


default search action
CRITIS 2016: Paris, France
- Grigore M. Havârneanu, Roberto Setola, Hypatia Nassopoulos, Stephen D. Wolthusen:

Critical Information Infrastructures Security - 11th International Conference, CRITIS 2016, Paris, France, October 10-12, 2016, Revised Selected Papers. Lecture Notes in Computer Science 10242, Springer 2017, ISBN 978-3-319-71367-0 - Ali Abbasi, Majid Hashemi, Emmanuele Zambon

, Sandro Etalle:
Stealth Low-Level Manipulation of Programmable Logic Controllers I/O by Pin Control Exploitation. 1-12 - Tomomi Aoyama, Kenji Watanabe, Ichiro Koshijima, Yoshihiro Hashimoto:

Developing a Cyber Incident Communication Management Exercise for CI Stakeholders. 13-24 - Joydeep Banerjee, Arunabha Sen, Chenyang Zhou:

On Auxiliary Entity Allocation Problem in Multi-layered Interdependent Critical Infrastructures. 25-37 - Pieter Burghouwt, Marinus Maris, Sjaak van Peski, Eric A. M. Luiijf

, Imelda van de Voorde, Marcel E. M. Spruit:
Cyber Targets Water Management. 38-49 - Sabarathinam Chockalingam

, Dina Hadziosmanovic, Wolter Pieters, André Teixeira
, Pieter H. A. J. M. van Gelder
:
Integrated Safety and Security Risk Assessment Methods: A Survey of Key Characteristics and Applications. 50-62 - Francesca De Cillis, Stefano De Muro, Franco Fiumara, Roberto Setola, Antonio Sforza, Claudio Sterle:

Railway Station Surveillance System Design: A Real Application of an Optimal Coverage Approach. 63-74 - Annunziata Esposito Amideo

, Maria Paola Scaparra:
A Synthesis of Optimization Approaches for Tackling Critical Information Infrastructure Survivability. 75-87 - Jonathan Goh, Sridhar Adepu, Khurum Nazir Junejo, Aditya Mathur:

A Dataset to Support Research in the Design of Secure Water Treatment Systems. 88-99 - Amélie Grangeat, Julie Sina, Vittorio Rosato

, Aurélia Bony, Marianthi Theocharidou
:
Human Vulnerability Mapping Facing Critical Service Disruptions for Crisis Managers. 100-110 - István Kiss, Béla Genge:

A Methodology for Monitoring and Control Network Design. 111-122 - Tingting Li

, Chris Hankin
:
Effective Defence Against Zero-Day Exploits Using Bayesian Networks. 123-136 - Anesu M. C. Marufu, Anne V. D. M. Kayem

, Stephen D. Wolthusen:
Power Auctioning in Resource Constrained Micro-grids: Cases of Cheating. 137-149 - Alain Mermoud

, Marcus Matthias Keupp, Solange Ghernaouti, Dimitri Percia David
:
Using Incentives to Foster Security Information Sharing and Cooperation: A General Theory and Application to Critical Infrastructure Protection. 150-162 - Steve Muller, Carlo Harpes, Yves Le Traon

, Sylvain Gombault, Jean-Marie Bonnin, Paul Hoffmann:
Dynamic Risk Analyses and Dependency-Aware Root Cause Model for Critical Infrastructures. 163-175 - Juan E. Rubio, Cristina Alcaraz

, Javier López:
Selecting Privacy Solutions to Prioritise Control in Smart Metering Systems. 176-188 - Giedre Sabaliauskaite

, Sridhar Adepu, Aditya Mathur:
A Six-Step Model for Safety and Security Analysis of Cyber-Physical Systems. 189-200 - Stefano Sebastio, Antonio Scala

, Gregorio D'Agostino:
Availability Study of the Italian Electricity SCADA System in the Cloud. 201-212 - William G. Temple, Yuan Li, Bao Anh N. Tran, Yan Liu, Binbin Chen

:
Railway System Failure Scenario Analysis. 213-225 - Khan Ferdous Wahid, Helmut Kaufmann, Kevin Jones:

Tamper Resistant Secure Digital Silo for Log Storage in Critical Infrastructures. 226-238 - James G. Wright, Stephen D. Wolthusen:

Access Control and Availability Vulnerabilities in the ISO/IEC 61850 Substation Automation Protocol. 239-251 - Ronald Joseph Wright, Ken Keefe, Brett Feddersen, William H. Sanders:

A Case Study Assessing the Effects of Cyber Attacks on a River Zonal Dispatcher. 252-264 - Heinrich Strauss, Anne V. D. M. Kayem

, Stephen D. Wolthusen:
Reliable Key Distribution in Smart Micro-Grids. 265-270 - Jeong-Han Yun, Yeop Chang, Kyoung-Ho Kim, Woonyon Kim:

Security Validation for Data Diode with Reverse Channel. 271-282 - Andreas Rieb, Ulrike Lechner:

Towards a Cybersecurity Game: Operation Digital Chameleon. 283-295 - Dimitri Percia David

, Marcus Matthias Keupp, Solange Ghernaouti, Alain Mermoud
:
Cyber Security Investment in the Context of Disruptive Technologies: Extension of the Gordon-Loeb Model and Application to Critical Infrastructure Protection. 296-301 - Simona A. Popusoi

, Cornelia Mairean, Grigore M. Havârneanu
:
Behavioral Intentions and Threat Perception During Terrorist, Fire and Earthquake Scenarios. 302-307 - Elisa Canzani, Helmut Kaufmann, Ulrike Lechner:

An Operator-Driven Approach for Modeling Interdependencies in Critical Infrastructures Based on Critical Services and Sectors. 308-320 - Maxime Puys

, Jean-Louis Roch, Marie-Laure Potet:
Domain Specific Stateful Filtering with Worst-Case Bandwidth. 321-327 - Mounia El Anbal, Anas Abou El Kalam

, Siham Benhadou, Fouad Moutaouakkil
, Hicham Medromi:
Securing SCADA Critical Network Against Internal and External Threats - Short Paper. 328-339 - Antonio Di Pietro

, Luigi La Porta, Luisa Lavalle, Maurizio Pollino
, Vittorio Rosato
, Alberto Tofani:
Simulation of Cascading Outages in (Inter)-Dependent Services and Estimate of Their Societal Consequences - Short Paper. 340-345

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














