


default search action
CRITIS 2010: Athens, Greece
- Christos Xenakis
, Stephen D. Wolthusen:
Critical Information Infrastructures Security - 5th International Workshop, CRITIS 2010, Athens, Greece, September 23-24, 2010. Revised Papers. Lecture Notes in Computer Science 6712, Springer 2011, ISBN 978-3-642-21693-0 - Emiliano Casalicchio, Sandro Bologna, Luigi Brasca, Stefano Buschi, Emanuele Ciapessoni
, Gregorio D'Agostino, Vincenzo Fioriti, Federico Morabito:
Inter-dependency Assessment in the ICT-PS Network: The MIA Project Results. 1-12 - Nikos Vavoulas, Christos Xenakis
:
A Quantitative Risk Analysis Approach for Deliberate Threats. 13-25 - Rüdiger Klein:
The EU FP6 Integrated Project IRRIIS on Dependent Critical Infrastructures - Summary and Conclusions. 26-42 - Finn Olav Sveen, Josune Hernantes
, Jose J. Gonzalez, Eliot H. Rich:
Towards Understanding Recurring Large Scale Power Outages: An Endogenous View of Inter-organizational Effects. 43-54 - Cristina Alcaraz
, Angel Balastegui, Javier López
:
Early Warning System for Cascading Effect Control in Energy Control Systems. 55-66 - Anu Vaidyanathan:
Emergency Response with Proactive Crowd-Sourcing Reverse-111. 67-80 - Martin Brunner, Hans Hofinger, Christopher Roblee, Peter Schoo, Sascha Todt:
Anonymity and Privacy in Distributed Early Warning Systems. 81-92 - Thomas Richard McEvoy
, Stephen D. Wolthusen:
A Formal Adversary Capability Model for SCADA Environments. 93-103 - Nikos Virvilis, Stelios Dritsas, Dimitris Gritzalis:
A Cloud Provider-Agnostic Secure Storage Protocol. 104-115 - Igor Nai Fovino, Andrea Carcano, Alessio Coletta
, Michele Guglielmi, Marcelo Masera, Alberto Trombetta
:
State-Based Firewall for Industrial Protocols with Critical-State Prediction Monitor. 116-127 - Yannis Soupionis, Stylianos Basagiannis
, Panagiotis Katsaros
, Dimitris Gritzalis:
A Formally Verified Mechanism for Countering SPIT. 128-139 - Filipe Caldeira
, Edmundo Monteiro
, Paulo Simões
:
Trust and Reputation for Information Exchange in Critical Infrastructures. 140-152 - Adedayo Adetoye, Sadie Creese, Michael Goldsmith, Paul Hopkins:
A Modelling Approach for Interdependency in Digital Systems-of-Systems Security - Extended Abstract. 153-156 - Matthieu Aubigny, Carlo Harpes, Marco Castrucci:
Risk Ontology and Service Quality Descriptor Shared among Interdependent Critical Infrastructures. 157-160

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.