callback( { "result":{ "query":":facetid:toc:\"db/conf/critis/critis2017.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"69.23" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"26", "@dc":"26", "@oc":"26", "@id":"43374151", "text":":facetid:toc:db/conf/critis/critis2017.bht" } }, "hits":{ "@total":"26", "@computed":"26", "@sent":"26", "@first":"0", "hit":[{ "@score":"1", "@id":"2682582", "info":{"authors":{"author":[{"@pid":"99/8331","text":"Gregorio D'Agostino"},{"@pid":"92/9669","text":"Antonio Scala"}]},"title":"Critical Information Infrastructures Security - 12th International Conference, CRITIS 2017, Lucca, Italy, October 8-13, 2017, Revised Selected Papers","venue":["CRITIS","Lecture Notes in Computer Science"],"volume":"10707","publisher":"Springer","year":"2018","type":"Editorship","key":"conf/critis/2017","doi":"10.1007/978-3-319-99843-5","ee":"https://doi.org/10.1007/978-3-319-99843-5","url":"https://dblp.org/rec/conf/critis/2017"}, "url":"URL#2682582" }, { "@score":"1", "@id":"2899386", "info":{"authors":{"author":[{"@pid":"200/5775","text":"Nikolaos Alexopoulos"},{"@pid":"140/6565","text":"Emmanouil Vasilomanolakis"},{"@pid":"226/1394","text":"Natália Réka Ivánkó"},{"@pid":"m/MaxMuhlhauser","text":"Max Mühlhäuser"}]},"title":"Towards Blockchain-Based Collaborative Intrusion Detection Systems.","venue":"CRITIS","pages":"107-118","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/critis/AlexopoulosVIM17","doi":"10.1007/978-3-319-99843-5_10","ee":"https://doi.org/10.1007/978-3-319-99843-5_10","url":"https://dblp.org/rec/conf/critis/AlexopoulosVIM17"}, "url":"URL#2899386" }, { "@score":"1", "@id":"2899387", "info":{"authors":{"author":[{"@pid":"166/1185","text":"Pol Van Aubel"},{"@pid":"148/6918","text":"Kostas Papagiannopoulos"},{"@pid":"31/6262","text":"Lukasz Chmielewski"},{"@pid":"d/ChristianDoerr","text":"Christian Doerr"}]},"title":"Side-Channel Based Intrusion Detection for Industrial Control Systems.","venue":"CRITIS","pages":"207-224","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/critis/AubelPCD17","doi":"10.1007/978-3-319-99843-5_19","ee":"https://doi.org/10.1007/978-3-319-99843-5_19","url":"https://dblp.org/rec/conf/critis/AubelPCD17"}, "url":"URL#2899387" }, { "@score":"1", "@id":"2899388", "info":{"authors":{"author":[{"@pid":"226/1457","text":"Paul Berthier"},{"@pid":"226/1495","text":"Corentin Bresteau"},{"@pid":"74/3001-1","text":"José M. Fernandez 0001"}]},"title":"On the Security of Aircraft Communication Networks.","venue":"CRITIS","pages":"266-269","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/critis/BerthierBF17","doi":"10.1007/978-3-319-99843-5_25","ee":"https://doi.org/10.1007/978-3-319-99843-5_25","url":"https://dblp.org/rec/conf/critis/BerthierBF17"}, "url":"URL#2899388" }, { "@score":"1", "@id":"2899389", "info":{"authors":{"author":[{"@pid":"226/1592","text":"Steffen O. P. Blume"},{"@pid":"14/9086","text":"Giovanni Sansavini"}]},"title":"The Influence of Load Characteristics on Early Warning Signs in Power Systems.","venue":"CRITIS","pages":"72-83","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/critis/BlumeS17","doi":"10.1007/978-3-319-99843-5_7","ee":"https://doi.org/10.1007/978-3-319-99843-5_7","url":"https://dblp.org/rec/conf/critis/BlumeS17"}, "url":"URL#2899389" }, { "@score":"1", "@id":"2899390", "info":{"authors":{"author":[{"@pid":"202/8212","text":"Anna