Abstract is missing.
- Detecting Integrity Attacks on Industrial Control SystemsChad Arnold, Jonathan Butts, Krishnaprasad Thirunarayan. 3-13 [doi]
- Detecting Malicious Software Execution in Programmable Logic Controllers Using Power FingerprintingCarlos Aguayo Gonzalez, Alan Hinton. 15-27 [doi]
- Timing of Cyber-Physical Attacks on Process Control SystemsMarina Krotofil, Alvaro Cardenas, Kishore Angrishi. 29-45 [doi]
- Recovery of Structural Controllability for Control SystemsCristina Alcaraz, Stephen D. Wolthusen. 47-63 [doi]
- Industrial Control System Traffic Data Sets for Intrusion Detection ResearchThomas H. Morris, Wei Gao. 65-78 [doi]
- An Industrial Control System Testbed Based on Emulation, Physical Devices and SimulationHaihui Gao, Yong Peng, Zhonghua Dai, Ting Wang, XueFeng Han, Hanjing Li. 79-91 [doi]
- Evidence Theory for Cyber-Physical SystemsRiccardo Santini, Chiara Foglietta, Stefano Panzieri. 95-109 [doi]
- An Automated Dialog System for Conducting Security Interviews for Access ControlMohammad Ababneh, Malek Athamnah, Duminda Wijesekera, Paulo Costa. 111-125 [doi]
- A Survey of Critical Infrastructure SecurityWilliam Hurst, Madjid Merabti, Paul Fergus. 127-138 [doi]
- A System Dynamics Framework for Modeling Critical Infrastructure ResilienceSimona Cavallini, Cristina d'Alessandro, Margherita Volpe, Stefano Armenia, Camillo Carlini, Elisabeth Brein, Pierluigi Assogna. 141-154 [doi]
- Reinforcement Learning Using Monte Carlo Policy Estimation for Disaster MitigationMohammed Talat Khouj, Sarbjit Sarkaria, Cesar Lopez, José R. MartÃ. 155-172 [doi]
- Accuracy of Service Area Estimation Methods Used for Critical Infrastructure RecoveryOkan Pala, David C. Wilson, Russell Bent, Steve Linger, James Arnold. 173-191 [doi]
- A Decision Support Tool for a Unified Homeland Security StrategyRichard White, Aaron Burkhart, Edward Chow, Logan Maynard. 195-211 [doi]
- Assessing the Impact of Cyber Attacks on Wireless Sensor Nodes That Monitor Interdependent Physical SystemsValerio Formicola, Antonio Di Pietro, Abdullah Alsubaie, Salvatore D'Antonio, Jose Marti. 213-229 [doi]
- Assessing Potential Casualties in Critical EventsSimona Cavallini, Fabio Bisogni, Marco Bardoscia, Roberto Bellotti. 231-242 [doi]
- Evaluation of Format- Preserving Encryption Algorithms for Critical Infrastructure ProtectionRichard Agbeyibor, Jonathan Butts, Michael R. Grimaila, Robert F. Mills. 245-261 [doi]
- Asynchronous Binary Byzantine Consensus over Graphs with Power-Law Degree SequenceGoitom Weldehawaryat, Stephen D. Wolthusen. 263-276 [doi]