Go to main content
Formats
Format
BibTeX
MARCXML
TextMARC
MARC
DublinCore
EndNote
NLM
RefWorks
RIS

Linked e-resources

Details

Part I: Themes and issues: 1. Quantifying the costs of data breaches / Siddharth Dongre, Sumita Mishra, Carol Romanowski and Manan Buddhadev.

Part II: Infrastructure protection: 2. A comparative analysis approach for deriving failure scenarios in the natural gas distribution infrastructure / Michael Locasto and David Balenson
3. An attack-fault tree analysis of a movable railroad bridge / Matthew Jablonski, Yongxin Wang, Chaitanya Yavvari, Zezhou Wang, Xiang Liu, Keith Holt and Duminda Wijesekera
4. Converting an electric power utility network to defend against crafted inputs / Michael Millian, Prashant Anantharaman, Sergey Bratus, Sean Smith and Michael Locasto
5. Cyber security modeling of non-critical nuclear power plant digital instrumentation / Trevor MacLean, Robert Borrelli and Michael Haney.

Part III: Vehicle infrastructure security: 6. Electronic control unit discrimination using wired signal distinct native attributes / Rahn Lassiter, Scott Graham, Timothy Carbino and Stephen Dunlap
7. Vehicle identification and route reconstruction via TPMS data leakage / Kenneth Hacker, Scott Graham and Stephen Dunlap
8. Modeling liability data collection systems for intelligent transportation infrastructure using hyperledger fabric / Luis Cintron, Scott Graham, Douglas Hodson and Barry Mullins.

Part IV: Telecommunications infrastructure security: 9. Securing wireless coprocessors from attacks in the Internet of Things / Jason Staggs and Sujeet Shenoi
10. Vulnerability assessment of InfiniBand networking / Daryl Schmitt, Scott Graham, Patrick Sweeney and Robert Mills.

Part V: Cyber-physical systems security: 11. Leveraging cyber-physical system honeypots to enhance threat intelligence / Michael Haney
12. Dynamic repair of mission-critical applications with runtime snap-ins / J. Peter Brady, Sergey Bratus and Sean Smith
13. Data-driven field mapping of security logs for integrated monitoring / Seungoh Choi, Yesol Kim, Jeong-Han Yun, Byung-Gil Min and HyoungChun Kim.

Part VI: Industrial control systems security: 14. Modeling and machine-checking bump-in-the-wire security for industrial control systems / Mehdi Sabraoui, Jeffrey Hieb, Adrian Lauf and James Graham
15. Defining attack patterns for industrial control systems / Raymond Chan, Kam-Pui Chow and Chun-Fai Chan
16. An incident response model for industrial control system forensics based on historical events / Ken Yau, Kam-Pui Chow and Siu-Ming Yiu.

Browse Subjects

Show more subjects...

Statistics

from
to
Export