© 2010

Critical Infrastructure Protection IV

Fourth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, ICCIP 2010, Washington, DC, USA, March 15-17, 2010, Revised Selected Papers

  • Tyler Moore
  • Sujeet Shenoi
Conference proceedings ICCIP 2010

Part of the IFIP Advances in Information and Communication Technology book series (IFIPAICT, volume 342)

Table of contents

  1. Front Matter
  2. Themes and Issues

    1. Front Matter
      Pages 1-1
    2. Neil Robinson, Dimitris Potoglou, Chong Kim, Peter Burge, Richard Warnes
      Pages 3-15
    3. Ian Ellefsen, Sebastiaan von Solms
      Pages 29-40
  3. Control Systems Security

    1. Front Matter
      Pages 41-41
    2. Rouslan Solomakhin, Patrick Tsang, Sean Smith
      Pages 63-79
    3. Thomas McEvoy, Stephen Wolthusen
      Pages 81-94
    4. Igor Nai Fovino, Marcelo Masera, Michele Guglielmi, Andrea Carcano, Alberto Trombetta
      Pages 95-110
  4. Infrastructure Security

    1. Front Matter
      Pages 111-111
    2. Daniel Guernsey, Aaron Engel, Jonathan Butts, Sujeet Shenoi
      Pages 127-139
    3. Mark Hartong, Rajni Goel, Duminda Wijesekera
      Pages 141-155
    4. Maria Jesus Alvarez, Ainara Alvarez, Maria Carla De Maggio, Ainhoa Oses, Marcella Trombetta, Roberto Setola
      Pages 157-167
  5. Infrastructure Modeling and Simulation

    1. Front Matter
      Pages 169-169
    2. Nils Lunden, Robin Sveen, Hans Lund, Nils Svendsen, Stephen Wolthusen
      Pages 171-183
    3. Zaw Zaw Aung, Kenji Watanabe
      Pages 199-212
  6. Risk Management

    1. Front Matter
      Pages 213-213

About these proceedings


The information infrastructure – comprising computers, embedded devices, networks and software systems – is vital to operations in every sector: inf- mation technology, telecommunications, energy, banking and ?nance, tra- portation systems, chemicals, agriculture and food, defense industrial base, public health and health care, national monuments and icons, drinking water and water treatment systems, commercial facilities, dams, emergency services, commercial nuclear reactors, materials and waste, postal and shipping, and government facilities. Global business and industry, governments, indeed - ciety itself, cannot function if major components of the critical information infrastructure are degraded, disabled or destroyed. This book, Critical Infrastructure Protection IV, is the fourth volume in the annual series produced by IFIP Working Group 11.10 on Critical Infr- tructure Protection, an active international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation e?orts related to critical infrastructure protection. The book presents original research results and innovative applications in the area of infrastructure protection. Also, it highlights the importance of weaving s- ence, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. This volume contains seventeen edited papers from the Fourth Annual IFIP Working Group 11.10 International Conference on Critical Infrastructure P- tection, held at the National Defense University, Washington, DC, March 15– 17, 2010. The papers were refereed by members of IFIP Working Group 11.10 and other internationally-recognized experts in critical infrastructure prot- tion.


anomaly detection attack taxonomy computer computer science distributed control systems intrusion detection modeling pipeline control systems process control systems risk analysis safety secure protocol security assessment situational awareness smart gri

Editors and affiliations

  • Tyler Moore
    • 1
  • Sujeet Shenoi
    • 2
  1. 1.Harvard UniversityCambridgeUSA
  2. 2.Department of Computer ScienceUniversity of TulsaTulsaUSA

Bibliographic information

Industry Sectors
IT & Software
Finance, Business & Banking
Energy, Utilities & Environment