nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Accurate modeling of Modbus/TCP for intrusion detection in SCADA systems
|
Goldenberg, Niv |
|
2013 |
|
2 |
p. 63-75 13 p. |
artikel |
2 |
A control system testbed to validate critical infrastructure protection concepts
|
Morris, Thomas |
|
2011 |
|
2 |
p. 88-103 16 p. |
artikel |
3 |
A framework for studying mortality arising from critical infrastructure loss
|
Yates, Athol |
|
2014 |
|
2 |
p. 100-111 12 p. |
artikel |
4 |
Agent-based input–output interdependency model
|
Oliva, Gabriele |
|
2010 |
|
2 |
p. 76-82 7 p. |
artikel |
5 |
A length-based, multiple-resource formulation for shortest path network interdiction problems in the transportation sector
|
Yates, Justin |
|
2013 |
|
2 |
p. 107-119 13 p. |
artikel |
6 |
Analysis of the effects of distributed denial-of-service attacks on MPLS networks
|
Genge, Béla |
|
2013 |
|
2 |
p. 87-95 9 p. |
artikel |
7 |
An exploration of defensive deception in industrial communication networks
|
Rrushi, Julian L. |
|
2011 |
|
2 |
p. 66-75 10 p. |
artikel |
8 |
Are we prepared for the economic risk resulting from telecom hotel disruptions?
|
Armbruster, Ginger |
|
2012 |
|
2 |
p. 55-65 11 p. |
artikel |
9 |
A signaling framework to deter aggression in cyberspace
|
Rice, Mason |
|
2011 |
|
2 |
p. 57-65 9 p. |
artikel |
10 |
Building secure critical infrastructures
|
Palmatier, Thomas E. |
|
2013 |
|
2 |
p. 85-86 2 p. |
artikel |
11 |
Control systems personnel are from Mars; IT personnel are from Venus
|
Conklin, William Arthur |
|
2011 |
|
2 |
p. 76-77 2 p. |
artikel |
12 |
Coupled Petri nets for computer network risk analysis
|
Henry, Matthew H. |
|
2010 |
|
2 |
p. 67-75 9 p. |
artikel |
13 |
Cyber war realities—What lies ahead
|
Miller, Robert A. |
|
2012 |
|
2 |
p. 84-85 2 p. |
artikel |
14 |
Design and implementation of a mediation system enabling secure communication among Critical Infrastructures
|
Castrucci, Marco |
|
2012 |
|
2 |
p. 86-97 12 p. |
artikel |
15 |
Editorial
|
Shenoi, Sujeet |
|
2010 |
|
2 |
p. 51-52 2 p. |
artikel |
16 |
Editorial
|
Shenoi, Sujeet |
|
2011 |
|
2 |
p. 55-56 2 p. |
artikel |
17 |
Editorial Board
|
|
|
2010 |
|
2 |
p. IFC- 1 p. |
artikel |
18 |
Editorial Board
|
|
|
2014 |
|
2 |
p. IFC- 1 p. |
artikel |
19 |
Editorial Board
|
|
|
2011 |
|
2 |
p. IFC- 1 p. |
artikel |
20 |
Editorial Board
|
|
|
2013 |
|
2 |
p. IFC- 1 p. |
artikel |
21 |
Editorial Board
|
|
|
2012 |
|
2 |
p. IFC- 1 p. |
artikel |
22 |
Evaluation of the ability of the Shodan search engine to identify Internet-facing industrial control devices
|
Bodenheim, Roland |
|
2014 |
|
2 |
p. 114-123 10 p. |
artikel |
23 |
Firmware modification attacks on programmable logic controllers
|
Basnight, Zachry |
|
2013 |
|
2 |
p. 76-84 9 p. |
artikel |
24 |
Fragility of oil as a critical infrastructure problem
|
Jaradat, Ra’ed M. |
|
2014 |
|
2 |
p. 86-99 14 p. |
artikel |
25 |
Identifying critical infrastructure sectors and their dependencies: An Indian scenario
|
Singh, Abhishek Narain |
|
2014 |
|
2 |
p. 71-85 15 p. |
artikel |
26 |
Intrusion detection for resource-constrained embedded control systems in the power grid
|
Reeves, Jason |
|
2012 |
|
2 |
p. 74-83 10 p. |
artikel |
27 |
Maintenance, mishaps and mending in deployments of the domain name system security extensions (DNSSEC)
|
Deccio, Casey |
|
2012 |
|
2 |
p. 98-103 6 p. |
artikel |
28 |
[No title]
|
Shenoi, Sujeet |
|
2014 |
|
2 |
p. 69-70 2 p. |
artikel |
29 |
[No title]
|
Shenoi, Sujeet |
|
2013 |
|
2 |
p. 61-62 2 p. |
artikel |
30 |
[No title]
|
Shenoi, Sujeet |
|
2012 |
|
2 |
p. 53-54 2 p. |
artikel |
31 |
Observations from a Cyber Tabletop
|
George, Richard |
|
2014 |
|
2 |
p. 112-113 2 p. |
artikel |
32 |
Radio-frequency-based anomaly detection for programmable logic controllers in the critical infrastructure
|
Stone, Samuel |
|
2012 |
|
2 |
p. 66-73 8 p. |
artikel |
33 |
Risk-informed assessment of regional preparedness: A case study of emergency potable water for hurricane response in Southeast Virginia
|
Crowther, Kenneth G. |
|
2010 |
|
2 |
p. 83-98 16 p. |
artikel |
34 |
Securing wastewater facilities from accidental and intentional harm: A cost-benefit analysis
|
Papa, Stephen |
|
2013 |
|
2 |
p. 96-106 11 p. |
artikel |
35 |
Security analysis of the ADS-B implementation in the next generation air transportation system
|
McCallie, Donald |
|
2011 |
|
2 |
p. 78-87 10 p. |
artikel |
36 |
The SEMA referential framework: Avoiding ambiguities in the terms “security” and “safety”
|
Piètre-Cambacédès, Ludovic |
|
2010 |
|
2 |
p. 55-66 12 p. |
artikel |
37 |
What makes critical infrastructures Critical?
|
Cohen, Fred |
|
2010 |
|
2 |
p. 53-54 2 p. |
artikel |
38 |
Whither cyberpower?
|
Rowland, Jill |
|
2014 |
|
2 |
p. 124-137 14 p. |
artikel |