Bozza"},{"@pid":"150/1922","text":"Domenico Asprone"},{"@pid":"177/1667","text":"Fulvio Parisi"},{"@pid":"88/9763","text":"Gaetano Manfredi"}]},"title":"Role of Urban Interactions and Damage in Seismic Resilience of Historical Centers.","venue":"CRITIS","pages":"97-106","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/critis/BozzaAPM17","doi":"10.1007/978-3-319-99843-5_9","ee":"https://doi.org/10.1007/978-3-319-99843-5_9","url":"https://dblp.org/rec/conf/critis/BozzaAPM17"}, "url":"URL#2899390" }, { "@score":"1", "@id":"2899391", "info":{"authors":{"author":[{"@pid":"48/5701","text":"Yeop Chang"},{"@pid":"128/3587","text":"Seungoh Choi"},{"@pid":"38/376","text":"Jeong-Han Yun"},{"@pid":"202/2395","text":"Sin-Kyu Kim"}]},"title":"One Step More: Automatic ICS Protocol Field Analysis.","venue":"CRITIS","pages":"241-252","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/critis/ChangCYK17","doi":"10.1007/978-3-319-99843-5_22","ee":"https://doi.org/10.1007/978-3-319-99843-5_22","url":"https://dblp.org/rec/conf/critis/ChangCYK17"}, "url":"URL#2899391" }, { "@score":"1", "@id":"2899392", "info":{"authors":{"author":[{"@pid":"226/1602","text":"Simeone Chianese"},{"@pid":"53/2333","text":"Armando Di Nardo"},{"@pid":"78/4043","text":"Michele Di Natale"},{"@pid":"204/9872","text":"Carlo Giudicianni"},{"@pid":"226/1646","text":"Dino Musmarra"},{"@pid":"204/9863","text":"Giovanni Francesco Santonastaso"}]},"title":"DMA Optimal Layout for Protection of Water Distribution Networks from Malicious Attack.","venue":"CRITIS","pages":"84-96","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/critis/ChianeseNNGMS17","doi":"10.1007/978-3-319-99843-5_8","ee":"https://doi.org/10.1007/978-3-319-99843-5_8","url":"https://dblp.org/rec/conf/critis/ChianeseNNGMS17"}, "url":"URL#2899392" }, { "@score":"1", "@id":"2899393", "info":{"authors":{"author":[{"@pid":"202/5117","text":"Alex Coletti"},{"@pid":"25/1774-1","text":"Antonio De Nicola 0001"},{"@pid":"01/4181","text":"Giordano Vicoli"},{"@pid":"44/523","text":"Maria Luisa Villani"}]},"title":"A Gamified Approach to Participatory Modelling of Water System Risks.","venue":"CRITIS","pages":"168-180","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/critis/Coletti0VV17","doi":"10.1007/978-3-319-99843-5_15","ee":"https://doi.org/10.1007/978-3-319-99843-5_15","url":"https://dblp.org/rec/conf/critis/Coletti0VV17"}, "url":"URL#2899393" }, { "@score":"1", "@id":"2899394", "info":{"authors":{"author":[{"@pid":"23/7643","text":"Gianpiero Costantino"},{"@pid":"m/FMartinelli","text":"Fabio Martinelli"},{"@pid":"99/3823","text":"Ilaria Matteucci"}]},"title":"Reputation Systems to Mitigate DoS Attack in Vehicular Network.","venue":"CRITIS","pages":"261-265","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/critis/CostantinoMM17","doi":"10.1007/978-3-319-99843-5_24","ee":"https://doi.org/10.1007/978-3-319-99843-5_24","url":"https://dblp.org/rec/conf/critis/CostantinoMM17"}, "url":"URL#2899394" }, { "@score":"1", "@id":"2899395", "info":{"authors":{"author":[{"@pid":"02/7272","text":"Vincenzo