Full Text Documents

Search


Table of Contents
Book Title (Part xxx)
Scientific Editor 1, Scientific Editor2 (Eds.)
Front Matter

Themes and Issues


A Model for Characterizing Cyberpower
Adrian Venables, Siraj Shaikh, James Shuttleworth
3-16
Cyber Attacks and Political Events: The Case of the Occupy Central Campaign
Kam-Pui Chow, Ken Yau, Frankie Li
17-27
On the Sharing of Cyber Security Information
Eric Luiijf, Marieke Klaver
29-46

Control Systems Security


Modeling Message Sequences for Intrusion Detection in Industrial Control Systems
Marco Caselli, Emmanuele Zambon, Jonathan Petit, Frank Kargl
49-71
Industrial Control System Fingerprinting and Anomaly Detection
Yong Peng, Chong Xiang, Haihui Gao, Dongqing Chen, Wang Ren
73-85
Traffic-Locality-Based Creation of Flow Whitelists for SCADA Networks
Seungoh Choi, Yeop Chang, Jeong-Han Yun, Woonyon Kim
87-102
A Symbolic Honeynet Framework for SCADA System Threat Intelligence
Owen Redwood, Joshua Lawrence, Mike Burmester
103-118
Enhancing a Virtual SCADA Laboratory Using Simulink
Zach Thornton, Thomas Morris
119-133
How Industrial Control System Security Training is Falling Short
Jonathan Butts, Michael Glover
135-149

Cyber-Physical Systems Security


Runtime Integrity for Cyber-Physical Infrastructures
Jonathan Jenkins, Mike Burmester
153-167
Security Challenges of Additive Manufacturing with Metals and Alloys
Mark Yampolskiy, Lena Schutzle, Uday Vaidya, Alec Yasinsac
169-183
Using Information Flow Methods to Secure Cyber-Physical Systems
Gerry Howser
185-205

Infrastructure Security


Evaluating ITU-T G.9959 Based Wireless Systems Used in Critical Infrastructure Assets
Christopher Badenhop, Jonathan Fuller, Joseph Hall, Benjamin Ramsey, Mason Rice
209-227
Implementing Cyber Security Requirements and Mechanisms in Microgrids
Apurva Mohan, Himanshu Khurana
229-244
A Cyber Security Architecture for Microgrid Deployments
Apurva Mohan, Gregory Brainard, Himanshu Khurana, Scott Fischer
245-259

Infrastructure Modeling and Simulation


Allocation and Scheduling of Firefighting Units in Large Petrochemical Complexes
Khaled Alutaibi, Abdullah Alsubaie, Jose Marti
263-279
Situational Awareness Using Distributed Data Fusion with Evidence Discounting
Antonio Pietro, Stefano Panzieri, Andrea Gasparri
281-296

Risk and Impact Assessment


Using Centrality Measures in Dependency Risk Graphs for Efficient Risk Mitigation
George Stergiopoulos, Marianthi Theocharidou, Panayiotis Kotzanikolaou, Dimitris Gritzalis
299-314
Assessing Cyber Risk Using the CISIApro Simulator
Chiara Foglietta, Cosimo Palazzo, Riccardo Santini, Stefano Panzieri
315-331

 

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/