Abstract is missing.
- On the Security Implications of Disruptive TechnologiesNeil Robinson, Lorenzo Valeri. 3-14 [doi]
- Cyber Security: Are Economic Incentives Adequate?Scott Dynes, Eric Goetz, Michael Freeman. 15-27 [doi]
- Government Intervention in Information Infrastructure ProtectionDan Assaf. 29-39 [doi]
- Security of Information Flow in the Electric Power GridHan Tang, Bruce M. McMillin. 43-56 [doi]
- Securing Positive Train Control SystemsMark Hartong, Rajni Goel, Duminda Wijesekera. 57-72 [doi]
- Lessons Learned from the Maroochy Water BreachJill Slay, Michael Miller. 73-82 [doi]
- Reducing Risk in Oil and Gas Production OperationsStig Ole Johnsen, Rune Ask, Randi Roisli. 83-95 [doi]
- Securing Current and Future Process Control SystemsRobert Cunningham, Steven Cheung, Martin W. Fong, Ulf Lindqvist, David M. Nicol, Ronald Pawlowski, Eric Robinson, William H. Sanders, Sankalp Singh, Alfonso Valdes, Bradley Woodworth, Michael Zhivich. 99-115 [doi]
- Security Strategies for SCADA NetworksRodrigo Chandia, Jesús González, Tim Kilpatrick, Mauricio Papa, Sujeet Shenoi. 117-131 [doi]
- Security Enhancements for Distributed Control SystemsJeffrey L. Hieb, James H. Graham, Sandip C. Patel. 133-146 [doi]
- Security Challenges of Reconfigurable Devices in the Power GridSuvda Myagmar, Roy H. Campbell, Marianne Winslett. 147-160 [doi]
- Intrusion Detection and Event Monitoring in SCADA NetworksPaul W. Oman, Matthew Phillips. 161-173 [doi]
- Passive Scanning in Modbus NetworksJesús González, Mauricio Papa. 175-187 [doi]
- Formal Modeling and Analysis of the Modbus ProtocolBruno Dutertre. 189-204 [doi]
- Security Analysis of Multilayer SCADA ProtocolsJanica Edmonds, Mauricio Papa, Sujeet Shenoi. 205-221 [doi]
- Remote Forensic Analysis of Process Control SystemsRegis Friend Cassidy, Adrian Chavez, Jason Trent, Jorge Urrea. 223-235 [doi]
- Creating a European SCADA Security TestbedHenrik Christiansson, Eric A. M. Luiijf. 237-247 [doi]
- Protecting Internet Services from Low-Rate DoS AttacksYajuan Tang, Xiapu Luo, Rocky K. C. Chang. 251-265 [doi]
- Detecting Wormhole Attacks in Wireless Sensor NetworksYurong Xu, Guanling Chen, James Ford, Fillia Makedon. 267-279 [doi]
- Detecting Non-Discoverable Bluetooth DevicesDaniel Cross, Justin Hoeckle, Michael Lavine, Jason Rubin, Kevin Snow. 281-293 [doi]
- Risk Analysis in Interdependent InfrastructuresYacov Haimes, Joost Santos, Kenneth Crowther, Matthew Henry, Chenyang Lian, Zhenyu Yan. 297-310 [doi]
- Analysis of Interdependencies Between Italy s Economic SectorsRoberto Setola. 311-321 [doi]
- The ISE Metamodel for Critical InfrastructuresFelix Flentge, Uwe Beyer. 323-336 [doi]
- Multigraph Dependency Models for Heterogeneous InfrastructuresNils Kalstad Svendsen, Stephen D. Wolthusen. 337-350 [doi]
- Visualizing Cascading Failures in Critical Cyber InfrastructuresJason K. Kopylec, Anita D Amico, John R. Goodall. 351-364 [doi]
- A Service-Oriented Approach for Assessing Infrastructure SecurityMarcelo Masera, Igor Nai Fovino. 367-379 [doi]
- Analysis of Electrical Power and Oil and Gas Pipeline FailuresJeffrey S. Simonoff, Carlos E. Restrepo, Rae Zimmerman, Zvia Naphtali. 381-394 [doi]