Fioriti"},{"@pid":"221/2260","text":"Ivan Roselli"},{"@pid":"226/1648","text":"Angelo Tatì"},{"@pid":"00/2936","text":"Roberto Romano"},{"@pid":"221/2228","text":"Gerardo De Canio"}]},"title":"Motion Magnification for Urban Buildings.","venue":"CRITIS","pages":"253-260","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/critis/FioritiRTRC17","doi":"10.1007/978-3-319-99843-5_23","ee":"https://doi.org/10.1007/978-3-319-99843-5_23","url":"https://dblp.org/rec/conf/critis/FioritiRTRC17"}, "url":"URL#2899395" }, { "@score":"1", "@id":"2899396", "info":{"authors":{"author":[{"@pid":"131/3581","text":"Mohamad Gharib"},{"@pid":"43/1911","text":"Paolo Lollini"},{"@pid":"31/1895","text":"Andrea Ceccarelli"},{"@pid":"31/4416","text":"Andrea Bondavalli"}]},"title":"Dealing with Functional Safety Requirements for Automotive Systems: A Cyber-Physical-Social Approach.","venue":"CRITIS","pages":"194-206","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/critis/GharibLCB17","doi":"10.1007/978-3-319-99843-5_18","ee":"https://doi.org/10.1007/978-3-319-99843-5_18","url":"https://dblp.org/rec/conf/critis/GharibLCB17"}, "url":"URL#2899396" }, { "@score":"1", "@id":"2899397", "info":{"authors":{"author":[{"@pid":"155/5236","text":"Federica Inderst"},{"@pid":"79/8331","text":"Gabriele Oliva"},{"@pid":"49/5719","text":"Stefano Panzieri"},{"@pid":"88/550","text":"Federica Pascucci"},{"@pid":"77/1555","text":"Roberto Setola"}]},"title":"Faulty or Malicious Anchor Detection Criteria for Distance-Based Localization.","venue":"CRITIS","pages":"229-240","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/critis/InderstOPPS17","doi":"10.1007/978-3-319-99843-5_21","ee":"https://doi.org/10.1007/978-3-319-99843-5_21","url":"https://dblp.org/rec/conf/critis/InderstOPPS17"}, "url":"URL#2899397" }, { "@score":"1", "@id":"2899398", "info":{"authors":{"author":[{"@pid":"181/5226","text":"Aljoscha Lautenbach"},{"@pid":"55/3115","text":"Magnus Almgren"},{"@pid":"03/1347","text":"Tomas Olovsson"}]},"title":"What the Stack? On Memory Exploitation and Protection in Resource Constrained Automotive Systems.","venue":"CRITIS","pages":"185-193","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/critis/LautenbachAO17","doi":"10.1007/978-3-319-99843-5_17","ee":"https://doi.org/10.1007/978-3-319-99843-5_17","url":"https://dblp.org/rec/conf/critis/LautenbachAO17"}, "url":"URL#2899398" }, { "@score":"1", "@id":"2899399", "info":{"authors":{"author":[{"@pid":"154/3991","text":"Laurens Lemaire"},{"@pid":"44/8853","text":"Jan Vossaert"},{"@pid":"59/4614","text":"Bart De Decker"},{"@pid":"51/866","text":"Vincent Naessens"}]},"title":"Security Evaluation of Cyber-Physical Systems Using Automatically Generated Attack Trees.","venue":"CRITIS","pages":"225-228","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/critis/LemaireVDN17","doi":"10.1007/978-3-319-99843-5_20","ee":"https://doi.org/10.1007/978-3-319-99843-5_20","url":"https://dblp.org/rec/conf/critis/LemaireVDN17"}, "url":"URL#2899399" }, { "@score":"1", "@id":"2899400", "info":{"authors":{"author":[{"@pid":"97/1333","text":"Chih-Yuan Lin"},{"@pid":"n/SiminNadjmTehrani","text":"Simin