Advertisement

Table of contents

  1. Front Matter
  2. Control Systems Security

    1. Front Matter
      Pages 1-1
    2. Chad Arnold, Jonathan Butts, Krishnaprasad Thirunarayan
      Pages 3-13
    3. Marina Krotofil, Alvaro Cardenas, Kishore Angrishi
      Pages 29-45
    4. Cristina Alcaraz, Stephen Wolthusen
      Pages 47-63
    5. Haihui Gao, Yong Peng, Zhonghua Dai, Ting Wang, Xuefeng Han, Hanjing Li
      Pages 79-91
  3. Infrastructure Security

    1. Front Matter
      Pages 93-93
    2. Riccardo Santini, Chiara Foglietta, Stefano Panzieri
      Pages 95-109
    3. Mohammad Ababneh, Malek Athamnah, Duminda Wijesekera, Paulo Costa
      Pages 111-125
    4. William Hurst, Madjid Merabti, Paul Fergus
      Pages 127-138
  4. Infrastructure Modeling and Simulation

    1. Front Matter
      Pages 139-139
    2. Simona Cavallini, Cristina d’Alessandro, Margherita Volpe, Stefano Armenia, Camillo Carlini, Elisabeth Brein et al.
      Pages 141-154
    3. Mohammed Talat Khouj, Sarbjit Sarkaria, Cesar Lopez, Jose Marti
      Pages 155-172
    4. Okan Pala, David Wilson, Russell Bent, Steve Linger, James Arnold
      Pages 173-191
  5. Risk and Impact Assessment

    1. Front Matter
      Pages 193-193
    2. Richard White, Aaron Burkhart, Edward Chow, Logan Maynard
      Pages 195-211
    3. Valerio Formicola, Antonio Di Pietro, Abdullah Alsubaie, Salvatore D’Antonio, Jose Marti
      Pages 213-229
    4. Simona Cavallini, Fabio Bisogni, Marco Bardoscia, Roberto Bellotti
      Pages 231-242
  6. Advanced Techniques

    1. Front Matter
      Pages 243-243
    2. Richard Agbeyibor, Jonathan Butts, Michael Grimaila, Robert Mills
      Pages 245-261
    3. Goitom Weldehawaryat, Stephen Wolthusen
      Pages 263-276

About these proceedings

Introduction

The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital to day-to-day operations in every sector: information and telecommunications, banking and finance, energy, chemicals and hazardous materials, agriculture, food, water, public health, emergency services, transportation, postal and shipping, government and defense. Global business and industry, governments, indeed society itself, cannot function effectively if major components of the critical information infrastructure are degraded, disabled or destroyed. Critical Infrastructure Protection VIII describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. Areas of coverage include: control systems security, infrastructure security, infrastructure modeling and simulation, risk and impact assessment, and advanced techniques. This book is the eighth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of seventeen edited papers from the 8th Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, held at SRI International, Arlington, Virginia, DC, USA in the spring of 2014. Critical Infrastructure Protection VIII is an important resource for researchers, faculty members and graduate students, as well as for policy makers, practitioners and other individuals with interests in homeland security.

Keywords

applied computing cryptanalysis and other attacks cyber attacks industry and manufacturing information infrastructure information systems intrusion detection process control systems security services

Editors and affiliations

  • Jonathan Butts
    • 1
  • Sujeet Shenoi
    • 2
  1. 1.Air Force Institute of TechnologyDaytonUSA
  2. 2.University of TulsaTulsaUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-662-45355-1
  • Copyright Information IFIP International Federation for Information Processing 2014
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-662-45354-4
  • Online ISBN 978-3-662-45355-1
  • Series Print ISSN 1868-4238
  • Series Online ISSN 1868-422X
  • Buy this book on publisher's site