Full Text Documents

Chargement de la page

Search

Chargement de la page

Table of Contents
Critical Infrastructure Protection XV
Jason Staggs, Sujeet Shenoi
Front Matter

Themes and Issues


Cyber Security Requirements in the Norwegian Energy Sector
Janne Hagen, Oyvind Toftegaard
3-21
Cyber Security Awareness Requirements for Operational Technology Systems
Tim Ellis, David Balenson, Michael Locasto
23-44
Analyzing Advanced Persistent Threats Using Game Theory: A Critical Literature Review
Rajesh Kumar, Siddhant Singh, Rohan Kela
45-69

Industrial Control Systems Security


Attacking the IEC 61131 Logic Engine in Programmable Logic Controllers
Syed Ali Qasim, Adeen Ayub, Jordan Johnson, Irfan Ahmed
73-95
Anomaly Detection in Automation Controllers
Robert Mellish, Scott Graham, Stephen Dunlap, Patrick Sweeney
97-118
Detecting Anomalous Programmable Logic Controller Events Using Process Mining
Ken Yau, Kam-Pui Chow, Siu-Ming Yiu
119-133
Simulating Measurement Attacks in a Scada System Testbed
Brandt Reutimann, Indrakshi Ray
135-153
A Communications Validity Detector for SCADA Networks
Prashant Anantharaman, Anmol Chachra, Shikhar Sinha, Michael Millian, Bogdan Copos, Sean Smith, Michael Locasto
155-183

Telecommunications Systems Security


InfiniBand Network Monitoring: Challenges and Possibilities
Kyle Hintze, Scott Graham, Stephen Dunlap, Patrick Sweeney
187-208
GPS Signal Authentication Using a Chameleon Hash Keychain
Yu Han Chu, Sye Loong Keoh, Chee Kiat Seow, Qi Cao, Kai Wen, Soon Yim Tan
209-226

Infrastructure Security


Security Analysis of Software Updates for Industrial Robots
Chun-Fai Chan, Kam-Pui Chow, Tim Tang
229-245
A Security Framework for Railway System Deployments
Raymond Chan
247-253

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/