Limit search to available items
Book Cover
E-book
Author IFIP Working Group 11.10 International Conference on Critical Infrastructure Protection (11th : 2017 : Arlington, Va.)

Title Critical infrastructure protection XI : 11th IFIP WG 11.10 International Conference, ICCIP 2017, Arlington, VA, USA, March 13-15, 2017, Revised selected papers / Mason Rice, Sujeet Shenoi (eds.)
Published Cham, Switzerland : Springer, 2017

Copies

Description 1 online resource (xvi, 338 pages) : illustrations
Series IFIP advances in information and communication technology, 1868-4238 ; 512
IFIP advances in information and communication technology ; 512. 1868-4238
Contents Intro -- Contents -- Contributing Authors -- Preface -- I INFRASTRUCTURE PROTECTION -- PROTECTING THE TRANSPORTATION SECTOR FROM THE NEGATIVE IMPACTS OF CLIMATE CHANGE -- Abstract -- Keywords -- 1. Introduction -- 2. Transportation Sector -- 2.1 Climate Change Impacts on Transportation -- 3. Approaches for Climate Change Adaptation -- 3.1 Adaptation Assessment -- 3.2 Classification of Adaptation Options -- 3.3 Global Adaptation Initiatives -- 4. Adaptation in the Transportation Sector -- 4.1 Adaptation to Climate Change -- 4.2 Effective Governance for Adaptation
4.3 Infrastructure Design and Planning -- 4.4 Redundancies in Transportation Modes -- 4.5 Operational Contingency -- 4.6 Early Warning Systems -- 4.7 Building Adaptive Capacity -- 4.8 Comprehensive Collaboration -- 5. Conclusions -- References -- EVALUATION OF ADDITIVE AND SUBTRACTIVE MANUFACTURING FROM THE SECURITY PERSPECTIVE -- Abstract -- Keywords -- 1. Introduction -- 2. Related Work -- 2.1 Cyber-Physical System Security -- 2.2 Additive Manufacturing Security -- 3. Manufacturing Workflows -- 3.1 Additive Manufacturing Workflow -- 3.2 Subtractive Manufacturing Workflow
4. Attack Analysis Framework -- 4.1 Attacks -- 4.2 Security Threat Categories -- 5. Security Analysis -- 5.1 Attack Vectors -- 5.2 Compromised Elements -- 5.3 Manipulations -- 5.4 Effects -- 6. Conclusions -- References -- DETECTING DATA MANIPULATION ATTACKS ON T HE SUBSTATION INTERLOCKING FUNCTION USING DIRECT POWER FEEDBACK -- Abstract -- Keywords -- 1. Introduction -- 2. Related Work -- 3. Substation Interlocking -- 3.1 Substation Switching -- 3.2 Interlocking Function Operation -- 3.3 Substation Communication Protocols -- 4. Attack Description -- 5. Proposed Solution
5.1 Switchgear Event Detection -- 5.2 Switchgear State Identification -- 5.3 Interlocking Function Security Controller -- 6. Implementation and Results -- 6.1 Implementation -- 6.2 Results -- 7. Conclusions -- References -- NETWORK FORENSIC ANALYSIS OF ELECTRICAL SUBSTATION AUTOMATION TRAFFIC -- Abstract -- Keywords -- 1. Introduction -- 2. Problem Statement -- 3. Graph Construction -- 3.1 Model Graph Construction -- 3.2 Concrete Graph Construction -- 4. Time Series Analysis -- 5. Experimental Evaluation -- 6. Conclusions -- Acknowledgement -- References
II INFRASTRUCTURE MODELING AND SIMULATION -- MULTIPLE SECURITY DOMAIN MODEL OF A VEHICLE IN AN AUTOMATED PLATOON -- Abstract -- Keywords -- 1. Introduction -- 2. System Model -- 3. Related Work -- 3.1 Confidentiality -- 3.2 Integrity -- 3.3 Availability -- 3.4 Multiple Security Domain Nondeducibility -- 4. Problem Statement -- 4.1 Case 1 -- 4.2 Case 2 -- 4.3 Case 3 -- 4.4 Case 4 -- 4.5 Case 5 -- 5. Conclusions -- Acknowledgement -- References -- DISTRIBUTED DATA FUSION FOR SITUATIONAL AWARENESS IN CRITICAL INFRASTRUCTURES WITH LINK FAILURES -- Abstract -- Keywords -- 1. Introduction
Summary The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital to operations in every sector: chemicals, commercial facilities, communications, critical manufacturing, dams, defense industrial base, emergency services, energy, financial services, food and agriculture, government facilities, healthcare and public health, information technology, nuclear reactors, materials and waste, transportation systems, and water and wastewater systems. Global business and industry, governments, indeed society itself, cannot function if major components of the critical information infrastructure are degraded, disabled or destroyed. Critical Infrastructure Protection XI describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. Areas of coverage include: Infrastructure Protection, Infrastructure Modeling and Simulation, Industrial Control System Security, and Internet of Things Security. This book is the eleventh volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of sixteen edited papers from the Eleventh Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, held at SRI International, Arlington, Virginia, USA in the spring of 2017. Critical Infrastructure Protection XI is an important resource for researchers, faculty members and graduate students, as well as for policy makers, practitioners and other individuals with interests in homeland security
Notes Online resource; title from PDF title page (SpringerLink, viewed December 5, 2017)
Subject Computer networks -- Security measures -- Congresses
Computer networks -- Security measures
Genre/Form proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.
Form Electronic book
Author Rice, Mason, editor.
Shenoi, Sujeet, editor.
ISBN 9783319703954
3319703951
Other Titles Critical infrastructure protection 11
ICCIP 2017