Description |
1 online resource (xvi, 328 pages) : illustrations |
Series |
IFIP Advances in Information and Communication Technology ; 570 |
|
IFIP advances in information and communication technology ; 570.
|
Contents |
Part I: Themes and issues: 1. Quantifying the costs of data breaches / Siddharth Dongre, Sumita Mishra, Carol Romanowski and Manan Buddhadev |
|
Part II: Infrastructure protection: 2. A comparative analysis approach for deriving failure scenarios in the natural gas distribution infrastructure / Michael Locasto and David Balenson -- 3. An attack-fault tree analysis of a movable railroad bridge / Matthew Jablonski, Yongxin Wang, Chaitanya Yavvari, Zezhou Wang, Xiang Liu, Keith Holt and Duminda Wijesekera -- 4. Converting an electric power utility network to defend against crafted inputs / Michael Millian, Prashant Anantharaman, Sergey Bratus, Sean Smith and Michael Locasto -- 5. Cyber security modeling of non-critical nuclear power plant digital instrumentation / Trevor MacLean, Robert Borrelli and Michael Haney |
|
Part III: Vehicle infrastructure security: 6. Electronic control unit discrimination using wired signal distinct native attributes / Rahn Lassiter, Scott Graham, Timothy Carbino and Stephen Dunlap -- 7. Vehicle identification and route reconstruction via TPMS data leakage / Kenneth Hacker, Scott Graham and Stephen Dunlap -- 8. Modeling liability data collection systems for intelligent transportation infrastructure using hyperledger fabric / Luis Cintron, Scott Graham, Douglas Hodson and Barry Mullins |
|
Part IV: Telecommunications infrastructure security: 9. Securing wireless coprocessors from attacks in the Internet of Things / Jason Staggs and Sujeet Shenoi -- 10. Vulnerability assessment of InfiniBand networking / Daryl Schmitt, Scott Graham, Patrick Sweeney and Robert Mills |
|
Part V: Cyber-physical systems security: 11. Leveraging cyber-physical system honeypots to enhance threat intelligence / Michael Haney -- 12. Dynamic repair of mission-critical applications with runtime snap-ins / J. Peter Brady, Sergey Bratus and Sean Smith -- 13. Data-driven field mapping of security logs for integrated monitoring / Seungoh Choi, Yesol Kim, Jeong-Han Yun, Byung-Gil Min and HyoungChun Kim |
|
Part VI: Industrial control systems security: 14. Modeling and machine-checking bump-in-the-wire security for industrial control systems / Mehdi Sabraoui, Jeffrey Hieb, Adrian Lauf and James Graham -- 15. Defining attack patterns for industrial control systems / Raymond Chan, Kam-Pui Chow and Chun-Fai Chan -- 16. An incident response model for industrial control system forensics based on historical events / Ken Yau, Kam-Pui Chow and Siu-Ming Yiu |
Summary |
Critical Infrastructure Protection XIII Edited by: Jason Staggs and Sujeet Shenoi The information infrastructure--comprising computers, embedded devices, networks and software systems--is vital to operations in every sector: chemicals, commercial facilities, communications, critical manufacturing, dams, defense industrial base, emergency services, energy, financial services, food and agriculture, government facilities, healthcare and public health, information technology, nuclear reactors, materials and waste, transportation systems, and water and wastewater systems. Global business and industry, governments, indeed society itself, cannot function if major components of the critical information infrastructure are degraded, disabled or destroyed. Critical Infrastructure Protection XIII describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. Areas of coverage include: Themes and Issues Infrastructure Protection Vehicle Infrastructure Security Telecommunications Infrastructure Security Cyber-Physical Systems Security Industrial Control Systems Security This book is the thirteenth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of sixteen edited papers from the Thirteenth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, held at SRI International, Arlington, Virginia, USA in the spring of 2019. Critical Infrastructure Protection XIII is an important resource for researchers, faculty members and graduate students, as well as for policy makers, practitioners and other individuals with interests in homeland security. Jason Staggs is an Adjunct Assistant Professor of Computer Science at the University of Tulsa, Tulsa, Oklahoma, USA. Sujeet Shenoi is the F.P. Walter Professor of Computer Science and a Professor of Chemical Engineering at the University of Tulsa, Tulsa, Oklahoma, USA |
Subject |
Computer networks -- Security measures -- Congresses
|
|
Computer networks -- Security measures
|
Genre/Form |
proceedings (reports)
|
|
Conference papers and proceedings
|
|
Conference papers and proceedings.
|
|
Actes de congrès.
|
Form |
Electronic book
|
Author |
Staggs, Jason
|
|
Shenoi, Sujeet.
|
ISBN |
9783030346478 |
|
3030346471 |
|