


default search action
International Journal of Critical Infrastructure Protection, Volume 6
Volume 6, Number 1, March 2013
- Sujeet Shenoi:

Editorial. 1-2
- Cindy Finke, Jonathan Butts, Robert F. Mills, Michael R. Grimaila:

Enhancing the security of aircraft surveillance in the next generation air traffic control system. 3-11 - Jeffrey L. Hieb

, Jacob Schreiver, James H. Graham:
A security-hardened appliance for implementing authentication and access control in SCADA infrastructures with legacy field devices. 12-24
- Pramode K. Verma:

The role of the network in implementing security and privacy. 25-27
- Aditya K. Sood, Richard J. Enbody:

Crimeware-as-a-service - A survey of commoditized crimeware in the underground market. 28-38 - Austen D. Givens

, Nathan E. Busch:
Realizing the promise of public-private partnerships in U.S. critical infrastructure protection. 39-50 - Adam M. Lewis

, David Ward, Lukasz Cyra, Naouma Kourti:
European Reference Network for Critical Infrastructure Protection. 51-60
Volume 6, Number 2, June 2013
- Sujeet Shenoi:

Editorial. 61-62
- Niv Goldenberg, Avishai Wool

:
Accurate modeling of Modbus/TCP for intrusion detection in SCADA systems. 63-75 - Zachry Basnight, Jonathan Butts, Juan Lopez Jr., Thomas Dubé:

Firmware modification attacks on programmable logic controllers. 76-84
- Thomas E. Palmatier:

Building secure critical infrastructures. 85-86
- Béla Genge, Christos Siaterlis:

Analysis of the effects of distributed denial-of-service attacks on MPLS networks. 87-95 - Stephen M. Papa, William D. Casper, Tyler Moore

:
Securing wastewater facilities from accidental and intentional harm: A cost-benefit analysis. 96-106 - Justin Yates, Sujeevraja Sanjeevi:

A length-based, multiple-resource formulation for shortest path network interdiction problems in the transportation sector. 107-119
Volume 6, Numbers 3-4, December 2013
- Sujeet Shenoi:

Editorial. 121-122
- Ginger Armbruster, Barbara Endicott-Popovsky, Jan Whittington:

Threats to municipal information systems posed by aging infrastructure. 123-131 - Luigi Sportiello:

A methodology for designing robust and efficient hybrid monitoring systems. 132-146
- Tyler Moore

:
The promise and perils of digital currencies. 147-149
- Rafael Ramos Regis Barbosa, Ramin Sadre, Aiko Pras:

Flow whitelisting in SCADA networks. 150-158 - Panagiotis Vlacheas, Vera Stavroulaki

, Panagiotis Demestichas
, Scott Cadzow, Demosthenes Ikonomou, Slawomir Gorniak:
Towards end-to-end network resilience. 159-178
- Eric A. M. Luiijf

:
Why are we so unconsciously insecure? 179-181
- Rabindra Nepal

, Tooraj Jamasb:
Security of European electricity systems: Conceptualizing the assessment criteria and core indicators. 182-196 - Gabriel J. Correa-Henao

, José M. Yusta
, Roberto Lacal-Arántegui
:
Using interconnected risk maps to assess the threats faced by electricity infrastructures. 197-216 - Stefano Marrone

, Roberto Nardone
, Annarita Tedesco
, Pasquale D'Amore, Valeria Vittorini, Roberto Setola
, Francesca De Cillis, Nicola Mazzocca
:
Vulnerability modeling and analysis for critical infrastructure protection applications. 217-227

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














