index - Critical Infrastructure Protection V Access content directly
   


Full Text Documents

Chargement de la page

Search

Chargement de la page

Table of Contents
Critical Infrastructure Protection V
Jonathan Butts, Sujeet Shenoi (Eds.)
Front Matter

THEMES AND ISSUES


Using Deception to Shield Cyberspace Sensors
Mason Rice, Daniel Guernsey, Sujeet Shenoi
3-18
Botnets as an Instrument of Warfare
Eric Koziel, David Robinson
19-28

CONTROL SYSTEMS SECURITY


Lightweight Intrusion Detection for Resource-Constrained Embedded Control Systems
Jason Reeves, Ashwin Ramaswamy, Michael Locasto, Sergey Bratus, Sean Smith
31-46
A Plant-Wide Industrial Process Control Security Problem
Thomas Mcevoy, Stephen Wolthusen
47-56
Identifying Vulnerabilities in SCADA Systems via Fuzz-Testing
Rebecca Shapiro, Sergey Bratus, Edmond Rogers, Sean Smith
57-72
Security Analysis of VPN Configurations in Industrial Control Environments
Sanaz Rahimi, Mehdi Zargham
73-88

INFRASTRUCTURE SECURITY


Implementing Novel Defense Functionality in MPLS Networks Using Hyperspeed Signaling
Sujeet Shenoi, Daniel Guernsey, Mason Rice
91-106
Creating a Cyber Moving Target for Critical Infrastructure Applications
Hamed Okhravi, Adam Comella, Eric Robinson, Stephen Yannalfo, Peter Michaleas, Joshua Haines
107-123
An Evidence-Based Trust Assessment Framework for Critical Infrastructure Decision Making
Yujue Wang, Carl Hauser
125-135
Enhancing the Usability of the Commercial Mobile Alert System
Paul Ngo, Duminda Wijesekera
137-149
Real-Time Detection of Covert Channels in Highly Virtualized Environments
Anyi Liu, Jim Chen, Li Yang
151-164

INFRASTRUCTURE MODELING AND SIMULATION


Analyzing Cyber-Physical Attacks on Networked Industrial Control Systems
Bela Genge, Igor Nai Fovino, Christos Siaterlis, Marcelo Masera
167-183
Using an Emulation Testbed for Operational Cyber Security Exercises
Christos Siaterlis, Andres Perez-Garcia, Marcelo Masera
185-199
Analyzing Intelligence on WMD Attacks Using Threaded Event-Based Simulation
Qi Fang, Peng Liu, John Yen, Jonathan Morgan, Donald Shemanski, Frank Ritter
201-216

 

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/