Abstract is missing.
- Overview of Critical Information Infrastructure ProtectionJavier Lopez, Roberto Setola, Stephen D. Wolthusen. 1-14 [doi]
- The Art of CIIP Strategy: Tacking Stock of Content and ProcessesMyriam Dunn Cavelty, Manuel Suter. 15-38 [doi]
- Infrastructure Sectors and the Information InfrastructureAndrea Glorioso, Andrea Servida. 39-51 [doi]
- Understanding Cyber Threats and VulnerabilitiesEric A. M. Luiijf. 52-67 [doi]
- Modelling ApproachesNils Kalstad Svendsen, Stephen D. Wolthusen. 68-97 [doi]
- Anomaly Detection in Water Management SystemsMassimiliano Raciti, Jordi Cucurull, Simin Nadjm-Tehrani. 98-119 [doi]
- Security Aspects of SCADA and DCS EnvironmentsCristina Alcaraz, Gerardo Fernandez, Fernando Carvajal. 120-149 [doi]
- SCADA Protocol VulnerabilitiesJulian L. Rrushi. 150-176 [doi]
- Protection of SCADA Communication ChannelsAbdelmajid Khelil, Daniel Germanus, Neeraj Suri. 177-196 [doi]
- Cyber Vulnerability in Power Systems Operation and ControlEttore Bompard, Paolo Cuccia, Marcelo Masera, Igor Nai Fovino. 197-234 [doi]
- Sector-Specific Information Infrastructure Issues in the Oil, Gas, and Petrochemical SectorStig Ole Johnsen, Andreas Lumbe Aas, Ying Qian. 235-279 [doi]
- TelecommunicationsStuart Goldman, Hüseyin Uzunalioglu. 280-300 [doi]
- Financial Services IndustryBernhard M. Hämmerli. 301-329 [doi]
- TransportationMark Hartong, Rajni Goel, Duminda Wijesekera. 330-355 [doi]