Skip to Main content Skip to Navigation
   


Full Text Documents

Chargement de la page

Search

Chargement de la page

Table of Contents
Critical Infrastructure Protection XIII
Jason Staggs, Sujeet Shenoi
Front Matter

Themes and Issues


Quantifying the Costs of Data Breaches
Siddharth Dongre, Sumita Mishra, Carol Romanowski, Manan Buddhadev
3-16

Infrastructure Protection


A Comparative Analysis Approach for Deriving Failure Scenarios in the Natural Gas Distribution Infrastructure
Michael Locasto, David Balenson
19-50
An Attack-Fault Tree Analysis of a Movable Railroad Bridge
Matthew Jablonski, Yongxin Wang, Chaitanya Yavvari, Zezhou Wang, Xiang Liu, Keith Holt, Duminda Wijesekera
51-71
Converting an Electric Power Utility Network to Defend Against Crafted Inputs
Michael Millian, Prashant Anantharaman, Sergey Bratus, Sean Smith, Michael Locasto
73-85
Cyber Security Modeling of Non-Critical Nuclear Power Plant Digital Instrumentation
Trevor Maclean, Robert Borrelli, Michael Haney
87-100

Vehicle Infrastructure Security


Electronic Control Unit Discrimination Using Wired Signal Distinct Native Attributes
Rahn Lassiter, Scott Graham, Timothy Carbino, Stephen Dunlap
103-121
Vehicle Identification and Route Reconstruction via TPMS Data Leakage
Kenneth Hacker, Scott Graham, Stephen Dunlap
123-136
Modeling Liability Data Collection Systems for Intelligent Transportation Infrastructure Using Hyperledger Fabric
Luis Cintron, Scott Graham, Douglas Hodson, Barry Mullins
137-156

Telecommunications Infrastructure Security


Securing Wireless Coprocessors from Attacks in the Internet of Things
Jason Staggs, Sujeet Shenoi
159-178
Vulnerability Assessment of InfiniBand Networking
Daryl Schmitt, Scott Graham, Patrick Sweeney, Robert Mills
179-205

Cyber-Physical Systems Security


Leveraging Cyber-Physical System Honeypots to Enhance Threat Intelligence
Michael Haney
209-233
Dynamic Repair of Mission-Critical Applications with Runtime Snap-Ins
J. Brady, Sergey Bratus, Sean Smith
235-252
Data-Driven Field Mapping of Security Logs for Integrated Monitoring
Seungoh Choi, Yesol Kim, Jeong-Han Yun, Byung-Gil Min, Hyoung-Chun Kim
253-268

Industrial Control Systems Security


Modeling and Machine-Checking Bump-in-the-Wire Security for Industrial Control Systems
Mehdi Sabraoui, Jeffrey Hieb, Adrian Lauf, James Graham
271-288
Defining Attack Patterns for Industrial Control Systems
Raymond Chan, Kam-Pui Chow, Chun-Fai Chan
289-309
An Incident Response Model for Industrial Control System Forensics Based on Historical Events
Ken Yau, Kam-Pui Chow, Siu-Ming Yiu
311-328

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/