index - Critical Infrastructure Protection VIII Access content directly
   


Full Text Documents

Chargement de la page

Search

Chargement de la page

Table of Contents
Critical Infrastructure Protection VIII
Jonathan Butts, Sujeet Shenoi (Eds.)
Front Matter

Control Systems Security


Detecting Integrity Attacks on Industrial Control Systems
Chad Arnold, Jonathan Butts, Krishnaprasad Thirunarayan
3-13
Detecting Malicious Software Execution in Programmable Logic Controllers Using Power Fingerprinting
Carlos Aguayo Gonzalez, Alan Hinton
15-27
Timing of Cyber-Physical Attacks on Process Control Systems
Marina Krotofil, Alvaro Cardenas, Kishore Angrishi
29-45
Recovery of Structural Controllability for Control Systems
Cristina Alcaraz, Stephen Wolthusen
47-63
Industrial Control System Traffic Data Sets for Intrusion Detection Research
Thomas Morris, Wei Gao
65-78
An Industrial Control System Testbed Based on Emulation, Physical Devices and Simulation
Haihui Gao, Yong Peng, Zhonghua Dai, Ting Wang, Xuefeng Han, Hanjing Li
79-91

Infrastructure Security


Evidence Theory for Cyber-Physical Systems
Riccardo Santini, Chiara Foglietta, Stefano Panzieri
95-109
An Automated Dialog System for Conducting Security Interviews for Access Control
Mohammad Ababneh, Malek Athamnah, Duminda Wijesekera, Paulo Costa
111-125
A Survey of Critical Infrastructure Security
William Hurst, Madjid Merabti, Paul Fergus
127-138

Infrastructure Modeling and Simulation


A System Dynamics Framework for Modeling Critical Infrastructure Resilience
Simona Cavallini, Cristina D’alessandro, Margherita Volpe, Stefano Armenia, Camillo Carlini, Elisabeth Brein, Pierluigi Assogna
141-154
Reinforcement Learning Using Monte Carlo Policy Estimation for Disaster Mitigation
Mohammed Khouj, Sarbjit Sarkaria, Cesar Lopez, Jose Marti
155-172
Accuracy of Service Area Estimation Methods Used for Critical Infrastructure Recovery
Okan Pala, David Wilson, Russell Bent, Steve Linger, James Arnold
173-191

Risk and Impact Assessment


A Decision Support Tool for a Unified Homeland Security Strategy
Richard White, Aaron Burkhart, Edward Chow, Logan Maynard
195-211
Assessing the Impact of Cyber Attacks on Wireless Sensor Nodes That Monitor Interdependent Physical Assessing the Impact of Cyber Attacks on Wireless Sensor Nodes That Monitor Interdependent Physical Systems
Valerio Formicola, Antonio Pietro, Abdullah Alsubaie, Salvatore D’antonio, Jose Marti
213-229
Assessing Potential Casualties in Critical Events
Simona Cavallini, Fabio Bisogni, Marco Bardoscia, Roberto Bellotti
231-242

Advanced Techniques


Evaluation of Format- Preserving Encryption Algorithms for Critical Infrastructure Protection
Richard Agbeyibor, Jonathan Butts, Michael Grimaila, Robert Mills
245-261
Asynchronous Binary Byzantine Consensus over Graphs with Power-Law Degree Sequence
Goitom Weldehawaryat, Stephen Wolthusen
263-276

 

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/