Vulnerability Assessment of InfiniBand Networking (Englisch)
- Neue Suche nach: Schmitt, Daryl
- Neue Suche nach: Graham, Scott
- Neue Suche nach: Sweeney, Patrick
- Neue Suche nach: Mills, Robert
- Neue Suche nach: Schmitt, Daryl
- Neue Suche nach: Graham, Scott
- Neue Suche nach: Sweeney, Patrick
- Neue Suche nach: Mills, Robert
In:
Critical infrastructure protection XIII
; 179-208
;
2019
-
ISBN:
- Aufsatz (Konferenz) / Print
-
Titel:Vulnerability Assessment of InfiniBand Networking
-
Beteiligte:Schmitt, Daryl ( Autor:in ) / Graham, Scott ( Autor:in ) / Sweeney, Patrick ( Autor:in ) / Mills, Robert ( Autor:in )
-
Kongress:IFIP Working Group 11.10 International Conference on Critical Infrastructure Protection ; 13. ; 2019 ; Arlington, Va.
-
Erschienen in:Critical infrastructure protection XIII ; 179-208
-
Verlag:
- Neue Suche nach: Springer
-
Erscheinungsort:Cham
-
Erscheinungsdatum:2019
-
ISBN:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Print
-
Sprache:Englisch
- Neue Suche nach: 54.38
- Weitere Informationen zu Basisklassifikation
-
Schlagwörter:
-
Klassifikation:
BKL: 54.38 Computersicherheit -
Datenquelle:
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 3
-
Quantifying the Costs of Data BreachesDongre, Siddharth / Mishra, Sumita / Romanowski, Carol / Buddhadev, Manan et al. | 2019
- 19
-
A Comparative Analysis Approach for Deriving Failure Scenarios in the Natural Gas Distribution InfrastructureLocasto, Michael / Balenson, David et al. | 2019
- 51
-
An Attack-Fault Tree Analysis of a Movable Railroad BridgeJablonski, Matthew / Wang, Yongzrin / Yavvari, Chaitanya / Wang, Zezhou / Liu, Xiang / Holt, Keith / Wijesekera, Duminda et al. | 2019
- 73
-
Converting an Electric Power Utility Network to Defend Against Crafted InputsMillian, Michael / Anantharaman, Prashant / Bratus, Sergey / Smith, Sean / Locasto, Michael et al. | 2019
- 87
-
Cyber Security Modeling of Non-Critical Nuclear Power Plant Digital InstrumentationMacLean, Trevor / Borrelli, Robert / Haney, Michael et al. | 2019
- 103
-
Electronic Control Unit Discrimination Using Wired Signal Distinct Native AttributesLassiter, Rahn / Graham, Scott / Carbino, Timothy / Dunlap, Stephen et al. | 2019
- 123
-
Vehicle Identification and Route Reconstruction via TPMS Data LeakageHacker, Kenneth / Graham, Scott / Dunlap, Stephen et al. | 2019
- 137
-
Modeling Liability Data Collection Systems for Intelligent Transportation Infrastructure Using Hyperledger FabricClintron, Luis / Graham, Scott / Hodson, Douglas / Mullins, Barry et al. | 2019
- 159
-
Securing Wireless Coprocessors from Attacks in the Internet of ThingsStaggs, Jason / Shenoi, Sujeet et al. | 2019
- 179
-
Vulnerability Assessment of InfiniBand NetworkingSchmitt, Daryl / Graham, Scott / Sweeney, Patrick / Mills, Robert et al. | 2019
- 209
-
Leveraging Cyber-Physical System Honeypots to Enhance Threat IntelligenceHaney, Michael et al. | 2019
- 235
-
Dynamic Repair of Mission-Critical Applications with Runtime Snap-InsBrady, J. Peter / Bratus, Sergey / Smith, Sean et al. | 2019
- 253
-
Data-Driven Field Mapping of Security Logs for Integrated MonitoringChoi, Seungoh / Kim, Yesol / Yun, Jeong-Han / Min, Byung-Gil / Kim, HyoungChun et al. | 2019
- 271
-
Modeling and Machine-Checking Bump-in-the-Wire Security for Industrial Control SystemsSabraoui, Mehdi / Hieb, Jeffrey / Lauf, Adrian / Graham, James et al. | 2019
- 289
-
Defining Attack Patterns for Industrial Control SystemsChan, Raymond / Chow, Kam-Pui / Chan, Chun-Fai et al. | 2019
- 311
-
An Incident Response Model for Industrial Control System Forensics Based on Historical EventsYau, Ken / Chow, Kam-Pui / Yiu, Siu-Ming et al. | 2019