Abstract is missing.
- Security At What Cost?Neil Robinson, Dimitris Potoglou, Chong Kim, Peter Burge, Richard Warnes. 3-15 [doi]
- Foreign Direct Investment in an Era of Increased Threats to Critical InfrastructuresDan Assaf. 17-27 [doi]
- Critical Information Infrastructure Protection in the Developing WorldIan Ellefsen, Sebastiaan H. von Solms. 29-40 [doi]
- Modeling Control System Failures and Attacks - The Waterloo Campaign to Oil PipelinesJonathan Butts, Mason Rice, Sujeet Shenoi. 43-62 [doi]
- High Security with Low Latency in Legacy SCADA SystemsRouslan Solomakhin, Patrick P. Tsang, Sean W. Smith. 63-79 [doi]
- Detecting Sensor Signal Manipulations in Non-Linear Chemical ProcessesThomas Richard McEvoy, Stephen D. Wolthusen. 81-94 [doi]
- Distributed Intrusion Detection System for SCADA ProtocolsIgor Nai Fovino, Marcelo Masera, Michele Guglielmi, Andrea Carcano, Alberto Trombetta. 95-110 [doi]
- Distributed IP Watchlist Generation for Intrusion Detection in the Electrical Smart GridRay Klump, Matthew Kwiatkowski. 113-126 [doi]
- Security Analysis of the MPLS Label Distribution ProtocolDaniel Guernsey, Aaron Engel, Jonathan Butts, Sujeet Shenoi. 127-139 [doi]
- U.S. Federal Oversight of Rail Transportation of Toxic by Inhalation MaterialsMark Hartong, Rajni Goel, Duminda Wijesekera. 141-155 [doi]
- Protecting the Food Supply Chain from Terrorist AttackMaría Jesús Álvarez, Ainara Alvarez, Maria Carla De Maggio, Ainhoa Oses, Marcella Trombetta, Roberto Setola. 157-167 [doi]
- Interactive Visualization of Interdependencies and Vulnerabilities in Constrained EnvironmentsNils Lunden, Robin Sveen, Hans Lund, Nils Kalstad Svendsen, Stephen D. Wolthusen. 171-183 [doi]
- Assessing the Economic Loss and Social Impact of Information System BreakdownsFabio Bisogni, Simona Cavallini. 185-198 [doi]
- Modeling Inoperability Propagation Using Bayesian NetworksZaw Zaw Aung, Kenji Watanabe. 199-212 [doi]
- Resilience in Risk Analysis and Risk AssessmentStig Ole Johnsen. 215-227 [doi]
- A Manufacturer-Specific Security Assessment Methodology for Critical Infrastructure ComponentsThomas Brandstetter, Konstantin Knorr, Ute Rosenbaum. 229-244 [doi]
- An Advanced Decision-Support Tool for Electricity Infrastructure OperationsYousu Chen, Zhenyu Huang, Pak Chung Wong, Patrick Mackey, Craig Allwardt, Jian Ma, Frank L. Greitzer. 245-260 [doi]