Please view the copyright notices at the bottom of this page prior to downloading any papers.
Ph.D. Dissertation, University of Illinois at Urbana-Champaign, 2008.Tags: 2008, Author: Anwar, Z., control systems, Ph.D. Dissertation, security assessment
Critical Infrastructure Protection II: Proceedings of the Second Annual IFIP WG 11.10 International Conference, Arlington, Virginia, March 17-19, 2008, pp. 173-187. [SpringerLink entry]Tags: 2008, Author: Anwar, Z., Author: Campbell, R.H., compliance assessment, first-order logic, security best practices
International Journal of Critical Infrastructure Protection, vol. 2, nos. 1-2, May 2009, pp. 13-25. [ScienceDirect entry]Tags: 2009, Author: Anwar, Z., Author: Campbell, R.H., Author: Gutierrez, A., Author: Montanari, M., budget constraints, IEEE 118 bus test, security hardening
Proceedings of the IEEE International Conference on Dependable Systems and Networks with FTCS and DCC (DSN 2008), Anchorage, Alaska, June 24-27, 2008, pp. 366-375.1 [IEEE Xplore entry]Tags: 2008, access control, attack graph, Author: Anwar, Z., Author: Campbell, R.H., Author: Shankesi, R., authorization, automatic security assessment, dynamic critical cyber-infrastructure, graph theory, network connectivity, network model, online event aggregator, power system control, SCADA systems, static critical cyber-infrastructure, workflow model