Skip to main content
  • Conference proceedings
  • © 2022

Critical Infrastructure Protection XVI

16th IFIP WG 11.10 International Conference, ICCIP 2022, Virtual Event, March 14–15, 2022, Revised Selected Papers

Conference proceedings info: ICCIP 2022.

Buying options

eBook USD 129.00
Price excludes VAT (USA)
  • ISBN: 978-3-031-20137-0
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Hardcover Book USD 169.99
Price excludes VAT (USA)

This is a preview of subscription content, access via your institution.

Table of contents (15 papers)

  1. Front Matter

    Pages I-XVIII
  2. Organizational Aspects of OSS Projects

    1. Front Matter

      Pages 1-1
    2. FLOSS Project Management in Government-Academia Collaboration

      • Melissa Wen, Paulo Meirelles, Rodrigo Siqueira, Fabio Kon
      Pages 15-25
  3. OSS Projects Validity

    1. Front Matter

      Pages 37-37
    2. Open Source Software Resilience Framework

      • Apostolos Kritikos, Ioannis Stamelos
      Pages 39-49
  4. Mining OSS Data

    1. Front Matter

      Pages 77-77
    2. Process Mining for Process Conformance Checking in an OSS Project: An Empirical Research

      • Elia Kouzari, Lazaros Sotiriadis, Ioannis Stamelos
      Pages 79-89
    3. Ranking Source Code Static Analysis Warnings for Continuous Monitoring of FLOSS Repositories

      • Athos Ribeiro, Paulo Meirelles, Nelson Lago, Fabio Kon
      Pages 90-101
  5. Additive Manufacturing Systems

    1. ATTACK-DEFENSE MODELING OF MATERIAL EXTRUSION ADDITIVE MANUFACTURING SYSTEMS

      • Alyxandra Van Stockum, Elizabeth Kurkowski, Tiffany Potok, Curtis Taylor, Joel Dawson, Mason Rice et al.
      Pages 121-153
    2. MANIPULATION OF G-CODE TOOLPATH FILES IN 3D PRINTERS: ATTACKS AND MITIGATIONS

      • Elizabeth Kurkowski, Alyxandra Van Stockum, Joel Dawson, Curtis Taylor, Tricia Schulz, Sujeet Shenoi
      Pages 155-174
    3. LOW-MAGNITUDE INFILL STRUCTURE MANIPULATION ATTACKS ON FUSED FILAMENT FABRICATION 3D PRINTERS

      • Muhammad Haris Rais, Muhammad Ahsan, Vaibhav Sharma, Radhika Barua, Rob Prins, Irfan Ahmed
      Pages 205-232
  6. Infrastructure Device Security

    1. Front Matter

      Pages 233-233
    2. LEVERAGING CONFIDENTIAL COMPUTING TO ENABLE SECURE INFORMATION SHARING

      • Samuel Chadwick, Scott Graham, James Dean, Matthew Dallmeyer
      Pages 235-252
    3. EVALUATING THE USE OF BOOT IMAGE ENCRYPTION ON THE TALOS II ARCHITECTURE

      • Calvin Muramoto, Scott Graham, Stephen Dunlap
      Pages 253-273
  7. Telecommunications Systems Security

    1. Front Matter

      Pages 275-275

Other Volumes

  1. Critical Infrastructure Protection XVI

About this book

The information infrastructure – comprising computers, embedded devices, networks and software systems – is vital to operations in every sector: chemicals, commercial facilities, communications, critical manufacturing, dams, defense industrial base, emergency services, energy, financial services, food and agriculture, government facilities, healthcare and public health, information technology, nuclear reactors, materials and waste, transportation systems, and water and wastewater systems.  Global business and industry, governments, indeed society itself, cannot function if major components of the critical information infrastructure are degraded, disabled or destroyed.

Critical Infrastructure Protection XVI describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection.  Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors.  Areas of coverage include: Industrial Control Systems Security; Telecommunications Systems Security; Infrastructure Security.

This book is the 16th volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection.  


The book contains a selection of 11 edited papers from the Fifteenth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, held as a virtual event during March, 2022.

Critical Infrastructure Protection XVI is an important resource for researchers, faculty members and graduate students, as well as for policy makers, practitioners and other individuals with interests in homeland security.

Keywords

  • communication systems
  • computer crime
  • computer networks
  • computer security
  • computer systems
  • cryptography
  • cyber security
  • data communication systems
  • data security
  • economics
  • engineering
  • mobile computing
  • mobile devices
  • network protocols
  • network security
  • signal processing
  • telecommunication networks

Editors and Affiliations

  • University of Tulsa, Tulsa, USA

    Jason Staggs, Sujeet Shenoi

Bibliographic Information

Buying options

eBook USD 129.00
Price excludes VAT (USA)
  • ISBN: 978-3-031-20137-0
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Hardcover Book USD 169.99
Price excludes VAT (USA)