Table of Contents
|
Critical Infrastructure Protection VIII Jonathan Butts, Sujeet Shenoi (Eds.)
|
Front Matter |
Control Systems Security
|
Detecting Integrity Attacks on Industrial Control Systems Chad Arnold, Jonathan Butts, Krishnaprasad Thirunarayan |
3-13 |
Detecting Malicious Software Execution in Programmable Logic Controllers Using Power Fingerprinting Carlos Aguayo Gonzalez, Alan Hinton |
15-27 |
Timing of Cyber-Physical Attacks on Process Control Systems Marina Krotofil, Alvaro Cardenas, Kishore Angrishi |
29-45 |
Recovery of Structural Controllability for Control Systems Cristina Alcaraz, Stephen Wolthusen |
47-63 |
Industrial Control System Traffic Data Sets for Intrusion Detection Research Thomas Morris, Wei Gao |
65-78 |
An Industrial Control System Testbed Based on Emulation, Physical Devices and Simulation Haihui Gao, Yong Peng, Zhonghua Dai, Ting Wang, Xuefeng Han, Hanjing Li |
79-91 |
Infrastructure Security
|
Evidence Theory for Cyber-Physical Systems Riccardo Santini, Chiara Foglietta, Stefano Panzieri |
95-109 |
An Automated Dialog System for Conducting Security Interviews for Access Control Mohammad Ababneh, Malek Athamnah, Duminda Wijesekera, Paulo Costa |
111-125 |
A Survey of Critical Infrastructure Security William Hurst, Madjid Merabti, Paul Fergus |
127-138 |
Infrastructure Modeling and Simulation
|
A System Dynamics Framework for Modeling Critical Infrastructure Resilience Simona Cavallini, Cristina D’alessandro, Margherita Volpe, Stefano Armenia, Camillo Carlini, Elisabeth Brein, Pierluigi Assogna |
141-154 |
Reinforcement Learning Using Monte Carlo Policy Estimation for Disaster Mitigation Mohammed Khouj, Sarbjit Sarkaria, Cesar Lopez, Jose Marti |
155-172 |
Accuracy of Service Area Estimation Methods Used for Critical Infrastructure Recovery Okan Pala, David Wilson, Russell Bent, Steve Linger, James Arnold |
173-191 |
Risk and Impact Assessment
|
A Decision Support Tool for a Unified Homeland Security Strategy Richard White, Aaron Burkhart, Edward Chow, Logan Maynard |
195-211 |
Assessing the Impact of Cyber Attacks on Wireless Sensor Nodes That Monitor Interdependent Physical Assessing the Impact of Cyber Attacks on Wireless Sensor Nodes That Monitor Interdependent Physical Systems Valerio Formicola, Antonio Pietro, Abdullah Alsubaie, Salvatore D’antonio, Jose Marti |
213-229 |
Assessing Potential Casualties in Critical Events Simona Cavallini, Fabio Bisogni, Marco Bardoscia, Roberto Bellotti |
231-242 |
Advanced Techniques
|
Evaluation of Format- Preserving Encryption Algorithms for Critical Infrastructure Protection Richard Agbeyibor, Jonathan Butts, Michael Grimaila, Robert Mills |
245-261 |
Asynchronous Binary Byzantine Consensus over Graphs with Power-Law Degree Sequence Goitom Weldehawaryat, Stephen Wolthusen |
263-276 |