Table of Contents
|
Book Title (Part xxx) Scientific Editor 1, Scientific Editor2 (Eds.)
|
Front Matter |
Themes and Issues
|
A Model for Characterizing Cyberpower Adrian Venables, Siraj Shaikh, James Shuttleworth |
3-16 |
Cyber Attacks and Political Events: The Case of the Occupy Central Campaign Kam-Pui Chow, Ken Yau, Frankie Li |
17-27 |
On the Sharing of Cyber Security Information Eric Luiijf, Marieke Klaver |
29-46 |
Control Systems Security
|
Modeling Message Sequences for Intrusion Detection in Industrial Control Systems Marco Caselli, Emmanuele Zambon, Jonathan Petit, Frank Kargl |
49-71 |
Industrial Control System Fingerprinting and Anomaly Detection Yong Peng, Chong Xiang, Haihui Gao, Dongqing Chen, Wang Ren |
73-85 |
Traffic-Locality-Based Creation of Flow Whitelists for SCADA Networks Seungoh Choi, Yeop Chang, Jeong-Han Yun, Woonyon Kim |
87-102 |
A Symbolic Honeynet Framework for SCADA System Threat Intelligence Owen Redwood, Joshua Lawrence, Mike Burmester |
103-118 |
Enhancing a Virtual SCADA Laboratory Using Simulink Zach Thornton, Thomas Morris |
119-133 |
How Industrial Control System Security Training is Falling Short Jonathan Butts, Michael Glover |
135-149 |
Cyber-Physical Systems Security
|
Runtime Integrity for Cyber-Physical Infrastructures Jonathan Jenkins, Mike Burmester |
153-167 |
Security Challenges of Additive Manufacturing with Metals and Alloys Mark Yampolskiy, Lena Schutzle, Uday Vaidya, Alec Yasinsac |
169-183 |
Using Information Flow Methods to Secure Cyber-Physical Systems Gerry Howser |
185-205 |
Infrastructure Security
|
Evaluating ITU-T G.9959 Based Wireless Systems Used in Critical Infrastructure Assets Christopher Badenhop, Jonathan Fuller, Joseph Hall, Benjamin Ramsey, Mason Rice |
209-227 |
Implementing Cyber Security Requirements and Mechanisms in Microgrids Apurva Mohan, Himanshu Khurana |
229-244 |
A Cyber Security Architecture for Microgrid Deployments Apurva Mohan, Gregory Brainard, Himanshu Khurana, Scott Fischer |
245-259 |
Infrastructure Modeling and Simulation
|
Allocation and Scheduling of Firefighting Units in Large Petrochemical Complexes Khaled Alutaibi, Abdullah Alsubaie, Jose Marti |
263-279 |
Situational Awareness Using Distributed Data Fusion with Evidence Discounting Antonio Pietro, Stefano Panzieri, Andrea Gasparri |
281-296 |
Risk and Impact Assessment
|
Using Centrality Measures in Dependency Risk Graphs for Efficient Risk Mitigation George Stergiopoulos, Marianthi Theocharidou, Panayiotis Kotzanikolaou, Dimitris Gritzalis |
299-314 |
Assessing Cyber Risk Using the CISIApro Simulator Chiara Foglietta, Cosimo Palazzo, Riccardo Santini, Stefano Panzieri |
315-331 |