default search action
CRITIS 2006: Samos, Greece
- Javier López:
Critical Information Infrastructures Security, First International Workshop, CRITIS 2006, Samos, Greece, August 31 - September 1, 2006, Revised Papers. Lecture Notes in Computer Science 4347, Springer 2006, ISBN 3-540-69083-2 - Paulo Veríssimo, Nuno Ferreira Neves, Miguel Correia:
CRUTIAL: The Blueprint of a Reference Critical Information Infrastructure Architecture. 1-14 - Per Mellstrand, Rune Gustavsson:
Experiment Based Validation of CIIP. 15-29 - Syed Naqvi, Philippe Massonet, Alvaro Arenas:
Security Requirements Model for Grid Data Management Systems. 30-41 - Fabrizio Baiardi, S. Suin, Claudio Telmon, M. Pioli:
Assessing the Risk of an Information Infrastructure Through Security Dependencies. 42-54 - Yudistira Asnar, Paolo Giorgini:
Modelling Risk and Identifying Countermeasure in Organizations. 55-66 - Roland Rieke:
Modelling and Analysing Network Security Policies in a Given Vulnerability Setting. 67-78 - Jose J. Gonzalez, Jose M. Sarriegi, Alazne Gurrutxaga:
A Framework for Conceptualizing Social Engineering Attacks. 79-90 - Sandro Bologna, Giovanni Di Costanzo, Eric A. M. Luiijf, Roberto Setola:
An Overview of R&D Activities in Europe on Critical Information Infrastructure Protection (CIIP). 91-102 - Karsten Bsufka, Olaf Kroll-Peters, Sahin Albayrak:
Intelligent Network-Based Early Warning Systems. 103-111 - Urs E. Gattiker:
Can an Early Warning System for Home Users and SMEs Make a Difference? A Field Study. 112-127 - Joaquín García-Alfaro, Sergio Castillo, Jordi Castellà-Roca, Guillermo Navarro, Joan Borrell:
Protection of Components Based on a Smart-Card Enhanced Security Module. 128-139 - Yvo Desmedt, Yongge Wang, Mike Burmester:
Revisiting Colored Networks and Privacy Preserving Censorship. 140-150 - Cristina Satizábal, Rafael Páez, Jordi Forné:
PROSEARCH: A Protocol to Simplify Path Discovery in Critical Scenarios. 151-165 - Cristina Alcaraz, Rodrigo Roman:
Applying Key Infrastructures for Sensor Networks in CIP/CIIP Scenarios. 166-178 - Efthimia Aivaloglou, Stefanos Gritzalis, Charalabos Skianis:
Trust Establishment in Ad Hoc and Sensor Networks. 179-194 - Shiqun Li, Shane Balfe, Jianying Zhou, Kefei Chen:
Enforcing Trust in Pervasive Computing with Trusted Computing Technology. 195-209 - María Bermúdez-Edo, Rolando Salazar-Hernández, Jesús Esteban Díaz Verdejo, Pedro Garcia-Teodoro:
Proposals on Assessment Environments for Anomaly-Based Network Intrusion Detection Systems. 210-221 - Salvatore D'Antonio, Francesco Oliviero, Roberto Setola:
High-Speed Intrusion Detection in Support of Critical Infrastructure Protection. 222-234 - Ahto Buldas, Peeter Laud, Jaan Priisalu, Märt Saarepera, Jan Willemson:
Rational Choice of Security Measures Via Multi-parameter Attack Trees. 235-248 - Daniel J. Martínez-Manzano, Gabriel López Millán, Antonio Fernandez Gómez-Skarmeta:
Multidomain Virtual Security Negotiation over the Session Initiation Protocol (SIP). 249-261 - Christos Xenakis, Lazaros F. Merakos:
Vulnerabilities and Possible Attacks Against the GPRS Backbone Network. 262-272 - Vassilios Stathopoulos, Panayiotis Kotzanikolaou, Emmanouil Magkos:
A Framework for Secure and Verifiable Logging in Public Communication Networks. 273-284
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.