Monitoring. 253-268
Industrial Control Systems Security
- Mehdi Sabraoui, Jeffrey L. Hieb, Adrian P. Lauf, James Graham:
Modeling and Machine-Checking Bump-in-the-Wire Security for Industrial Control Systems. 271-288 - Raymond Chan, Kam-Pui Chow, Chun-Fai Chan:
Defining Attack Patterns for Industrial Control Systems. 289-309 - Ken Yau, Kam-Pui Chow, Siu-Ming Yiu:
An Incident Response Model for Industrial Control System Forensics Based on Historical Events. 311-328
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.