Nadjm-Tehrani"},{"@pid":"63/948","text":"Mikael Asplund"}]},"title":"Timing-Based Anomaly Detection in SCADA Networks.","venue":"CRITIS","pages":"48-59","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/critis/LinNA17","doi":"10.1007/978-3-319-99843-5_5","ee":"https://doi.org/10.1007/978-3-319-99843-5_5","url":"https://dblp.org/rec/conf/critis/LinNA17"}, "url":"URL#2899400" }, { "@score":"1", "@id":"2899401", "info":{"authors":{"author":[{"@pid":"175/7663","text":"Georgia Lykou"},{"@pid":"226/1471","text":"George Iakovakis"},{"@pid":"20/6908","text":"George Chronis"},{"@pid":"48/4664","text":"Dimitris Gritzalis"}]},"title":"Analysis and Classification of Adaptation Tools for Transport Sector Adaptation Planning.","venue":"CRITIS","pages":"37-47","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/critis/LykouICG17","doi":"10.1007/978-3-319-99843-5_4","ee":"https://doi.org/10.1007/978-3-319-99843-5_4","url":"https://dblp.org/rec/conf/critis/LykouICG17"}, "url":"URL#2899401" }, { "@score":"1", "@id":"2899402", "info":{"authors":{"author":[{"@pid":"31/1143","text":"Laura Petersen"},{"@pid":"207/1034","text":"Laure Fallou"},{"@pid":"226/1673","text":"Elisabete Carreira"},{"@pid":"226/1447","text":"Andrei Utkin"}]},"title":"Public Tolerance Levels of Transportation Resilience: A Focus on the Oresund Region Within the IMPROVER Project.","venue":"CRITIS","pages":"13-24","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/critis/PetersenFCU17","doi":"10.1007/978-3-319-99843-5_2","ee":"https://doi.org/10.1007/978-3-319-99843-5_2","url":"https://dblp.org/rec/conf/critis/PetersenFCU17"}, "url":"URL#2899402" }, { "@score":"1", "@id":"2899403", "info":{"authors":{"author":[{"@pid":"232/5373","text":"Michael J. Rausch"},{"@pid":"36/7892","text":"Ken Keefe"},{"@pid":"183/7992","text":"Brett Feddersen"},{"@pid":"s/WilliamHSanders","text":"William H. Sanders"}]},"title":"Automatically Generating Security Models from System Models to Aid in the Evaluation of AMI Deployment Options.","venue":"CRITIS","pages":"156-167","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/critis/RauschKFS17","doi":"10.1007/978-3-319-99843-5_14","ee":"https://doi.org/10.1007/978-3-319-99843-5_14","url":"https://dblp.org/rec/conf/critis/RauschKFS17"}, "url":"URL#2899403" }, { "@score":"1", "@id":"2899404", "info":{"authors":{"author":[{"@pid":"204/5226","text":"Juan E. Rubio"},{"@pid":"63/6414","text":"Rodrigo Roman"},{"@pid":"02/3236-1","text":"Javier López 0001"}]},"title":"Analysis of Cybersecurity Threats in Industry 4.0: The Case of Intrusion Detection.","venue":"CRITIS","pages":"119-130","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/critis/RubioRL17","doi":"10.1007/978-3-319-99843-5_11","ee":"https://doi.org/10.1007/978-3-319-99843-5_11","url":"https://dblp.org/rec/conf/critis/RubioRL17"}, "url":"URL#2899404" }, { "@score":"1", "@id":"2899405", "info":{"authors":{"author":[{"@pid":"168/9061","text":"Stefano Starita"},{"@pid":"168/0521","text":"Annunziata Esposito Amideo"},{"@pid":"65/5145","text":"Maria Paola Scaparra"}]},"title":"Assessing Urban Rail Transit Systems Vulnerability: Metrics vs. Interdiction