Search - IFIP Open Digital Library Access content directly

Filter your results

40 results
Structure: Internal structure identifier : 469726
Image document

Vulnerability Assessment of InfiniBand Networking

Daryl Schmitt , Scott Graham , Patrick Sweeney , Robert Mills
13th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2019, Arlington, VA, United States. pp.179-205, ⟨10.1007/978-3-030-34647-8_10⟩
Conference papers hal-03364575v1
Image document

An FPGA System for Detecting Malicious DNS Network Traffic

Brennon Thomas , Barry Mullins , Gilbert Peterson , Robert Mills
7th Digital Forensics (DF), Jan 2011, Orlando, FL, United States. pp.195-207, ⟨10.1007/978-3-642-24212-0_15⟩
Conference papers hal-01569565v1
Image document

Simulation-Based Logic Bomb Identification and Verification for Unmanned Aerial Vehicles

Jake Magness , Patrick Sweeney , Scott Graham , Nicholas Kovach
14th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2020, Arlington, VA, United States. pp.25-44, ⟨10.1007/978-3-030-62840-6_2⟩
Conference papers hal-03794636v1

Advances in Digital Forensics XIV

Gilbert Peterson , Sujeet Shenoi
Springer International Publishing, AICT-532, 2018, IFIP Advances in Information and Communication Technology, 978-3-319-99276-1. ⟨10.1007/978-3-319-99277-8⟩
Books hal-01988831v1

Critical Infrastructure Protection IX

Mason Rice , Sujeet Shenoi
AICT-466, 2015, Critical Infrastructure Protection IX, 978-3-319-26566-7. ⟨10.1007/978-3-319-26567-4⟩
Books hal-01430961v1
Image document

Generating honeypot traffic for industrial control systems

Htein Lin , Stephen Dunlap , Mason Rice , Barry Mullins
11th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2017, Arlington, VA, United States. pp.193-223, ⟨10.1007/978-3-319-70395-4_11⟩
Conference papers hal-01819143v1
Image document

Cyberspace and Organizational Structure: An Analysis of the Critical Infrastructure Environment

Michael Quigg , Juan Lopez , Mason Rice , Michael Grimaila , Benjamin Ramsey
10th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2016, Arlington, VA, United States. pp.3-25, ⟨10.1007/978-3-319-48737-3_1⟩
Conference papers hal-01614858v1
Image document

Evaluation of Format- Preserving Encryption Algorithms for Critical Infrastructure Protection

Richard Agbeyibor , Jonathan Butts , Michael Grimaila , Robert Mills
8th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2014, Arlington, United States. pp.245-261, ⟨10.1007/978-3-662-45355-1_16⟩
Conference papers hal-01386769v1
Image document

Modeling Liability Data Collection Systems for Intelligent Transportation Infrastructure Using Hyperledger Fabric

Luis Cintron , Scott Graham , Douglas Hodson , Barry Mullins
13th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2019, Arlington, VA, United States. pp.137-156, ⟨10.1007/978-3-030-34647-8_8⟩
Conference papers hal-03364560v1

Advances in Digital Forensics XV

Gilbert Peterson , Sujeet Shenoi
Springer International Publishing, AICT-569, 2019, IFIP Advances in Information and Communication Technology, 978-3-030-28751-1. ⟨10.1007/978-3-030-28752-8⟩
Books hal-02534601v1

Critical Infrastructure Protection VIII

Jonathan Butts , Sujeet Shenoi
Springer, AICT-441, 2014, IFIP Advances in Information and Communication Technology, 978-3-662-45354-4. ⟨10.1007/978-3-662-45355-1⟩
Books hal-01386773v1
Image document

Automated Collection and Correlation of File Provenance Information

Ryan Good , Gilbert Peterson
13th IFIP International Conference on Digital Forensics (DigitalForensics), Jan 2017, Orlando, FL, United States. pp.269-284, ⟨10.1007/978-3-319-67208-3_15⟩
Conference papers hal-01716392v1
Image document

Securing Data in Power-Limited Sensor Networks Using Two-Channel Communications

Clark Wolfe , Scott Graham , Robert Mills , Scott Nykl , Paul Simon
12th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2018, Arlington, VA, United States. pp.81-90, ⟨10.1007/978-3-030-04537-1_5⟩
Conference papers hal-02076301v1
Image document

Electronic Control Unit Discrimination Using Wired Signal Distinct Native Attributes

Rahn Lassiter , Scott Graham , Timothy Carbino , Stephen Dunlap
13th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2019, Arlington, VA, United States. pp.103-121, ⟨10.1007/978-3-030-34647-8_6⟩
Conference papers hal-03364566v1
Image document

