Linked e-resources
Details
Table of Contents
Detecting Integrity Attacks on Industrial Control Systems
Detecting Malicious Software Execution in Programmable Logic Controllers Using Power Fingerprinting
Timing of Cyber-Physical Attacks on Process Control Systems
Recovery of Structural Controllability for Control Systems
Industrial Control System Traffic Data Sets for Intrusion Detection Research
An Industrial Control System Testbed Based on Emulation, Physical Devices and Simulation
Evidence Theory for Cyber-Physical Systems
An Automated Dialog System for Conducting Security Interviews for Access Control
A Survey of Critical Infrastructure Security
A System Dynamics Framework for Modeling Critical Infrastructure Resilience
Reinforcement Learning Using Monte Carlo Policy Estimation for Disaster Mitigation
Accuracy of Service Area Estimation Methods Used for Critical Infrastructure Recovery
A Decision Support Tool for a Unified Homeland Security Strategy
Assessing the Impact of Cyber Attacks on Wireless Sensor Nodes That Monitor Interdependent Physical Systems
Assessing Potential Casualties in Critical Events
Evaluation of Format-Preserving Encryption Algorithms for Critical Infrastructure Protection
Asynchronous Binary Byzantine Consensus over Graphs with Power-Law Degree Sequence.
Detecting Malicious Software Execution in Programmable Logic Controllers Using Power Fingerprinting
Timing of Cyber-Physical Attacks on Process Control Systems
Recovery of Structural Controllability for Control Systems
Industrial Control System Traffic Data Sets for Intrusion Detection Research
An Industrial Control System Testbed Based on Emulation, Physical Devices and Simulation
Evidence Theory for Cyber-Physical Systems
An Automated Dialog System for Conducting Security Interviews for Access Control
A Survey of Critical Infrastructure Security
A System Dynamics Framework for Modeling Critical Infrastructure Resilience
Reinforcement Learning Using Monte Carlo Policy Estimation for Disaster Mitigation
Accuracy of Service Area Estimation Methods Used for Critical Infrastructure Recovery
A Decision Support Tool for a Unified Homeland Security Strategy
Assessing the Impact of Cyber Attacks on Wireless Sensor Nodes That Monitor Interdependent Physical Systems
Assessing Potential Casualties in Critical Events
Evaluation of Format-Preserving Encryption Algorithms for Critical Infrastructure Protection
Asynchronous Binary Byzantine Consensus over Graphs with Power-Law Degree Sequence.