Full Text Documents

Search


Table of Contents
Critical Infrastructure Protection XI
Mason Rice, Sujeet Shenoi
Front Matter

Infrastructure protection


Protecting the transportation sector from the negative impacts of climate change
Georgia Lykou, George Stergiopoulos, Antonios Papachrysanthou, Dimitris Gritzalis
3-21
Evaluation of additive and subtractive manufacturing from the security perspective
Mark Yampolskiy, Wayne King, Gregory Pope, Sofia Belikovetsky, Yuval Elovici
23-44
Detecting data manipulation attacks on the substation interlocking function using direct power feedback
Eniye Tebekaemi, Edward Colbert, Duminda Wijesekera
45-62
Network forensic analysis of electrical substation automation traffic
Megan Leierzapf, Julian Rrushi
63-78

Infrastructure modeling and simulation


Multiple security domain model of a vehicle in an automated platoon
Uday Kanteti, Bruce Mcmillin
81-97
Distributed data fusion for situational awareness in critical infrastructures with link failures
Antonio Pietro, Stefano Panzieri, Andrea Gasparri
99-117
Exploiting web ontologies for automated critical infrastructure data retrieval
Luca Galbusera, Georgios Giannopoulos
119-136

Industrial control system security


Enforcing end-to-end security in scada systems via application-level cryptography
Adrian-Vasile Duka, Bela Genge, Piroska Haller, Bogdan Crainicu
139-155
Software defined response and network reconfiguration for industrial control systems
Hunor Sandor, Bela Genge, Piroska Haller, Flavius Graur
157-173
Threat analysis of an elevator control system
Raymond Chan, Kam-Pui Chow
175-192
Generating honeypot traffic for industrial control systems
Htein Lin, Stephen Dunlap, Mason Rice, Barry Mullins
193-223
Challenges to automating security configuration checklists in manufacturing environments
Joshua Lubell, Timothy Zimmerman
225-241
Categorization of cyber training environments for industrial control systems
Evan Plumley, Mason Rice, Stephen Dunlap, John Pecarina
243-271
Multi-controller exercise environments for training industrial control system first responders
Joseph Daoud, Mason Rice, Stephen Dunlap, John Pecarina
273-294

Internet of things security


Defending building automation systems using decoy networks
Caleb Mays, Mason Rice, Benjamin Ramsey, John Pecarina, Barry Mullins
297-317
Securing bluetooth low energy locks from unauthorizedaccess and surveillance
Anthony Rose, Jason Bindewald, Benjamin Ramsey, Mason Rice, Barry Mullins
319-338

 

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/