Securing bluetooth low energy locks from unauthorizedaccess and surveillance

Anthony Rose , Jason Bindewald , Benjamin Ramsey , Mason Rice , Barry Mullins
11th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2017, Arlington, VA, United States. pp.319-338, ⟨10.1007/978-3-319-70395-4_16⟩
Conference papers hal-01819142v1
Image document

Evaluating ITU-T G.9959 Based Wireless Systems Used in Critical Infrastructure Assets

Christopher Badenhop , Jonathan Fuller , Joseph Hall , Benjamin Ramsey , Mason Rice
9th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2015, Arlington, VA, United States. pp.209-227, ⟨10.1007/978-3-319-26567-4_13⟩
Conference papers hal-01431003v1

Critical Infrastructure Protection V

Jonathan Butts , Sujeet Shenoi
Springer, AICT-367, 2011, IFIP Advances in Information and Communication Technology, ⟨10.1007/978-3-642-24864-1⟩
Books hal-01571769v1

Advances in Digital Forensics XIII

Gilbert Peterson , Sujeet Shenoi
Springer International Publishing, AICT-511, 2017, IFIP Advances in Information and Communication Technology, 978-3-319-67207-6. ⟨10.1007/978-3-319-67208-3⟩
Books hal-01716406v1
Image document

Advances in Digital Forensics XVII

Gilbert Peterson , Sujeet Shenoi
Springer International Publishing, AICT-612, 2021, IFIP Advances in Information and Communication Technology, 978-3-030-88380-5. ⟨10.1007/978-3-030-88381-2⟩
Books hal-03764367v1
Image document

Detecting Integrity Attacks on Industrial Control Systems

Chad Arnold , Jonathan Butts , Krishnaprasad Thirunarayan
8th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2014, Arlington, United States. pp.3-13, ⟨10.1007/978-3-662-45355-1_1⟩
Conference papers hal-01386746v1

Advances in Digital Forensics XII

Gilbert Peterson , Sujeet Shenoi
Springer International Publishing, AICT-484, 2016, IFIP Advances in Information and Communication Technology, 978-3-319-46278-3. ⟨10.1007/978-3-319-46279-0⟩
Books hal-01758686v1
Image document

Advances in Digital Forensics XVI

Gilbert Peterson , Sujeet Shenoi
Springer International Publishing, AICT-589, 2020, IFIP Advances in Information and Communication Technology, 978-3-030-56223-6
Books hal-03657590v1
Image document

Practical Application Layer Emulation in Industrial Control System Honeypots

Kyle Girtz , Barry Mullins , Mason Rice , Juan Lopez
10th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2016, Arlington, VA, United States. pp.83-98, ⟨10.1007/978-3-319-48737-3_5⟩
Conference papers hal-01614865v1
Image document

Multi-controller exercise environments for training industrial control system first responders

Joseph Daoud , Mason Rice , Stephen Dunlap , John Pecarina
11th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2017, Arlington, VA, United States. pp.273-294, ⟨10.1007/978-3-319-70395-4_14⟩
Conference papers hal-01819133v1
Image document

Defending building automation systems using decoy networks

Caleb Mays , Mason Rice , Benjamin Ramsey , John Pecarina , Barry Mullins
11th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2017, Arlington, VA, United States. pp.297-317, ⟨10.1007/978-3-319-70395-4_15⟩
Conference papers hal-01819134v1
Image document

Vehicle Identification and Route Reconstruction via TPMS Data Leakage

Kenneth Hacker , Scott Graham , Stephen Dunlap
13th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2019, Arlington, VA, United States. pp.123-136, ⟨10.1007/978-3-030-34647-8_7⟩
Conference papers hal-03364572v1
Image document

A Comparison of PHY-Based Fingerprinting Methods Used to Enhance Network Access Control

Timothy J. Carbino , Michael A. Temple , Juan Lopez Jr.
30th IFIP International Information Security Conference (SEC), May 2015, Hamburg, Germany. pp.204-217, ⟨10.1007/978-3-319-18467-8_14⟩
Conference papers hal-01345109v1

Multi-channel Security Through Data Fragmentation

Micah Hayden , Scott Graham , Addison Betances , Robert Mills
14th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2020, Arlington, VA, United States. pp.137-155, ⟨10.1007/978-3-030-62840-6_7⟩
Conference papers hal-03794644v1
Image document

Variable Speed Simulation for Accelerated Industrial Control System Cyber Training

Luke Bradford , Barry Mullins , Stephen Dunlap , Timothy Lacey
12th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2018, Arlington, VA, United States. pp.283-306, ⟨10.1007/978-3-030-04537-1_15⟩
Conference papers hal-02076304v1
Image document

Botnets as an Instrument of Warfare

Eric Koziel , David Robinson
5th International Conference Critical Infrastructure Protection (ICCIP), Mar 2011, Hanover, NH, United States. pp.19-28, ⟨10.1007/978-3-642-24864-1_2⟩
Conference papers hal-01571771v1