


default search action
Critical Infrastructure Protection 2007: Hanover, New Hampshire, USA
- Eric Goetz, Sujeet Shenoi:

Critical Infrastructure Protection, Post-Proceedings of the First Annual IFIP Working Group 11.10 International Conference on Critical Infrastructure Protection, Dartmouth College, Hanover, New Hampshire, USA, March 19-21, 2007. IFIP 253, Springer 2007, ISBN 978-0-387-75461-1
Themes and Issues
- Neil Robinson, Lorenzo Valeri:

On the Security Implications of Disruptive Technologies. 3-14 - Scott Dynes, Eric Goetz, Michael Freeman:

Cyber Security: Are Economic Incentives Adequate? 15-27 - Dan Assaf:

Government Intervention in Information Infrastructure Protection. 29-39
Infrastructure Security
- Han Tang, Bruce M. McMillin

:
Security of Information Flow in the Electric Power Grid. 43-56 - Mark Hartong, Rajni Goel, Duminda Wijesekera:

Securing Positive Train Control Systems. 57-72 - Jill Slay

, Michael Miller:
Lessons Learned from the Maroochy Water Breach. 73-82 - Stig Ole Johnsen, Rune Ask, Randi Roisli:

Reducing Risk in Oil and Gas Production Operations. 83-95
Control Systems Security
- Robert K. Cunningham, Steven Cheung, Martin W. Fong, Ulf Lindqvist

, David M. Nicol, Ronald Pawlowski, Eric Robinson, William H. Sanders, Sankalp Singh, Alfonso Valdes, Bradley Woodworth, Michael Zhivich:
Securing Current and Future Process Control Systems. 99-115 - Rodrigo Chandia, Jesús González, Tim Kilpatrick, Mauricio Papa

, Sujeet Shenoi:
Security Strategies for SCADA Networks. 117-131 - Jeffrey L. Hieb

, James H. Graham, Sandip C. Patel:
Security Enhancements for Distributed Control Systems. 133-146 - Suvda Myagmar, Roy H. Campbell, Marianne Winslett:

Security Challenges of Reconfigurable Devices in the Power Grid. 147-160 - Paul W. Oman, Matthew Phillips:

Intrusion Detection and Event Monitoring in SCADA Networks. 161-173 - Jesús González, Mauricio Papa

:
Passive Scanning in Modbus Networks. 175-187 - Bruno Dutertre:

Formal Modeling and Analysis of the Modbus Protocol. 189-204 - Janica Edmonds, Mauricio Papa

, Sujeet Shenoi:
Security Analysis of Multilayer SCADA Protocols. 205-221 - Regis Friend Cassidy, Adrian R. Chavez, Jason Trent, Jorge Mario Urrea:

Remote Forensic Analysis of Process Control Systems. 223-235 - Henrik Christiansson, Eric A. M. Luiijf

:
Creating a European SCADA Security Testbed. 237-247
Network Infrastructure Security
- Yajuan Tang, Xiapu Luo

, Rocky K. C. Chang:
Protecting Internet Services from Low-Rate DoS Attacks. 251-265 - Yurong Xu, Guanling Chen, James Ford, Fillia Makedon:

Detecting Wormhole Attacks in Wireless Sensor Networks. 267-279 - Daniel Cross, Justin Hoeckle, Michael K. Lavine, Jason Rubin, Kevin Snow:

Detecting Non-Discoverable Bluetooth Devices. 281-293
Infrastructure Interdependendencies
- Yacov Y. Haimes, Joost R. Santos

, Kenneth G. Crowther, Matthew Henry, Chenyang Lian, Zhenyu Yan:
Risk Analysis in Interdependent Infrastructures. 297-310 - Roberto Setola

:
Analysis of Interdependencies Between Italy's Economic Sectors. 311-321 - Felix Flentge

, Uwe Beyer:
The ISE Metamodel for Critical Infrastructures. 323-336 - Nils Kalstad Svendsen, Stephen D. Wolthusen:

Multigraph Dependency Models for Heterogeneous Infrastructures. 337-350 - Jason K. Kopylec, Anita D'Amico, John R. Goodall:

Visualizing Cascading Failures in Critical Cyber Infrastructures. 351-364
Risk Assessment
- Marcelo Masera, Igor Nai Fovino:

A Service-Oriented Approach for Assessing Infrastructure Security. 367-379 - Jeffrey S. Simonoff

, Carlos E. Restrepo, Rae Zimmerman, Zvia Naphtali:
Analysis of Electrical Power and Oil and Gas Pipeline Failures. 381-394

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














