Critical Infrastructure Protection IV Fourth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, ICCIP 2010, Washington, DC, USA, March 15-17, 2010, Revised Selected Papers / edited by Tyler Moore, Sujeet Shenoi.

The information infrastructure – comprising computers, embedded devices, networks and software systems – is vital to operations in every sector: inf- mation technology, telecommunications, energy, banking and ?nance, tra- portation systems, chemicals, agriculture and food, defense industrial base, p...

Full description

Saved in:
Bibliographic Details
Corporate Author: SpringerLink (Online service)
Other Authors: Moore, Tyler (Editor), Shenoi, Sujeet (Editor)
Format: eBook
Language:English
Published: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2010.
Edition:1st ed. 2010.
Series:IFIP Advances in Information and Communication Technology, 342
Springer eBook Collection.
Subjects:
Online Access:Click to view e-book
Holy Cross Note:Loaded electronically.
Electronic access restricted to members of the Holy Cross Community.
Table of Contents:
  • Themes and Issues
  • Security At What Cost?
  • Foreign Direct Investment in an Era of Increased Threats to Critical Infrastructures
  • Critical Information Infrastructure Protection in the Developing World
  • Control Systems Security
  • Modeling Control System Failures and Attacks – The Waterloo Campaign to Oil Pipelines
  • High Security with Low Latency in Legacy SCADA Systems
  • Detecting Sensor Signal Manipulations in Non-Linear Chemical Processes
  • Distributed Intrusion Detection System for SCADA Protocols
  • Infrastructure Security
  • Distributed IP Watchlist Generation for Intrusion Detection in the Electrical Smart Grid
  • Security Analysis of the MPLS Label Distribution Protocol
  • U.S. Federal Oversight of Rail Transportation of Toxic by Inhalation Materials
  • Protecting the Food Supply Chain from Terrorist Attack
  • Infrastructure Modeling and Simulation
  • Interactive Visualization of Interdependencies and Vulnerabilities in Constrained Environments
  • Assessing the Economic Loss and Social Impact of Information System Breakdowns
  • Modeling Inoperability Propagation Using Bayesian Networks
  • Risk Management
  • Resilience in Risk Analysis and Risk Assessment
  • A Manufacturer-Specific Security Assessment Methodology for Critical Infrastructure Components
  • An Advanced Decision-Support Tool for Electricity Infrastructure Operations.