Cyber Security: Are Economic Incentives Adequate? (English)
Free access
- New search for: Dynes, Scott
- New search for: Associate Director Goetz, Eric
- New search for: Freeman, Michael
- New search for: Dynes, Scott
- New search for: Associate Director Goetz, Eric
- New search for: Freeman, Michael
In:
Critical Infrastructure Protection
1
;
15-27
;
2008
- Article/Chapter (Book) / Electronic Resource
-
Title:Cyber Security: Are Economic Incentives Adequate?
-
Contributors:
-
Published in:Critical Infrastructure Protection , 1 ; 15-27IFIP International Federation for Information Processing ; 253, 1 ; 15-27
-
Publisher:
- New search for: Springer US
-
Place of publication:Boston, MA
-
Publication date:2008-01-01
-
Size:13 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 3
-
On the Security Implications of Disruptive TechnologiesRobinson, Neil / Valeri, Lorenzo et al. | 2008
- 15
-
Cyber Security: Are Economic Incentives Adequate?Dynes, Scott / Associate Director Goetz, Eric / Freeman, Michael et al. | 2008
- 29
-
Government Intervention in Information Infrastructure ProtectionAssaf, Dan et al. | 2008
- 43
-
Security of Information Flow in the Electric Power GridTang, Han / McMillin, Bruce et al. | 2008
- 57
-
Securing Positive Train Control SystemsHartong, Mark / Goel, Rajni / Wijesekera, Duminda et al. | 2008
- 73
-
Lessons Learned from the Maroochy Water BreachSlay, Jill / Miller, Michael et al. | 2008
- 83
-
Reducing Risk in Oil and Gas Production OperationsJohnsen, Stig / Ask, Rune / Roisli, Randi et al. | 2008
- 99
-
Securing Current and Future Process Control SystemsCunningham, Robert / Cheung, Steven / Fong, Martin / Lindqvist, Ulf / Nicol, David / Pawlowski, Ronald / Robinson, Eric / Sanders, William / Singh, Sankalp / Valdes, Alfonso et al. | 2008
- 117
-
Security Strategies for SCADA NetworksChandia, Rodrigo / Gonzalez, Jesus / Kilpatrick, Tim / Papa, Mauricio / Professor Shenoi, Sujeet et al. | 2008
- 133
-
Security Enhancements for Distributed Control SystemsHieb, Jeffrey / Graham, James / Patel, Sandip et al. | 2008
- 147
-
Security Challenges of Reconfigurable Devices in the Power GridMyagmar, Suvda / Campbell, Roy / Winslett, Marianne et al. | 2008
- 161
-
Intrusion Detection and Event Monitoring in SCADA NetworksOman, Paul / Phillips, Matthew et al. | 2008
- 175
-
Passive Scanning in Modbus NetworksGonzalez, Jesus / Papa, Mauricio et al. | 2008
- 189
-
Formal Modeling and Analysis of the Modbus ProtocolDutertre, Bruno et al. | 2008
- 205
-
Security Analysis of Multilayer SCADA ProtocolsEdmonds, Janica / Papa, Mauricio / Professor Shenoi, Sujeet et al. | 2008
- 223
-
Remote Forensic Analysis of Process Control SystemsCassidy, Regis Friend / Chavez, Adrian / Trent, Jason / Urrea, Jorge et al. | 2008
- 237
-
Creating a European SCADA Security TestbedChristiansson, Henrik / Luiijf, Eric et al. | 2008
- 251
-
Protecting Internet Services from Low-Rate DoS AttacksTang, Yajuan / Luo, Xiapu / Chang, Rocky et al. | 2008
- 267
-
Detecting Wormhole Attacks in Wireless Sensor NetworksXu, Yurong / Chen, Guanling / Ford, James / Makedon, Fillia et al. | 2008
- 281
-
Detecting Non-Discoverable Bluetooth DevicesCross, Daniel / Hoeckle, Justin / Lavine, Michael / Rubin, Jason / Snow, Kevin et al. | 2008
- 297
-
Risk Analysis in Interdependent InfrastructuresHaimes, Yacov / Santos, Joost / Crowther, Kenneth / Henry, Matthew / Lian, Chenyang / Yan, Zhenyu et al. | 2008
- 311
-
Analysis of Interdependencies Between Italy's Economic SectorsSetola, Roberto et al. | 2008
- 323
-
The ISE Metamodel for Critical InfrastructuresFlentge, Felix / Beyer, Uwe et al. | 2008
- 337
-
Multigraph Dependency Models for Heterogeneous InfrastructuresSvendsen, Nils / Wolthusen, Stephen et al. | 2008
- 351
-
Visualizing Cascading Failures in Critical Cyber InfrastructuresKopylec, Jason / D'Amico, Anita / Goodall, John et al. | 2008
- 367
-
A Service-Oriented Approach for Assessing Infrastructure SecurityMasera, Marcelo / Fovino, Igor Nai et al. | 2008
- 381
-
Analysis of Electrical Power and Oil and Gas Pipeline FailuresSimonoff, Jeffrey / Restrepo, Carlos / Zimmerman, Rae / Naphtali, Zvia et al. | 2008