Abstract is missing.
- Using Deception to Shield Cyberspace SensorsMason Rice, Daniel Guernsey, Sujeet Shenoi. 3-18 [doi]
- Botnets as an Instrument of WarfareEric Koziel, David Robinson. 19-28 [doi]
- Lightweight Intrusion Detection for Resource-Constrained Embedded Control SystemsJason Reeves, Ashwin Ramaswamy, Michael E. Locasto, Sergey Bratus, Sean W. Smith. 31-46 [doi]
- A Plant-Wide Industrial Process Control Security ProblemThomas Richard McEvoy, Stephen D. Wolthusen. 47-56 [doi]
- Identifying Vulnerabilities in SCADA Systems via Fuzz-TestingRebecca Shapiro, Sergey Bratus, Edmond Rogers, Sean W. Smith. 57-72 [doi]
- Security Analysis of VPN Configurations in Industrial Control EnvironmentsSanaz Rahimi, Mehdi R. Zargham. 73-88 [doi]
- Implementing Novel Defense Functionality in MPLS Networks Using Hyperspeed SignalingDaniel Guernsey, Mason Rice, Sujeet Shenoi. 91-106 [doi]
- Creating a Cyber Moving Target for Critical Infrastructure ApplicationsHamed Okhravi, Adam Comella, Eric Robinson, Stephen Yannalfo, Peter Michaleas, Joshua Haines. 107-123 [doi]
- An Evidence-Based Trust Assessment Framework for Critical Infrastructure Decision MakingYujue Wang, Carl Hauser. 125-135 [doi]
- Enhancing the Usability of the Commercial Mobile Alert SystemPaul Ngo, Duminda Wijesekera. 137-149 [doi]
- Real-Time Detection of Covert Channels in Highly Virtualized EnvironmentsAnyi Liu, Jim Chen, Li Yang. 151-164 [doi]
- Analyzing Cyber-Physical Attacks on Networked Industrial Control SystemsBéla Genge, Igor Nai Fovino, Christos Siaterlis, Marcelo Masera. 167-183 [doi]
- Using an Emulation Testbed for Operational Cyber Security ExercisesChristos Siaterlis, Andres Perez-Garcia, Marcelo Masera. 185-199 [doi]
- Analyzing Intelligence on WMD Attacks Using Threaded Event-Based SimulationQi Fang, Peng Liu 0005, John Yen, Jonathan H. Morgan, Donald Shemanski, Frank E. Ritter. 201-216 [doi]