default search action
CRITIS 2016: Paris, France
- Grigore M. Havârneanu, Roberto Setola, Hypatia Nassopoulos, Stephen D. Wolthusen:
Critical Information Infrastructures Security - 11th International Conference, CRITIS 2016, Paris, France, October 10-12, 2016, Revised Selected Papers. Lecture Notes in Computer Science 10242, Springer 2017, ISBN 978-3-319-71367-0 - Ali Abbasi, Majid Hashemi, Emmanuele Zambon, Sandro Etalle:
Stealth Low-Level Manipulation of Programmable Logic Controllers I/O by Pin Control Exploitation. 1-12 - Tomomi Aoyama, Kenji Watanabe, Ichiro Koshijima, Yoshihiro Hashimoto:
Developing a Cyber Incident Communication Management Exercise for CI Stakeholders. 13-24 - Joydeep Banerjee, Arunabha Sen, Chenyang Zhou:
On Auxiliary Entity Allocation Problem in Multi-layered Interdependent Critical Infrastructures. 25-37 - Pieter Burghouwt, Marinus Maris, Sjaak van Peski, Eric A. M. Luiijf, Imelda van de Voorde, Marcel E. M. Spruit:
Cyber Targets Water Management. 38-49 - Sabarathinam Chockalingam, Dina Hadziosmanovic, Wolter Pieters, André Teixeira, Pieter H. A. J. M. van Gelder:
Integrated Safety and Security Risk Assessment Methods: A Survey of Key Characteristics and Applications. 50-62 - Francesca De Cillis, Stefano De Muro, Franco Fiumara, Roberto Setola, Antonio Sforza, Claudio Sterle:
Railway Station Surveillance System Design: A Real Application of an Optimal Coverage Approach. 63-74 - Annunziata Esposito Amideo, Maria Paola Scaparra:
A Synthesis of Optimization Approaches for Tackling Critical Information Infrastructure Survivability. 75-87 - Jonathan Goh, Sridhar Adepu, Khurum Nazir Junejo, Aditya Mathur:
A Dataset to Support Research in the Design of Secure Water Treatment Systems. 88-99 - Amélie Grangeat, Julie Sina, Vittorio Rosato, Aurélia Bony, Marianthi Theocharidou:
Human Vulnerability Mapping Facing Critical Service Disruptions for Crisis Managers. 100-110 - István Kiss, Béla Genge:
A Methodology for Monitoring and Control Network Design. 111-122 - Tingting Li, Chris Hankin:
Effective Defence Against Zero-Day Exploits Using Bayesian Networks. 123-136 - Anesu M. C. Marufu, Anne V. D. M. Kayem, Stephen D. Wolthusen:
Power Auctioning in Resource Constrained Micro-grids: Cases of Cheating. 137-149 - Alain Mermoud, Marcus Matthias Keupp, Solange Ghernaouti, Dimitri Percia David:
Using Incentives to Foster Security Information Sharing and Cooperation: A General Theory and Application to Critical Infrastructure Protection. 150-162 - Steve Muller, Carlo Harpes, Yves Le Traon, Sylvain Gombault, Jean-Marie Bonnin, Paul Hoffmann:
Dynamic Risk Analyses and Dependency-Aware Root Cause Model for Critical Infrastructures. 163-175 - Juan E. Rubio, Cristina Alcaraz, Javier López:
Selecting Privacy Solutions to Prioritise Control in Smart Metering Systems. 176-188 - Giedre Sabaliauskaite, Sridhar Adepu, Aditya Mathur:
A Six-Step Model for Safety and Security Analysis of Cyber-Physical Systems. 189-200 - Stefano Sebastio, Antonio Scala, Gregorio D'Agostino:
Availability Study of the Italian Electricity SCADA System in the Cloud. 201-212 - William G. Temple, Yuan Li, Bao Anh N. Tran, Yan Liu, Binbin Chen:
Railway System Failure Scenario Analysis. 213-225 - Khan Ferdous Wahid, Helmut Kaufmann, Kevin Jones:
Tamper Resistant Secure Digital Silo for Log Storage in Critical Infrastructures. 226-238 - James G. Wright, Stephen D. Wolthusen:
Access Control and Availability Vulnerabilities in the ISO/IEC 61850 Substation Automation Protocol. 239-251 - Ronald Joseph Wright, Ken Keefe, Brett Feddersen, William H. Sanders:
A Case Study Assessing the Effects of Cyber Attacks on a River Zonal Dispatcher. 252-264 - Heinrich Strauss, Anne V. D. M. Kayem, Stephen D. Wolthusen:
Reliable Key Distribution in Smart Micro-Grids. 265-270 - Jeong-Han Yun, Yeop Chang, Kyoung-Ho Kim, Woonyon Kim:
Security Validation for Data Diode with Reverse Channel. 271-282 - Andreas Rieb, Ulrike Lechner:
Towards a Cybersecurity Game: Operation Digital Chameleon. 283-295 - Dimitri Percia David, Marcus Matthias Keupp, Solange Ghernaouti, Alain Mermoud:
Cyber Security Investment in the Context of Disruptive Technologies: Extension of the Gordon-Loeb Model and Application to Critical Infrastructure Protection. 296-301 - Simona A. Popusoi, Cornelia Mairean, Grigore M. Havârneanu:
Behavioral Intentions and Threat Perception During Terrorist, Fire and Earthquake Scenarios. 302-307 - Elisa Canzani, Helmut Kaufmann, Ulrike Lechner:
An Operator-Driven Approach for Modeling Interdependencies in Critical Infrastructures Based on Critical Services and Sectors. 308-320 - Maxime Puys, Jean-Louis Roch, Marie-Laure Potet:
Domain Specific Stateful Filtering with Worst-Case Bandwidth. 321-327 - Mounia El Anbal, Anas Abou El Kalam, Siham Benhadou, Fouad Moutaouakkil, Hicham Medromi:
Securing SCADA Critical Network Against Internal and External Threats - Short Paper. 328-339 - Antonio Di Pietro, Luigi La Porta, Luisa Lavalle, Maurizio Pollino, Vittorio Rosato, Alberto Tofani:
Simulation of Cascading Outages in (Inter)-Dependent Services and Estimate of Their Societal Consequences - Short Paper. 340-345
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.