Table of Contents
|
Critical Infrastructure Protection VII Jonathan Butts, Sujeet Shenoi (Eds.)
|
Front Matter |
Themes and Issues
|
Political and Economic Implications of Authoritarian Control of the Internet Daniel Arnaudo, Aaron Alva, Phillip Wood, Jan Whittington |
3-19 |
Data Handling in the Smart Grid: Do We Know Enough? Richard Chow, Alvaro Cardenas, Emiliano Cristofaro |
21-32 |
Control Systems Security
|
Design and Implementation of Industrial Control System Emulators Robert Jaromin, Barry Mullins, Jonathan Butts, Juan Lopez |
35-46 |
ZigBee Device Verification for Securing Industrial Control and Building Automation Systems Clay Dubendorfer, Benjamin Ramsey, Michael Temple |
47-62 |
Defensive Rekeying Strategies for Physical-Layer-Monitored Low-Rate Wireless Personal Area Networks Benjamin Ramsey, Barry Mullins |
63-79 |
A Distributed Real-Time Event Correlation Architecture for SCADA Security Yi Deng, Sandeep Shukla |
81-93 |
Infrastructure Security
|
Protecting Infrastructure Assets from Real-Time and Run-Time Threats Jonathan Jenkins, Mike Burmester |
97-110 |
Anomaly Detection in Liquid Pipelines Using Modeling, Co-Simulation and Dynamical Estimation Saed Alajlouni, Vittal Rao |
111-124 |
Factors Impacting Attacker Decision-Making in Power Grid Cyber Attacks Aunshul Rege |
125-138 |
Timely Delivery of Messages in Positive Train Control Andre Bondi, Damindra Bandara, Michael Smith, Rajni Goel, Duminda Wijesekera |
139-152 |
Infrastructure Modeling and Simulation
|
Modeling Service Migration and Relocation in Mission-Critical Systems Yanjun Zuo |
155-170 |
Cascading Effects of Common-Cause Failures in Critical Infrastructures Panayiotis Kotzanikolaou, Marianthi Theoharidou, Dimitris Gritzalis |
171-182 |
A Platform for Disaster Response Planning with Interdependency Simulation Functionality Abdullah Alsubaie, Antonio Pietro, Jose Marti, Pranab Kini, Ting Lin, Simone Palmieri, Alberto Tofani |
183-197 |
Risk Assessment
|
Mission-Based Analysis for Assessing Cyber Risk in Critical Infrastructure Systems Thomas Llanso, Gregg Tally, Michael Silberglitt, Tara Anderson |
201-214 |
Assessing the Impact of Cyber Attacks on Interdependent Physical Systems Antonio Pietro, Chiara Foglietta, Simone Palmieri, Stefano Panzieri |
215-227 |