


default search action
CRITIS 2011: Lucerne, Switzerland
- Sandro Bologna, Bernhard M. Hämmerli, Dimitris Gritzalis, Stephen D. Wolthusen:

Critical Information Infrastructure Security - 6th International Workshop, CRITIS 2011, Lucerne, Switzerland, September 8-9, 2011, Revised Selected Papers. Lecture Notes in Computer Science 6983, Springer 2013, ISBN 978-3-642-41475-6 - Eric A. M. Luiijf

, Kim Besseling, Maartje Spoelstra, Patrick De Graaf:
Ten National Cyber Security Strategies: A Comparison. 1-17 - Adedayo Oyelakin Adetoye, Michael Goldsmith, Sadie Creese:

Analysis of Dependencies in Critical Infrastructures. 18-29 - Thomas Schaberreiter, Filipe Caldeira

, Jocelyn Aubert
, Edmundo Monteiro
, Djamel Khadraoui, Paulo Simões
:
Assurance and Trust Indicators to Evaluate Accuracy of On-line Risk in Critical Infrastructures. 30-41 - Rüdiger Klein:

An Innovative Approach to Emergency Management in Large Infrastructures. 42-57 - Armin Veichtlbauer, Thomas Pfeiffenberger:

Dynamic Evacuation Guidance as Safety Critical Application in Building Automation. 58-69 - Thomas Richard McEvoy

, Stephen D. Wolthusen:
Defeating Node Based Attacks on SCADA Systems Using Probabilistic Packet Observation. 70-80 - Andrea Arbore, Vincenzo Fioriti:

Sub-optimal Topological Protection Strategy from Advanced Malware. 81-92 - Miltiadis Kandias, Nikos Virvilis, Dimitris Gritzalis:

The Insider Threat in Cloud Computing. 93-103 - Panayiotis Kotzanikolaou

, Marianthi Theoharidou
, Dimitris Gritzalis:
Interdependencies between Critical Infrastructures: Analyzing the Risk of Cascading Effects. 104-115 - Alfonso Farina, Antonio Graziano, Stefano Panzieri

, Federica Pascucci
, Roberto Setola
:
How to Perform Verification and Validation of Critical Infrastructure Modeling Tools. 116-127 - Francesco Flammini

, Stefano Marrone
, Nicola Mazzocca
, Valeria Vittorini:
Petri Net Modelling of Physical Vulnerability. 128-139 - Béla Genge, Christos Siaterlis:

Investigating the Effect of Network Parameters on Coordinated Cyber Attacks against a Simulated Power Plant. 140-151 - Igor Nai Fovino, Salvatore Di Blasi, Andrea Rigoni:

The Role of the DNS in the Secure and Resilient Operation of CIs, the Energy System Example. 152-163 - Tony Proctor:

The Development of Warning, Advice and Reporting Points (WARPs) in UK National Infrastructure. 164-174 - David Sutton, John Harrison, Sandro Bologna, Vittorio Rosato

:
The Contribution of NEISAS to EP3R. 175-186 - Leire Labaka

, Josune Hernantes
, Ana Laugé, Jose Mari Sarriegi:
Policies to Improve Resilience against Major Industrial Accidents. 187-199 - Gabriele Oliva

, Roberto Setola
, Stefano Panzieri
:
Fuzzy Input-Output Inoperability Model - (Short Paper). 200-204 - Emiliano Casalicchio:

Dependencies Discovery and Analysis in Distributed Systems - (Short Paper). 205-208 - Stefano Avallone

, Claudio Mazzariello, Francesco Oliviero, Simon Pietro Romano
:
Protecting Critical Infrastructures from Stealth Attacks: A Closed-Loop Approach Involving Detection and Remediation - (Short Paper). 209-212 - Thomas Schaberreiter, Kati Kittilä, Kimmo Halunen, Juha Röning

, Djamel Khadraoui:
Risk Assessment in Critical Infrastructure Security Modelling Based on Dependency Analysis - (Short Paper). 213-217 - Giusj Digioia, Chiara Foglietta

, Gabriele Oliva
, Stefano Panzieri
:
Countermeasures Selection via Evidence Theory - (Short Paper). 218-222 - Antonio Scala

, Gregorio D'Agostino:
The Robustness of Assortativity - (Short Paper). 223-226

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














