Table of Contents
|
Critical Infrastructure Protection XI Mason Rice, Sujeet Shenoi |
Front Matter |
Infrastructure protection
|
Protecting the transportation sector from the negative impacts of climate change Georgia Lykou, George Stergiopoulos, Antonios Papachrysanthou, Dimitris Gritzalis |
3-21 |
Evaluation of additive and subtractive manufacturing from the security perspective Mark Yampolskiy, Wayne King, Gregory Pope, Sofia Belikovetsky, Yuval Elovici |
23-44 |
Detecting data manipulation attacks on the substation interlocking function using direct power feedback Eniye Tebekaemi, Edward Colbert, Duminda Wijesekera |
45-62 |
Network forensic analysis of electrical substation automation traffic Megan Leierzapf, Julian Rrushi |
63-78 |
Infrastructure modeling and simulation
|
Multiple security domain model of a vehicle in an automated platoon Uday Kanteti, Bruce Mcmillin |
81-97 |
Distributed data fusion for situational awareness in critical infrastructures with link failures Antonio Pietro, Stefano Panzieri, Andrea Gasparri |
99-117 |
Exploiting web ontologies for automated critical infrastructure data retrieval Luca Galbusera, Georgios Giannopoulos |
119-136 |
Industrial control system security
|
Enforcing end-to-end security in scada systems via application-level cryptography Adrian-Vasile Duka, Bela Genge, Piroska Haller, Bogdan Crainicu |
139-155 |
Software defined response and network reconfiguration for industrial control systems Hunor Sandor, Bela Genge, Piroska Haller, Flavius Graur |
157-173 |
Threat analysis of an elevator control system Raymond Chan, Kam-Pui Chow |
175-192 |
Generating honeypot traffic for industrial control systems Htein Lin, Stephen Dunlap, Mason Rice, Barry Mullins |
193-223 |
Challenges to automating security configuration checklists in manufacturing environments Joshua Lubell, Timothy Zimmerman |
225-241 |
Categorization of cyber training environments for industrial control systems Evan Plumley, Mason Rice, Stephen Dunlap, John Pecarina |
243-271 |
Multi-controller exercise environments for training industrial control system first responders Joseph Daoud, Mason Rice, Stephen Dunlap, John Pecarina |
273-294 |
Internet of things security
|
Defending building automation systems using decoy networks Caleb Mays, Mason Rice, Benjamin Ramsey, John Pecarina, Barry Mullins |
297-317 |
Securing bluetooth low energy locks from unauthorizedaccess and surveillance Anthony Rose, Jason Bindewald, Benjamin Ramsey, Mason Rice, Barry Mullins |
319-338 |