Models.","venue":"CRITIS","pages":"144-155","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/critis/StaritaAS17","doi":"10.1007/978-3-319-99843-5_13","ee":"https://doi.org/10.1007/978-3-319-99843-5_13","url":"https://dblp.org/rec/conf/critis/StaritaAS17"}, "url":"URL#2899405" }, { "@score":"1", "@id":"2899406", "info":{"authors":{"author":[{"@pid":"95/6087","text":"Alberto Tofani"},{"@pid":"99/8331","text":"Gregorio D'Agostino"},{"@pid":"60/4447","text":"Antonio Di Pietro"},{"@pid":"226/1424","text":"Giacomo Onori"},{"@pid":"09/4660","text":"Maurizio Pollino"},{"@pid":"163/3950","text":"Silvio Alessandroni"},{"@pid":"93/4190","text":"Vittorio Rosato"}]},"title":"Operational Resilience Metrics for a Complex Electrical Network.","venue":"CRITIS","pages":"60-71","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/critis/TofaniDPOPAR17","doi":"10.1007/978-3-319-99843-5_6","ee":"https://doi.org/10.1007/978-3-319-99843-5_6","url":"https://dblp.org/rec/conf/critis/TofaniDPOPAR17"}, "url":"URL#2899406" }, { "@score":"1", "@id":"2899407", "info":{"authors":{"author":[{"@pid":"226/1469","text":"Dominique Wassermann"},{"@pid":"174/0776","text":"Andrea Antenucci"},{"@pid":"14/9086","text":"Giovanni Sansavini"}]},"title":"Managing Gas and Electric Power Network Dependencies to secure Energy Supply: Application to the UK System.","venue":"CRITIS","pages":"181-184","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/critis/WassermannAS17","doi":"10.1007/978-3-319-99843-5_16","ee":"https://doi.org/10.1007/978-3-319-99843-5_16","url":"https://dblp.org/rec/conf/critis/WassermannAS17"}, "url":"URL#2899407" }, { "@score":"1", "@id":"2899408", "info":{"authors":{"author":[{"@pid":"191/9491","text":"James G. Wright"},{"@pid":"w/StephenDWolthusen","text":"Stephen D. Wolthusen"}]},"title":"De-Synchronisation Attack Modelling in Real-Time Protocols Using Queue Networks: Attacking the ISO/IEC 61850 Substation Automation Protocol.","venue":"CRITIS","pages":"131-143","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/critis/WrightW17","doi":"10.1007/978-3-319-99843-5_12","ee":"https://doi.org/10.1007/978-3-319-99843-5_12","url":"https://dblp.org/rec/conf/critis/WrightW17"}, "url":"URL#2899408" }, { "@score":"1", "@id":"2899409", "info":{"authors":{"author":[{"@pid":"12/9871","text":"Jingquan Xie"},{"@pid":"195/4076","text":"Betim Sojeva"},{"@pid":"35/553","text":"Erich Rome"},{"@pid":"194/6911","text":"Daniel Lückerath"}]},"title":"Towards a Common Vocabulary for Crisis Management Scenarios.","venue":"CRITIS","pages":"25-36","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/critis/XieSRL17","doi":"10.1007/978-3-319-99843-5_3","ee":"https://doi.org/10.1007/978-3-319-99843-5_3","url":"https://dblp.org/rec/conf/critis/XieSRL17"}, "url":"URL#2899409" }, { "@score":"1", "@id":"2899410", "info":{"authors":{"author":[{"@pid":"226/1589","text":"Zejun Yang"},{"@pid":"44/3377","text":"José R. Martí"}]},"title":"Resilience of Electrical Distribution Systems with Critical Load Prioritization.","venue":"CRITIS","pages":"1-12","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/critis/YangM17","doi":"10.1007/978-3-319-99843-5_1","ee":"https://doi.org/10.1007/978-3-319-99843-5_1","url":"https://dblp.org/rec/conf/critis/YangM17"}, "url":"URL#2899410" } ] } } } )