Table of Contents
|
Critical Infrastructure Protection XV Jason Staggs, Sujeet Shenoi |
Front Matter |
Themes and Issues
|
Cyber Security Requirements in the Norwegian Energy Sector Janne Hagen, Oyvind Toftegaard |
3-21 |
Cyber Security Awareness Requirements for Operational Technology Systems Tim Ellis, David Balenson, Michael Locasto |
23-44 |
Analyzing Advanced Persistent Threats Using Game Theory: A Critical Literature Review Rajesh Kumar, Siddhant Singh, Rohan Kela |
45-69 |
Industrial Control Systems Security
|
Attacking the IEC 61131 Logic Engine in Programmable Logic Controllers Syed Ali Qasim, Adeen Ayub, Jordan Johnson, Irfan Ahmed |
73-95 |
Anomaly Detection in Automation Controllers Robert Mellish, Scott Graham, Stephen Dunlap, Patrick Sweeney |
97-118 |
Detecting Anomalous Programmable Logic Controller Events Using Process Mining Ken Yau, Kam-Pui Chow, Siu-Ming Yiu |
119-133 |
Simulating Measurement Attacks in a Scada System Testbed Brandt Reutimann, Indrakshi Ray |
135-153 |
A Communications Validity Detector for SCADA Networks Prashant Anantharaman, Anmol Chachra, Shikhar Sinha, Michael Millian, Bogdan Copos, Sean Smith, Michael Locasto |
155-183 |
Telecommunications Systems Security
|
InfiniBand Network Monitoring: Challenges and Possibilities Kyle Hintze, Scott Graham, Stephen Dunlap, Patrick Sweeney |
187-208 |
GPS Signal Authentication Using a Chameleon Hash Keychain Yu Han Chu, Sye Loong Keoh, Chee Kiat Seow, Qi Cao, Kai Wen, Soon Yim Tan |
209-226 |
Infrastructure Security
|
Security Analysis of Software Updates for Industrial Robots Chun-Fai Chan, Kam-Pui Chow, Tim Tang |
229-245 |
A Security Framework for Railway System Deployments Raymond Chan |
247-253 |