Session Recording

To access the session recording, you must be logged in and registered for the meeting.

Register NowLog In


Papers

To access paper attachments, you must be logged in and registered for the meeting.

Register NowLog In

Finding Cyber-Attack Path Considering the Impact of the Attack by Using Page Rank Algorithm

Young Ho Chae (KAIST), Chanyoung Lee (KAIST), Poong Hyun Seong (KAIST)

A Framework for Describing Attacker Models

Christopher Deloglos (Virginia Commonwealth Univ.), Ashraf Tantawy (Virginia Commonwealth Univ.), Carl Elks (Virginia Commonwealth Univ.)

Response of Programmable Logic Controllers of the Pressurizer in a Representative PWR Plant Following a False Data Injection

Timothy Schriener (Univ. of New Mexico), Mohamed S. El-Genk (Univ. of New Mexico)

Automated Scenario Generation for Cyber Risk Assessments using CICAT

Jackson Wynn (The MITRE Corp.)

Exploring Quantum Key Distribution for Nuclear I&C Cybersecurity

Stylianos Chatzidakis (Purdue Univ.)


Discussion

To join the conversation, you must be logged in and registered for the meeting.

Register NowLog In