HAL will be down for maintenance from Friday, June 10 at 4pm through Monday, June 13 at 9am. More information
Skip to Main content Skip to Navigation

Full Text Documents

Chargement de la page


Chargement de la page

Table of Contents
Critical Infrastructure Protection XI
Mason Rice, Sujeet Shenoi
Front Matter

Infrastructure protection

Protecting the transportation sector from the negative impacts of climate change
Georgia Lykou, George Stergiopoulos, Antonios Papachrysanthou, Dimitris Gritzalis
Evaluation of additive and subtractive manufacturing from the security perspective
Mark Yampolskiy, Wayne King, Gregory Pope, Sofia Belikovetsky, Yuval Elovici
Detecting data manipulation attacks on the substation interlocking function using direct power feedback
Eniye Tebekaemi, Edward Colbert, Duminda Wijesekera
Network forensic analysis of electrical substation automation traffic
Megan Leierzapf, Julian Rrushi

Infrastructure modeling and simulation

Multiple security domain model of a vehicle in an automated platoon
Uday Kanteti, Bruce Mcmillin
Distributed data fusion for situational awareness in critical infrastructures with link failures
Antonio Pietro, Stefano Panzieri, Andrea Gasparri
Exploiting web ontologies for automated critical infrastructure data retrieval
Luca Galbusera, Georgios Giannopoulos

Industrial control system security

Enforcing end-to-end security in scada systems via application-level cryptography
Adrian-Vasile Duka, Bela Genge, Piroska Haller, Bogdan Crainicu
Software defined response and network reconfiguration for industrial control systems
Hunor Sandor, Bela Genge, Piroska Haller, Flavius Graur
Threat analysis of an elevator control system
Raymond Chan, Kam-Pui Chow
Generating honeypot traffic for industrial control systems
Htein Lin, Stephen Dunlap, Mason Rice, Barry Mullins
Challenges to automating security configuration checklists in manufacturing environments
Joshua Lubell, Timothy Zimmerman
Categorization of cyber training environments for industrial control systems
Evan Plumley, Mason Rice, Stephen Dunlap, John Pecarina
Multi-controller exercise environments for training industrial control system first responders
Joseph Daoud, Mason Rice, Stephen Dunlap, John Pecarina

Internet of things security

Defending building automation systems using decoy networks
Caleb Mays, Mason Rice, Benjamin Ramsey, John Pecarina, Barry Mullins
Securing bluetooth low energy locks from unauthorizedaccess and surveillance
Anthony Rose, Jason Bindewald, Benjamin Ramsey, Mason Rice, Barry Mullins



Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/