


default search action
Critical Infrastructure Protection 2010: Washington, DC, USA
- Tyler Moore, Sujeet Shenoi:
Critical Infrastructure Protection IV - Fourth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, ICCIP 2010, Washington, DC, USA, March 15-17, 2010, Revised Selected Papers. IFIP Advances in Information and Communication Technology 342, Springer 2010, ISBN 978-3-642-16805-5
Thems and Issues
- Neil Robinson, Dimitris Potoglou
, Chong Kim, Peter Burge
, Richard Warnes:
Security At What Cost? 3-15 - Dan Assaf:
Foreign Direct Investment in an Era of Increased Threats to Critical Infrastructures. 17-27 - Ian Ellefsen, Sebastiaan H. von Solms:
Critical Information Infrastructure Protection in the Developing World. 29-40
Control Systems Security
- Jonathan Butts, Mason Rice, Sujeet Shenoi:
Modeling Control System Failures and Attacks - The Waterloo Campaign to Oil Pipelines. 43-62 - Rouslan Solomakhin, Patrick P. Tsang, Sean W. Smith:
High Security with Low Latency in Legacy SCADA Systems. 63-79 - Thomas Richard McEvoy
, Stephen D. Wolthusen:
Detecting Sensor Signal Manipulations in Non-Linear Chemical Processes. 81-94 - Igor Nai Fovino, Marcelo Masera, Michele Guglielmi, Andrea Carcano, Alberto Trombetta
:
Distributed Intrusion Detection System for SCADA Protocols. 95-110
Infrastructure Security
- Ray Klump, Matthew Kwiatkowski:
Distributed IP Watchlist Generation for Intrusion Detection in the Electrical Smart Grid. 113-126 - Daniel Guernsey, Aaron Engel, Jonathan Butts, Sujeet Shenoi:
Security Analysis of the MPLS Label Distribution Protocol. 127-139 - Mark Hartong, Rajni Goel, Duminda Wijesekera:
U.S. Federal Oversight of Rail Transportation of Toxic by Inhalation Materials. 141-155 - María Jesús Álvarez, Ainara Alvarez, Maria Carla De Maggio, Ainhoa Oses, Marcella Trombetta
, Roberto Setola
:
Protecting the Food Supply Chain from Terrorist Attack. 157-167
Infrastructure Modeling and Simulation
- Nils Lunden, Robin Sveen, Hans Lund, Nils Kalstad Svendsen, Stephen D. Wolthusen:
Interactive Visualization of Interdependencies and Vulnerabilities in Constrained Environments. 171-183 - Fabio Bisogni, Simona Cavallini
:
Assessing the Economic Loss and Social Impact of Information System Breakdowns. 185-198 - Zaw Zaw Aung, Kenji Watanabe:
Modeling Inoperability Propagation Using Bayesian Networks. 199-212
Risk Management
- Stig Ole Johnsen:
Resilience in Risk Analysis and Risk Assessment. 215-227 - Thomas Brandstetter, Konstantin Knorr, Ute Rosenbaum:
A Manufacturer-Specific Security Assessment Methodology for Critical Infrastructure Components. 229-244 - Yousu Chen
, Zhenyu Huang, Pak Chung Wong, Patrick Mackey, Craig Allwardt, Jian Ma, Frank L. Greitzer:
An Advanced Decision-Support Tool for Electricity Infrastructure Operations. 245-260

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.