


default search action
CRITIS 2007: Málaga, Spain
- Javier López, Bernhard M. Hämmerli:

Critical Information Infrastructures Security, Second International Workshop, CRITIS 2007, Málaga, Spain, October 3-5, 2007. Revised Papers. Lecture Notes in Computer Science 5141, Springer 2008, ISBN 978-3-540-89095-9
R&D Agenda
- Uwe Bendisch, Sandro Bologna, Gwendal Le Grand, Eric A. M. Luiijf

:
Towards a European Research Agenda for CIIP: Results from the CI2RCO Project. 1-12 - Alberto Stefanini, Gerard Doorman

, Nouredine Hadjsaid:
ICT Vulnerabilities of the Power Grid: Towards a Road Map for Future Research. 13-24
Communication Risk and Assurance I
- Nils Kalstad Svendsen, Stephen D. Wolthusen:

An Analysis of Cyclical Interdependencies in Critical Infrastructures. 25-36 - Nils Kalstad Svendsen, Stephen D. Wolthusen:

A Framework for 3D Geospatial Buffering of Events of Interest in Critical Infrastructures. 37-48 - Kenji Watanabe, Takashi Moriyasu:

Designing Information System Risk Management Framework Based on the Past Major Failures in the Japanese Financial Industry. 49-57 - Wael Kanoun, Nora Cuppens-Boulahia, Frédéric Cuppens, Fabien Autrel:

Advanced Reaction Using Risk Assessment in Intrusion Detection Systems. 58-70
Communication Risk and Assurance II
- Fabrizio Baiardi

, Gaspare Sala, Daniele Sgandurra:
Managing Critical Infrastructures through Virtual Network Communities. 71-82 - Yuko Murayama, Natsuko Hikage, Yasuhiro Fujihara, Carl Hauser:

The Structure of the Sense of Security, Anshin. 83-93 - Rafael Páez

, Joan Tomàs-Buliart, Jordi Forné
, Miguel Soriano
:
Securing Agents against Malicious Host in an Intrusion Detection System. 94-105
Code of Practice and Metrics
- Davide Cerotti

, Daniele Codetta Raiteri
, Susanna Donatelli, Claudio Brasca, Giovanna Dondossola
, Fabrizio Garrone
:
UML Diagrams Supporting Domain Specification Inside the CRUTIAL Project. 106-123 - Hermann Dellwing, Walter Schmitz:

Expert System CRIPS: Support of Situation Assessment and Decision Making. 124-134 - Gyrd Brændeland, Heidi E. I. Dahl

, Iselin Engan, Ketil Stølen:
Using Dependent CORAS Diagrams to Analyse Mutual Dependency. 135-148 - Roberto Setola

, Stefano De Porcellinis:
A Methodology to Estimate Input-Output Inoperability Model Parameters. 149-160
Information Sharing and Exchange
- Dong Chan An, Seog Park:

Efficient Access Control for Secure XML Query Processing in Data Streams. 161-172 - Ioanna Dionysiou

, Deborah A. Frincke, David E. Bakken, Carl Hauser:
An Approach to Trust Management Challenges for Critical Infrastructures. 173-184
Continuity of Services and Resiliency
- Georgios Kambourakis

, Tassos Moschos, Dimitris Geneiatakis, Stefanos Gritzalis
:
Detecting DNS Amplification Attacks. 185-196 - Gabriel Maciá-Fernández

, Jesús Esteban Díaz Verdejo, Pedro Garcia-Teodoro, Francisco de Toro-Negro:
LoRDAS: A Low-Rate DoS Attack against Application Servers. 197-209 - Simon Delamare, Gwendal Le Grand:

Intra Autonomous System Overlay Dedicated to Communication Resilience. 210-222 - Daniel J. Martínez-Manzano, Manuel Gil Pérez

, Gabriel López Millán, Antonio Fernandez Gómez-Skarmeta:
A Proposal for the Definition of Operational Plans to Provide Dependability and Security. 223-234
SCADA and Embedded Security
- João Paulo S. Medeiros, Allison C. Cunha, Agostinho M. Brito Jr., Paulo S. Motta Pires:

Application of Kohonen Maps to Improve Security Tests on Automation Devices. 235-245 - Wayne F. Boyer, Miles A. McQueen:

Ideal Based Cyber Security Technical Metrics for Control Systems. 246-260 - Kegan Kawano:

Designing Critical Infrastructure Cyber Security Segmentation Architecture by Balancing Security with Reliability and Availability. 261-273
Threats and Attacks Modeling
- Ulf Larson, Dennis K. Nilsson, Erland Jonsson:

A General Model and Guidelines for Attack Manifestation Generation. 274-286 - Joaquín García-Alfaro

, Guillermo Navarro-Arribas
:
A Survey on Detection Techniques to Prevent Cross-Site Scripting Attacks on Current Web Applications. 287-298 - John Mallios, Stelios Dritsas, Bill Tsoumas, Dimitris Gritzalis:

Attack Modeling of SIP-Oriented SPIT. 299-310 - Stephan Schmidt, Tansu Alpcan

, Sahin Albayrak
, Tamer Basar, Achim Müller:
A Malware Detector Placement Game for Intrusion Detection. 311-326
Information Exchange and Modelling
- Jose M. Sarriegi, Javier Santos

, José Manuel Torres, David Imizcoz, Elyoenai Egozcue, Daniel Liberal:
Modeling and Simulating Information Security Management. 327-336 - Carlo Ferigato, Marcelo Masera:

Design of a Platform for Information Exchange on Protection of Critical Infrastructures. 337-348 - Felix Flentge, Césaire Beyel, Erich Rome:

Towards a Standardised Cross-Sector Information Exchange on Present Risk Factors. 349-360

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














