Advertisement

Critical Infrastructure Protection XI

11th IFIP WG 11.10 International Conference, ICCIP 2017, Arlington, VA, USA, March 13-15, 2017, Revised Selected Papers

  • Mason Rice
  • Sujeet Shenoi

Part of the IFIP Advances in Information and Communication Technology book series (IFIPAICT, volume 512)

Table of contents

  1. Front Matter
    Pages i-xvi
  2. INFRASTRUCTURE PROTECTION

    1. Front Matter
      Pages 1-1
    2. Georgia Lykou, George Stergiopoulos, Antonios Papachrysanthou, Dimitris Gritzalis
      Pages 3-21
    3. Mark Yampolskiy, Wayne King, Gregory Pope, Sofia Belikovetsky, Yuval Elovici
      Pages 23-44
  3. INFRASTRUCTURE MODELING AND SIMULATION

    1. Front Matter
      Pages 79-79
    2. Antonio Di Pietro, Stefano Panzieri, Andrea Gasparri
      Pages 99-117
    3. Luca Galbusera, Georgios Giannopoulos
      Pages 119-136
  4. INDUSTRIAL CONTROL SYSTEM SECURITY

    1. Front Matter
      Pages 137-137
    2. Adrian-Vasile Duka, Bela Genge, Piroska Haller, Bogdan Crainicu
      Pages 139-155
    3. Hunor Sandor, Bela Genge, Piroska Haller, Flavius Graur
      Pages 157-173
    4. Raymond Chan, Kam-Pui Chow
      Pages 175-192
    5. Htein Lin, Stephen Dunlap, Mason Rice, Barry Mullins
      Pages 193-223
    6. Evan Plumley, Mason Rice, Stephen Dunlap, John Pecarina
      Pages 243-271
    7. Joseph Daoud, Mason Rice, Stephen Dunlap, John Pecarina
      Pages 273-294
  5. INTERNET OF THINGS SECURITY

    1. Front Matter
      Pages 295-295
    2. Caleb Mays, Mason Rice, Benjamin Ramsey, John Pecarina, Barry Mullins
      Pages 297-317
    3. Anthony Rose, Jason Bindewald, Benjamin Ramsey, Mason Rice, Barry Mullins
      Pages 319-338

About these proceedings

Introduction

The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital to operations in every sector: chemicals, commercial facilities, communications, critical manufacturing, dams, defense industrial base, emergency services, energy, financial services, food and agriculture, government facilities, healthcare and public health, information technology, nuclear reactors, materials and waste, transportation systems, and water and wastewater systems.  Global business and industry, governments, indeed society itself, cannot function if major components of the critical information infrastructure are degraded, disabled or destroyed.

Critical Infrastructure Protection XI describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection.  Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors.  Areas of coverage include: Infrastructure Protection, Infrastructure Modeling and Simulation, Industrial Control System Security, and Internet of Things Security.

This book is the eleventh volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection.  The book contains a selection of sixteen edited papers from the Eleventh Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, held at SRI International, Arlington, Virginia, USA in the spring of 2017.

Critical Infrastructure Protection XI is an important resource for researchers, faculty members and graduate students, as well as for policy makers, practitioners and other individuals with interests in homeland security.

Keywords

computer crime control systems critical infrastructure protection cyber-physical systems cyber attacks digital forensics emergency management impact assessment industrial control systems Internet of Things (IoT) infrastructure modeling infrastructure simulation modeling risk assessment SCADA systems security security simulation Supervisory Control and Data Acquisition (SCADA)

Editors and affiliations

  • Mason Rice
    • 1
  • Sujeet Shenoi
    • 2
  1. 1.Air Force Institute of TechnologyWright-Patterson Air Force BaseUSA
  2. 2.University of Tulsa TulsaUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-70395-4
  • Copyright Information IFIP International Federation for Information Processing 2017
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-70394-7
  • Online ISBN 978-3-319-70395-4
  • Series Print ISSN 1868-4238
  • Series Online ISSN 1868-422X
  • Buy this book on publisher's site
Industry Sectors
Pharma
Automotive
Chemical Manufacturing
Biotechnology
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Aerospace
Engineering