Abstract is missing.
- Emergent Risks In Critical InfrastructuresScott Dynes. 3-16 [doi]
- Cyberspace Policy For Critical InfrastructuresDorsey Wilkin, Richard A. Raines, Paul D. Williams, Kenneth Hopkinson. 17-28 [doi]
- Security Assessment Of A Turbo-Gas Power PlantMarcelo Masera, Igor Nai Fovino, Rafal Leszczyna. 31-40 [doi]
- Detecting Cyber Attacks On Nuclear Power PlantsJulian L. Rrushi, Roy H. Campbell. 41-54 [doi]
- Applying Trusted Network Technology To Process Control SystemsHamed Okhravi, David M. Nicol. 57-70 [doi]
- Towards A Taxonomy Of Attacks Against Energy Control SystemsTerry Fleury, Himanshu Khurana, Von Welch. 71-85 [doi]
- Attribution Of Cyber Attacks On Process Control SystemsJeffrey Hunker, Robert Hutchinson, Jonathan Margulies. 87-99 [doi]
- Modeling And Detecting Anomalies In Scada SystemsNils Kalstad Svendsen, Stephen D. Wolthusen. 101-113 [doi]
- Assessing The Integrity Of Field Devices In Modbus NetworksRyan Shayto, Brian Porter, Rodrigo Chandia, Mauricio Papa, Sujeet Shenoi. 115-128 [doi]
- Designing Security-Hardened Microkernels For Field DevicesJeffrey L. Hieb, James H. Graham. 129-140 [doi]
- Combating Memory Corruption Attacks On Scada DevicesCarlo Bellettini, Julian L. Rrushi. 141-156 [doi]
- Mitigating Accidents In Oil And Gas Production FacilitiesStig Ole Johnsen. 157-170 [doi]
- Automated Assessment Of Compliance With Security Best PracticesZahid Anwar, Roy H. Campbell. 173-187 [doi]
- Collaborative Access Control For Critical InfrastructuresAmine Baïna, Anas Abou El Kalam, Yves Deswarte, Mohamed Kaâniche. 189-201 [doi]
- Modeling Dependencies In Critical InfrastructuresAlbert Nieuwenhuijs, Eric A. M. Luiijf, Marieke H. A. Klaver. 205-213 [doi]
- Metrics For Quantifying InterdependenciesEmiliano Casalicchio, Emanuele Galli. 215-227 [doi]
- An Integrated Approach For Simulating InterdependenciesRoberto Setola, Sandro Bologna, Emiliano Casalicchio, Vincenzo Masucci. 229-239 [doi]
- Simulation Of Advanced Train Control SystemsPaul Craven, Paul W. Oman. 243-256 [doi]
- An Integrated Methodology For Critical Infrastructure Modeling And SimulationWilliam J. Tolone, Seok-Won Lee, Wei-ning Xiang, Joshua Blackwell, Cody Yeager, Andrew Schumpert, E. Wray Johnson. 257-268 [doi]
- Using 3D Models And Discrete Simulations In Infrastructure Security ApplicationsPierluigi Assogna, Glauco Bertocchi, Alberto Paoluzzi, Michele Vicentino, Giorgio Scorzelli, Roberto Zollo. 269-278 [doi]