Skip to main content
  • Conference proceedings
  • © 2009

Critical Infrastructure Protection III

Third IFIP WG 11.10 International Conference, Hanover, New Hampshire, USA, March 23-25, 2009, Revised Selected Papers

Conference proceedings info: ICCIP 2009.

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (17 papers)

  1. Front Matter

  2. Risk Management

    1. Front Matter

      Pages 1-1
    2. Risk-Based Criticality Analysis

      • Marianthi Theoharidou, Panayiotis Kotzanikolaou, Dimitris Gritzalis
      Pages 35-49
    3. Modeling and Managing Risk in Billing Infrastructures

      • Fabrizio Baiardi, Claudio Telmon, Daniele Sgandurra
      Pages 51-64
  3. Control Systems Security

    1. Front Matter

      Pages 65-65
    2. A Taxonomy of Attacks on the DNP3 Protocol

      • Samuel East, Jonathan Butts, Mauricio Papa, Sujeet Shenoi
      Pages 67-81
    3. Design and Implementation of a Secure Modbus Protocol

      • Igor Nai Fovino, Andrea Carcano, Marcelo Masera, Alberto Trombetta
      Pages 83-96
    4. Providing Situational Awareness for Pipeline Control Operations

      • Jonathan Butts, Hugo Kleinhans, Rodrigo Chandia, Mauricio Papa, Sujeet Shenoi
      Pages 97-111
    5. Enhancing the Safety, Security and Resilience of ICT and Scada Systems Using Action Research

      • Stig Johnsen, Torbjorn Skramstad, Janne Hagen
      Pages 113-123
    6. Using Physical Models for Anomaly Detection in Control Systems

      • Nils Svendsen, Stephen Wolthusen
      Pages 139-149
    7. Detecting Anomalies in Process Control Networks

      • Julian Rrushi, Kyoung-Don Kang
      Pages 151-165
  4. Infrastructure Security

    1. Front Matter

      Pages 167-167
    2. Nondeducibility-Based Analysis of Cyber-Physical Systems

      • Thoshitha Gamage, Bruce McMillin
      Pages 169-183
    3. Stack-Based Buffer Overflows in Harvard Class Embedded Systems

      • Kristopher Watts, Paul Oman
      Pages 185-197
    4. Secure Cross-Domain Train Scheduling

      • Mark Hartong, Rajni Goel, Duminda Wijesekera
      Pages 199-211
  5. Infrastructure Modeling and Simulation

    1. Front Matter

      Pages 213-213
    2. A Holistic-Reductionistic Approach for Modeling Interdependencies

      • Stefano De Porcellinis, Gabriele Oliva, Stefano Panzieri, Roberto Setola
      Pages 215-227

Other Volumes

  1. Critical Infrastructure Protection III

About this book

The information infrastructure – comprising computers, embedded devices, networks and software systems – is vital to operations in every sector: inf- mation technology, telecommunications, energy, banking and ?nance, tra- portation systems, chemicals, agriculture and food, defense industrial base, public health and health care, national monuments and icons, drinking water and water treatment systems, commercial facilities, dams, emergency services, commercial nuclear reactors, materials and waste, postal and shipping, and government facilities. Global business and industry, governments, indeed - ciety itself, cannot function if major components of the critical information infrastructure are degraded, disabled or destroyed. This book, Critical Infrastructure Protection III, is the third volume in the annualseriesproducedbyIFIP WorkingGroup11.10onCriticalInfrastructure Protection, an active international community of scientists, engineers, prac- tioners and policy makers dedicated to advancing research, development and implementation e?orts related to critical infrastructure protection. The book presents original research results and innovative applications in the area of infrastructure protection. Also, it highlights the importance of weaving s- ence, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. This volume contains seventeen edited papers from the Third Annual IFIP Working Group 11.10 International Conference on Critical Infrastructure P- tection, held at Dartmouth College, Hanover, New Hampshire, March 23–25, 2009. The papers were refereed by members of IFIP Working Group 11.10 and other internationally-recognized expertsin critical infrastructure protection.

Editors and Affiliations

  • Dartmouth College, I3P, Hanover, USA

    Charles Palmer

  • University of Tulsa, Tulsa, USA

    Sujeet Shenoi

Bibliographic Information

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access