Table of Contents
|
Critical Infrastructure Protection V Jonathan Butts, Sujeet Shenoi (Eds.)
|
Front Matter |
THEMES AND ISSUES
|
Using Deception to Shield Cyberspace Sensors Mason Rice, Daniel Guernsey, Sujeet Shenoi |
3-18 |
Botnets as an Instrument of Warfare Eric Koziel, David Robinson |
19-28 |
CONTROL SYSTEMS SECURITY
|
Lightweight Intrusion Detection for Resource-Constrained Embedded Control Systems Jason Reeves, Ashwin Ramaswamy, Michael Locasto, Sergey Bratus, Sean Smith |
31-46 |
A Plant-Wide Industrial Process Control Security Problem Thomas Mcevoy, Stephen Wolthusen |
47-56 |
Identifying Vulnerabilities in SCADA Systems via Fuzz-Testing Rebecca Shapiro, Sergey Bratus, Edmond Rogers, Sean Smith |
57-72 |
Security Analysis of VPN Configurations in Industrial Control Environments Sanaz Rahimi, Mehdi Zargham |
73-88 |
INFRASTRUCTURE SECURITY
|
Implementing Novel Defense Functionality in MPLS Networks Using Hyperspeed Signaling Sujeet Shenoi, Daniel Guernsey, Mason Rice |
91-106 |
Creating a Cyber Moving Target for Critical Infrastructure Applications Hamed Okhravi, Adam Comella, Eric Robinson, Stephen Yannalfo, Peter Michaleas, Joshua Haines |
107-123 |
An Evidence-Based Trust Assessment Framework for Critical Infrastructure Decision Making Yujue Wang, Carl Hauser |
125-135 |
Enhancing the Usability of the Commercial Mobile Alert System Paul Ngo, Duminda Wijesekera |
137-149 |
Real-Time Detection of Covert Channels in Highly Virtualized Environments Anyi Liu, Jim Chen, Li Yang |
151-164 |
INFRASTRUCTURE MODELING AND SIMULATION
|
Analyzing Cyber-Physical Attacks on Networked Industrial Control Systems Bela Genge, Igor Nai Fovino, Christos Siaterlis, Marcelo Masera |
167-183 |
Using an Emulation Testbed for Operational Cyber Security Exercises Christos Siaterlis, Andres Perez-Garcia, Marcelo Masera |
185-199 |
Analyzing Intelligence on WMD Attacks Using Threaded Event-Based Simulation Qi Fang, Peng Liu, John Yen, Jonathan Morgan, Donald Shemanski, Frank Ritter |
201-216 |