default search action
International Journal of Critical Infrastructure Protection, Volume 5
Volume 5, Number 1, March 2012
- Sujeet Shenoi:
Editorial. 1-2
- Sanaz Rahimi, Mehdi R. Zargham:
Analysis of the security of VPN configurations in industrial control environments. 3-13 - Marco Beccuti, Silvano Chiaradonna, Felicita Di Giandomenico, Susanna Donatelli, Giovanna Dondossola, Giuliana Franceschinis:
Quantification of dependencies between electrical and information infrastructures. 14-27
- David P. Fidler:
Tinker, Tailor, Soldier, Duqu: Why cyberespionage is more dangerous than you think. 28-29
- Hamed Okhravi, Adam Comella, Eric Robinson, Joshua W. Haines:
Creating a cyber moving target for critical infrastructure applications using platform diversity. 30-39 - Daniel Guernsey, Mason Rice, Sujeet Shenoi:
Implementing novel reactive defense functionality in MPLS networks using hyperspeed signaling. 40-52
Volume 5, Number 2, July 2012
- Sujeet Shenoi:
Editorial. 53-54
- Ginger Armbruster, Barbara Endicott-Popovsky, Jan Whittington:
Are we prepared for the economic risk resulting from telecom hotel disruptions? 55-65 - Samuel J. Stone, Michael A. Temple:
Radio-frequency-based anomaly detection for programmable logic controllers in the critical infrastructure. 66-73 - Jason Reeves, Ashwin Ramaswamy, Michael E. Locasto, Sergey Bratus, Sean W. Smith:
Intrusion detection for resource-constrained embedded control systems in the power grid. 74-83
- Robert A. Miller:
Cyber war realities - What lies ahead. 84-85
- Marco Castrucci, Alessandro Neri, Filipe Caldeira, Jocelyn Aubert, Djamel Khadraoui, Matthieu Aubigny, Carlo Harpes, Paulo Simões, Vincenzo Suraci, Paolo Capodieci:
Design and implementation of a mediation system enabling secure communication among Critical Infrastructures. 86-97 - Casey T. Deccio:
Maintenance, mishaps and mending in deployments of the domain name system security extensions (DNSSEC). 98-103
Volume 5, Numbers 3-4, December 2012
- Sujeet Shenoi:
Editorial. 105-107
- Yakup Koç, Almerima Jamakovic, Bart Gijsen:
A global reference model of the domain name system. 108-117 - Mike Burmester, Emmanouil Magkos, Vassilios Chrissikopoulos:
Modeling security in cyber-physical systems. 118-126 - Gerry Howser, Bruce M. McMillin:
Modeling and reasoning about the security of drive-by-wire automobile systems. 127-134
- Alec Yasinsac:
Precision in elections - Extracting a precise result from an inherently imprecise process. 135-136
- Cristina Alcaraz, Javier López:
Analysis of requirements for critical control systems. 137-145 - Daniel P. Shepard, Todd E. Humphreys, Aaron A. Fansler:
Evaluation of the vulnerability of phasor measurement units to GPS spoofing attacks. 146-153 - Bradley Reaves, Thomas H. Morris:
Analysis and mitigation of vulnerabilities in short-range wireless communications for industrial control systems. 154-174
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.