Table of Contents
|
Critical Infrastructure Protection XIV Jason Staggs, Sujeet Shenoi |
Front Matter |
Aviation Infrastructure Security
|
Cyber-Physical Security of Air Traffic Surveillance Systems Anusha Thudimilla, Bruce Mcmillin |
3-23 |
Simulation-Based Logic Bomb Identification and Verification for Unmanned Aerial Vehicles Jake Magness, Patrick Sweeney, Scott Graham, Nicholas Kovach |
25-44 |
Assessing the Cyber Risk of Small Unmanned Aerial Vehicles Dillon Pettit, Scott Graham |
45-67 |
Cyber State Requirements for Design and Validation of Trust in the Critical Transportation Infrastructure Tim Ellis, Michael Locasto, David Balenson |
69-83 |
Vehicle Infrastructure Security
|
An Efficient Blockchain Authentication Scheme for Vehicular Ad-Hoc Networks Matthew Wagner, Bruce Mcmillin |
87-109 |
Engaging Empirical Dynamic Modeling to Detect Intrusions in Cyber-Physical Systems David Crow, Scott Graham, Brett Borghetti, Patrick Sweeney |
111-133 |
Telecommunications Systems Security
|
Multi-channel Security Through Data Fragmentation Micah Hayden, Scott Graham, Addison Betances, Robert Mills |
137-155 |
Securing an InfiniBand Network and its Effect on Performance Lucas Mireles, Scott Graham, Patrick Sweeney, Stephen Dunlap, Matthew Dallmeyer |
157-179 |
Industrial Control Systems Security
|
Cyber-Resilient SCADA Systems via Secure State Restoration Zachary Birnbaum, Matthew Davis, Salman Salman, James Schaffter, Lanier Watkins, Saikiran Yamajala, Shruti Paul |
183-207 |
Vulnerability Assessments of Building Management Systems Raymond Chan, Forest Tan, Ulric Teo, Brandon Kow |
209-220 |
Forensic Investigation of A Hacked Industrial Robot Yanan Gong, Kam-Pui Chow, Yonghao Mai, Jun Zhang, Chun-Fai Chan |
221-241 |
Cyber-Physical Systems Security
|
Distributed Bias Detection in Cyber-Physical Systems Simon Thougaard, Bruce Mcmillin |
245-260 |
Comparison of Design-Centric and Data-Centric Methods for Distributed Attack Detection in Cyber-Physical Systems Jennifer Leopold, Bruce Mcmillin, Rachel Stiffler, Nathan Lutes |
261-279 |
Infrastructure Modeling and Simulation
|
A Model-Based Safety-Security Risk Analysis Framework for Interconnected Critical Infrastructures Rajesh Kumar |
283-306 |
Creating a Cross-Domain Simulation Framework for Risk Analyses of Cities Stefan Schauer, Stefan Rass |
307-323 |
Modeling Telecommunications Infrastructures Using the CISIApro 2.0 Simulator Elena Bernardini, Chiara Foglietta, Stefano Panzieri |
325-348 |