default search action
CRITIS 2013: Amsterdam, The Netherlands
- Eric A. M. Luiijf, Pieter H. Hartel:
Critical Information Infrastructures Security - 8th International Workshop, CRITIS 2013, Amsterdam, The Netherlands, September 16-18, 2013, Revised Selected Papers. Lecture Notes in Computer Science 8328, Springer 2013, ISBN 978-3-319-03963-3
New Challenges
- Tjerk Bijlsma, Sander de Kievit, Jacco van de Sluis, Ellen van Nunen, Igor Passchier, Eric A. M. Luiijf:
Security Challenges for Cooperative and Interconnected Mobility Systems. 1-15 - Yasutake Sayanagi:
Study of In-Data Centre Backup Offices for Banks. 16-25 - Arne Ansper, Ahto Buldas, Margus Freudenthal, Jan Willemson:
Protecting a Federated Database Infrastructure against Denial-of-Service Attacks. 26-37 - Konstantinos Manousakis, Georgios Ellinas:
Minimizing the Impact of In-band Jamming Attacks in WDM Optical Networks. 38-49
Natural Disasters
- Ana Laugé, Josune Hernantes, Jose Mari Sarriegi:
The Role of Critical Infrastructures' Interdependencies on the Impacts Caused by Natural Disasters. 50-61 - Francesco Gaetano, Gabriele Oliva, Stefano Panzieri, Claudio Romani, Roberto Setola:
Analysis of Severe Space Weather on Critical Infrastructures. 62-73
Smart Grids
- Yiannis Tofis, Yiasoumis Yiasemi, Elias Kyriakides:
A Plug and Play, Approximation-Based, Selective Load Shedding Mechanism for the Future Electrical Grid. 74-83 - Rani Yesudas, Roger Clarke:
A Framework for Risk Analysis in Smart Grid - Perspective Based Approach. 84-95 - Thomas P. Roth, Bruce M. McMillin:
Physical Attestation of Cyber Processes in the Smart Grid. 96-107
Threats and Risk
- Fabrizio Baiardi, Federico Tonelli, Fabio Corò, Luca Guidi:
QSec: Supporting Security Decisions on an IT Infrastructure. 108-119 - Cristina Alcaraz, Estefanía Etchevés Miciolino, Stephen D. Wolthusen:
Structural Controllability of Networks for Non-interactive Adversarial Vertex Removal. 120-132 - Dimitris Kostopoulos, Vasilis Tsoulkas, George Leventakis, Prokopios Drogkaris, Vasiliki Politopoulou:
Real Time Threat Prediction, Identification and Mitigation for Critical Infrastructure Protection Using Semantics, Event Processing and Sequential Analysis. 133-141 - Zhendong Ma, Paul Smith:
Determining Risks from Advanced Multi-step Attacks to Critical Information Infrastructures. 142-154
SCADA/ICS and Sensors
- Marco Caselli, Dina Hadziosmanovic, Emmanuele Zambon, Frank Kargl:
On the Feasibility of Device Fingerprinting in Industrial Control Systems. 155-166 - Bogdan Groza, Marius Minea:
Bridging Dolev-Yao Adversaries and Control Systems with Time-Sensitive Channels. 167-178 - Demetrios G. Eliades, Michalis P. Michaelides, Marinos Christodoulou, Marios S. Kyriakou, Christos G. Panayiotou, Marios M. Polycarpou:
An Indoor Contaminant Sensor Placement Toolbox for Critical Infrastructure Buildings. 179-190
Short Papers
- Antonio Sforza, Claudio Sterle, Pasquale D'Amore, Annarita Tedesco, Francesca De Cillis, Roberto Setola:
Optimization Models in a Smart Tool for the Railway Infrastructure Protection. 191-196 - Lorena Cazorla, Cristina Alcaraz, Javier López:
Towards Automatic Critical Infrastructure Protection through Machine Learning. 197-203 - Sander Oudkerk, Konrad S. Wrona:
Using NATO Labelling to Support Controlled Information Sharing between Partners. 204-211 - Gianmarco Baldini, Ioannis Kounelis, Igor Nai Fovino, Ricardo Neisse:
A Framework for Privacy Protection and Usage Control of Personal Data in a Smart City Scenario. 212-217
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.