The Community for Technology Leaders
Green Image
TABLE OF CONTENTS
Issue No. 06 - Nov.-Dec. (vol. 12)
ISSN: 1540-7993

[Front cover] (PDF)

pp. c1

Table of contents (PDF)

pp. 1-2

[Masthead] (PDF)

pp. 6

Reviewer Thanks (HTML)

pp. 7-8

Closing the Gap on Securing Energy Sector Control Systems [Guest editors' introduction] (HTML)

Sean Peisert , Lawrence Berkeley National Laboratory and University of California, Davis
pp. 13-14

Control Systems for the Power Grid and Their Resiliency to Attacks (Abstract)

Carlos Barreto , University of Texas at Dallas
Jairo Giraldo , Universidad de los Andes, Colombia
Alvaro A. Cardenas , University of Texas at Dallas
Eduardo Mojica-Nava , Universidad Nacional, Colombia
Nicanor Quijano , Universidad de los Andes, Colombia
pp. 15-23

Emerging Techniques for Field Device Security (Abstract)

Moses Schwartz , Bechtel Corporation
John Mulder , Sandia National Laboratories
Adrian R. Chavez , Sandia National Laboratories
Benjamin A. Allan , Sandia National Laboratories
pp. 24-31

Monitoring Security of Networked Control Systems: It's the Physics (Abstract)

Chuck McParland , Lawrence Berkeley National Laboratory
Sean Peisert , Lawrence Berkeley National Laboratory and University of California, Davis
Anna Scaglione , University of California, Davis
pp. 32-39

Detecting Industrial Control Malware Using Automated PLC Code Analytics (Abstract)

Saman Zonouz , Rutgers University
Julian Rrushi , Western Washington University
pp. 40-47

Control Systems Security from the Front Lines (Abstract)

Sean Peisert , Lawrence Berkeley National Laboratory and University of California, Davis
Eric Byres , Tofino Security
Paul Dorey , CSO Confidential
Dale Peterson , Digital Bond
Zach Tudor , SRI International
pp. 55-58

Experimenting with Incentives: Security in Pilots for Future Grids (Abstract)

Francien Dechesne , Delft University of Technology and Leiden University
Dina Hadziosmanovic , Delft University of Technology
Wolter Pieters , University of Twente and Delft University of Technology
pp. 59-66

Cloud Security Auditing: Challenges and Emerging Approaches (Abstract)

Jungwoo Ryoo , Pennsylvania State University
Syed Rizvi , Pennsylvania State University
William Aiken , Pennsylvania State University
John Kissell , Pennsylvania State University
pp. 68-74

Insights on the Security and Dependability of Industrial Control Systems (Abstract)

Frank Kargl , University of Ulm
Rens W. van der Heijden , University of Ulm
Hartmut Konig , Brandenburg University of Technology Cottbus
Alfonso Valdes , University of Illinois at Urbana-Champaign
Marc C. Dacier , Qatar Computing Research Institute
pp. 75-78

Advancing Cybersecurity Education (Abstract)

Melissa Dark , Purdue University
pp. 79-83

Better Together: Usability and Security Go Hand in Hand (Abstract)

Lorrie Faith Cranor , Carnegie Mellon University
Norbou Buchler , US Army Research Laboratory
pp. 89-93

Trust, but Verify (Abstract)

Michael Lesk , Rutgers University
pp. 94-96

Physical Unclonable Functions: A Primer (Abstract)

Todd Bauer , Sandia National Laboratories
Jason Hamlet , Sandia National Laboratories
pp. 97-101

What Should Crypto Look Like? (HTML)

Steven M. Bellovin , Columbia University
pp. 108
77 ms
(Ver 3.3 (11022016))