Abstract is missing.
- Stealth Low-Level Manipulation of Programmable Logic Controllers I/O by Pin Control ExploitationAli Abbasi, Majid Hashemi, Emmanuele Zambon, Sandro Etalle. 1-12 [doi]
- Developing a Cyber Incident Communication Management Exercise for CI StakeholdersTomomi Aoyama, Kenji Watanabe, Ichiro Koshijima, Yoshihiro Hashimoto. 13-24 [doi]
- On Auxiliary Entity Allocation Problem in Multi-layered Interdependent Critical InfrastructuresJoydeep Banerjee, Arunabha Sen, Chenyang Zhou. 25-37 [doi]
- Cyber Targets Water ManagementPieter Burghouwt, Marinus Maris, Sjaak van Peski, Eric Luiijf, Imelda van de Voorde, Marcel E. M. Spruit. 38-49 [doi]
- Integrated Safety and Security Risk Assessment Methods: A Survey of Key Characteristics and ApplicationsSabarathinam Chockalingam, Dina Hadziosmanovic, Wolter Pieters, André Teixeira, Pieter van Gelder. 50-62 [doi]
- Railway Station Surveillance System Design: A Real Application of an Optimal Coverage ApproachFrancesca De Cillis, Stefano De Muro, Franco Fiumara, Roberto Setola, Antonio Sforza, Claudio Sterle. 63-74 [doi]
- A Synthesis of Optimization Approaches for Tackling Critical Information Infrastructure SurvivabilityAnnunziata Esposito Amideo, Maria Paola Scaparra. 75-87 [doi]
- A Dataset to Support Research in the Design of Secure Water Treatment SystemsJonathan Goh, Sridhar Adepu, Khurum Nazir Junejo, Aditya Mathur. 88-99 [doi]
- Human Vulnerability Mapping Facing Critical Service Disruptions for Crisis ManagersAmélie Grangeat, Julie Sina, Vittorio Rosato, Aurélia Bony, Marianthi Theocharidou. 100-110 [doi]
- A Methodology for Monitoring and Control Network DesignIstván Kiss, Béla Genge. 111-122 [doi]
- Effective Defence Against Zero-Day Exploits Using Bayesian NetworksTingting Li, Chris Hankin. 123-136 [doi]
- Power Auctioning in Resource Constrained Micro-grids: Cases of CheatingAnesu M. C. Marufu, Anne V. D. M. Kayem, Stephen D. Wolthusen. 137-149 [doi]
- Using Incentives to Foster Security Information Sharing and Cooperation: A General Theory and Application to Critical Infrastructure ProtectionAlain Mermoud, Marcus Matthias Keupp, Solange Ghernaouti, Dimitri Percia David. 150-162 [doi]
- Dynamic Risk Analyses and Dependency-Aware Root Cause Model for Critical InfrastructuresSteve Muller, Carlo Harpes, Yves Le Traon, Sylvain Gombault, Jean-Marie Bonnin, Paul Hoffmann. 163-175 [doi]
- Selecting Privacy Solutions to Prioritise Control in Smart Metering SystemsJuan Enrique Rubio, Cristina Alcaraz, Javier Lopez. 176-188 [doi]
- A Six-Step Model for Safety and Security Analysis of Cyber-Physical SystemsGiedre Sabaliauskaite, Sridhar Adepu, Aditya Mathur. 189-200 [doi]
- Availability Study of the Italian Electricity SCADA System in the CloudStefano Sebastio, Antonio Scala, Gregorio D'Agostino. 201-212 [doi]
- Railway System Failure Scenario AnalysisWilliam G. Temple, Yuan Li, Bao Anh N. Tran, Yan Liu, Binbin Chen. 213-225 [doi]
- Tamper Resistant Secure Digital Silo for Log Storage in Critical InfrastructuresKhan Ferdous Wahid, Helmut Kaufmann, Kevin Jones. 226-238 [doi]
- Access Control and Availability Vulnerabilities in the ISO/IEC 61850 Substation Automation ProtocolJames G. Wright, Stephen D. Wolthusen. 239-251 [doi]
- A Case Study Assessing the Effects of Cyber Attacks on a River Zonal DispatcherRonald Joseph Wright, Ken Keefe, Brett Feddersen, William H. Sanders. 252-264 [doi]
- Reliable Key Distribution in Smart Micro-GridsHeinrich Strauss, Anne V. D. M. Kayem, Stephen D. Wolthusen. 265-270 [doi]
- Security Validation for Data Diode with Reverse ChannelJeong-Han Yun, Yeop Chang, Kyoung-Ho Kim, Woonyon Kim. 271-282 [doi]
- Towards a Cybersecurity Game: Operation Digital ChameleonAndreas Rieb, Ulrike Lechner. 283-295 [doi]
- Cyber Security Investment in the Context of Disruptive Technologies: Extension of the Gordon-Loeb Model and Application to Critical Infrastructure ProtectionDimitri Percia David, Marcus Matthias Keupp, Solange Ghernaouti, Alain Mermoud. 296-301 [doi]
- Behavioral Intentions and Threat Perception During Terrorist, Fire and Earthquake ScenariosSimona A. Popusoi, Cornelia Mairean, Grigore M. Havârneanu. 302-307 [doi]
- An Operator-Driven Approach for Modeling Interdependencies in Critical Infrastructures Based on Critical Services and SectorsElisa Canzani, Helmut Kaufmann, Ulrike Lechner. 308-320 [doi]
- Domain Specific Stateful Filtering with Worst-Case BandwidthMaxime Puys, Jean-Louis Roch, Marie-Laure Potet. 321-327 [doi]
- Securing SCADA Critical Network Against Internal and External Threats - Short PaperMounia El Anbal, Anas Abou El Kalam, Siham Benhadou, Fouad Moutaouakkil, Hicham Medromi. 328-339 [doi]
- Simulation of Cascading Outages in (Inter)-Dependent Services and Estimate of Their Societal Consequences - Short PaperAntonio Di Pietro, Luigi La Porta, Luisa Lavalle, Maurizio Pollino, Vittorio Rosato, Alberto Tofani. 340-345 [doi]