Advertisement

Critical Infrastructure Protection XII

12th IFIP WG 11.10 International Conference, ICCIP 2018, Arlington, VA, USA, March 12-14, 2018, Revised Selected Papers

  • Jason Staggs
  • Sujeet Shenoi
Conference proceedings ICCIP 2018

Part of the IFIP Advances in Information and Communication Technology book series (IFIPAICT, volume 542)

Table of contents

  1. Front Matter
    Pages i-xvi
  2. Themes and Issues

    1. Front Matter
      Pages 1-1
    2. Richard White
      Pages 3-21
    3. Atif Hussain, Siraj Shaikh, Alex Chung, Sneha Dawda, Madeline Carr
      Pages 23-38
    4. Lynne Graves, Mark Yampolskiy, Wayne King, Sofia Belikovetsky, Yuval Elovici
      Pages 39-64
  3. Infrastructure Protection

    1. Front Matter
      Pages 65-65
    2. Clark Wolfe, Scott Graham, Robert Mills, Scott Nykl, Paul Simon
      Pages 81-90
    3. Daniel Celebucki, Scott Graham, Sanjeev Gunawardena
      Pages 91-111
    4. Asma Alnemari, Suchith Arodi, Valentina Rodriguez Sosa, Soni Pandey, Carol Romanowski, Rajendra Raj et al.
      Pages 113-125
  4. Infrastructure Modeling and Simulation

    1. Front Matter
      Pages 147-147
    2. Marielba Urdaneta, Antoine Lemay, Nicolas Saunier, Jose Fernandez
      Pages 177-196
    3. Karl Bentjen, Scott Graham, Scott Nykl
      Pages 197-212
  5. Industrial Control Systems Security

    1. Front Matter
      Pages 213-213
    2. Eniye Tebekaemi, Duminda Wijesekera, Paulo Costa
      Pages 243-264
    3. Joo-Yeop Song, Woomyo Lee, Jeong-Han Yun, Hyunjae Park, Sin-Kyu Kim, Young-June Choi
      Pages 265-281
    4. Luke Bradford, Barry Mullins, Stephen Dunlap, Timothy Lacey
      Pages 283-306

About these proceedings

Introduction

The information infrastructure – comprising computers, embedded devices, networks and software systems – is vital to operations in every sector: chemicals, commercial facilities, communications, critical manufacturing, dams, defense industrial base, emergency services, energy, financial services, food and agriculture, government facilities, healthcare and public health, information technology, nuclear reactors, materials and waste, transportation systems, and water and wastewater systems.  Global business and industry, governments, indeed society itself, cannot function if major components of the critical information infrastructure are degraded, disabled or destroyed.

Critical Infrastructure Protection XII describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection.  Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors.  Areas of coverage include: Themes and Issues; Infrastructure Protection; Infrastructure Modeling and Simulation; Industrial Control Systems Security.

This book is the twelfth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection.  The book contains a selection of fifteen edited papers from the Twelfth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, held at SRI International, Arlington, Virginia, USA in the spring of 2018.

Critical Infrastructure Protection XII is an important resource for researchers, faculty members and graduate students, as well as for policy makers, practitioners and other individuals with interests in homeland security.

Jason Staggs is an Adjunct Assistant Professor of Computer Science at the University of Tulsa, Tulsa, Oklahoma, USA.

Sujeet Shenoi is the F.P. Walter Professor of Computer Science and a Professor of Chemical Engineering at the University of Tulsa, Tulsa, Oklahoma, USA.

 ​

Keywords

computer crime control systems critical infrastructure protection cryptography cyber-attacks cyber-physical systems security data mining data privacy encryption hardware industrial control systems security infrastructure modeling infrastructure security risk assessment security systems

Editors and affiliations

  • Jason Staggs
    • 1
  • Sujeet Shenoi
    • 2
  1. 1.Tandy School of Computer ScienceUniversity of TulsaTulsaUSA
  2. 2.Tandy School of Computer ScienceUniversity of TulsaTulsaUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-030-04537-1
  • Copyright Information IFIP International Federation for Information Processing 2018
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-030-04536-4
  • Online ISBN 978-3-030-04537-1
  • Series Print ISSN 1868-4238
  • Series Online ISSN 1868-422X
  • Buy this book on publisher's site
Industry Sectors
Pharma
Automotive
Chemical Manufacturing
Biotechnology
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Law
Aerospace
Engineering