Abstract is missing.
- Approach to Enhance the Efficiency of Security Operation Centers to Heterogeneous IDS LandscapesBjörn-C. Bösch. 1-9 [doi]
- Enhancing SIEM Technology to Protect Critical InfrastructuresLuigi Coppolino, Salvatore D'Antonio, Valerio Formicola, Luigi Romano. 10-21 [doi]
- PDR: A Prevention, Detection and Response Mechanism for Anomalies in Energy Control SystemsCristina Alcaraz, Meltem Sönmez Turan. 22-33 [doi]
- Embedded Cyber-Physical Anomaly Detection in Smart MetersMassimiliano Raciti, Simin Nadjm-Tehrani. 34-45 [doi]
- Improving Control System Cyber-State Awareness Using Known Secure Sensor MeasurementsOndrej Linda, Milos Manic, Miles McQueen. 46-58 [doi]
- The Effects of Network Link Unreliability for Leader Election Algorithm in a Smart Grid SystemStephen Jackson, Bruce M. McMillin. 59-70 [doi]
- Distributed Generation and Resilience in Power GridsAntonio Scala, Mario Mureddu, Alessandro Chessa, Guido Caldarelli, Alfonso Damiano. 71-79 [doi]
- Breaking Nondeducible Attacks on the Smart GridThomas P. Roth, Bruce M. McMillin. 80-91 [doi]
- CPS-CSH Cyber-Physical Analysis and DesignDale Fitch, Sahra Sedigh, Bruce M. McMillin, Ravi Akella. 92-105 [doi]
- Modeling Emergency Response Plans with Coloured Petri NetsManuel Cheminod, Ivan Cibrario Bertolotti, Luca Durante, Adriano Valenzano. 106-117 [doi]
- Distributed Identity Based Private Key Generation for SCADA SystemsGörkem Kilinç, Igor Nai Fovino. 118-129 [doi]
- A Trusted Computing Architecture for Secure Substation AutomationDavid Guidry, Mike Burmester, Xiuwen Liu, Jonathan Jenkins, Sean Easton, Xin Yuan. 130-142 [doi]
- Probabilistic Model Checking of CAPTCHA Admission Control for DoS Resistant Anti-SPIT ProtectionEmmanouela Stachtiari, Yannis Soupionis, Panagiotis Katsaros, Anakreontas Mentis, Dimitris Gritzalis. 143-154 [doi]
- Reasoning about Vulnerabilities in Dependent Information Infrastructures: A Cyber Range ExperimentAdedayo Oyelakin Adetoye, Sadie Creese, Michael Goldsmith. 155-167 [doi]
- Algebraic Analysis of Attack Impacts and Countermeasures in Critical InfrastructuresThomas Richard McEvoy, Stephen D. Wolthusen. 168-179 [doi]
- Evaluation of Resilience of Interconnected Systems Based on Stability AnalysisAngelo Alessandri, Roberto Filippini. 180-190 [doi]
- System Dynamics for Railway Infrastructure ProtectionMaria Carla De Maggio, Roberto Setola. 191-202 [doi]
- Contaminant Detection in Urban Water Distribution Networks Using Chlorine MeasurementsDemetrios G. Eliades, Marios M. Polycarpou. 203-214 [doi]
- Collaboration between Competing Mobile Network Operators to Improve CIIPPeter Schoo, Manfred Schäfer, Andre Egners, Hans Hofinger, Sascha Wessel, Marian Kuehnel, Sascha Todt, Michael Montag. 215-227 [doi]
- AMICI: An Assessment Platform for Multi-domain Security Experimentation on Critical InfrastructuresBéla Genge, Christos Siaterlis, Marc Hohenadel. 228-239 [doi]
- Assessment of Social Impact Costs and Social Impact Magnitude from Breakdowns in Critical InfrastructuresMats B.-O. Larsson, Gunnar Björkman, Mathias Ekstedt. 240-251 [doi]
- Hidden Vulnerabilities Due to Interdependencies between Two SystemsCen Nan, Irene Eusgeld, Wolfgang Kröger. 252-263 [doi]
- Threat Modeling of AMIInger Anne Tøndel, Martin Gilje Jaatun, Maria Bartnes Line. 264-275 [doi]