default search action
CRITIS 2009: Bonn, Germany
- Erich Rome, Robin E. Bloomfield:
Critical Information Infrastructures Security, 4th International Workshop, CRITIS 2009, Bonn, Germany, September 30 - October 2, 2009. Revised Papers. Lecture Notes in Computer Science 6027, Springer 2010, ISBN 978-3-642-14378-6 - Gregorio D'Agostino, Roberto Cannata, Vittorio Rosato:
On Modelling of Inter-dependent Network Infrastructures by Extended Leontief Models. 1-13 - João H. A. Franco, Sérgio Luis Ribeiro, Sandra M. C. Tome, Christiane M. S. Cuculo, Marcos B. Trindade, Leonardo M. Lage, Regina M. F. Souza:
Critical Infrastructure Protection in Brazil - Threat Identification and Analysis. 14-21 - Hideaki Kobayashi, Kenji Watanabe, Takahito Watanabe, Yukinobu Nagayasu:
Development of Information Security-Focused Incident Prevention Measures for Critical Information Infrastructure in Japan. 22-33 - Gökçe Görbil, Erol Gelenbe:
Design of a Mobile Agent-Based Adaptive Communication Middleware for Federations of Critical Infrastructure Simulations. 34-49 - Alpha Amadou Diallo, Claude Chaudet:
An Alternate Topology Generator for Joint Study of Power Grids and Communication Networks. 50-61 - Thomas Richard McEvoy, Stephen D. Wolthusen:
Trouble Brewing: Using Observations of Invariant Behavior to Detect Malicious Agency in Distributed Control Systems. 62-72 - Marcus Breiing, Mara Cole, John D'Avanzo, Gebhard Geiger, Sascha Goldner, Andreas Kuhlmann, Claudia Lorenz, Alf Papproth, Erhard Petzel, Oliver Schwetje:
Optimisation of Critical Infrastructure Protection: The SiVe Project on Airport Security. 73-84 - Patrick Düssel, Christian Gehl, Pavel Laskov, Jens-Uwe Bußer, Christof Störmann, Jan Kästner:
Cyber-Critical Infrastructure Protection Using Real-Time Payload-Based Anomaly Detection. 85-97 - Michal Choras, Adam Flizikowski, Rafal Kozik, Witold Holubowicz:
Decision Aid Tool and Ontology-Based Reasoning for Critical Infrastructure Vulnerabilities and Threats Analysis. 98-110 - Aguinaldo B. Batista, Tiago H. Kobayashi, João Paulo S. Medeiros, Agostinho M. Brito Jr., Paulo S. Motta Pires:
Application Filters for TCP/IP Industrial Automation Protocols. 111-123 - Thomas Dübendorfer, Stefan Frei:
Web Browser Security Update Effectiveness. 124-137 - Andrea Carcano, Igor Nai Fovino, Marcelo Masera, Alberto Trombetta:
State-Based Network Intrusion Detection Systems for SCADA Protocols: A Proof of Concept. 138-150 - Martin Apel, Joachim Biskup, Ulrich Flegel, Michael Meier:
Towards Early Warning Systems - Challenges, Technologies and Architecture. 151-164 - Mboneli Ndlangisa, Deon Herbst:
CII Protection - Lessons for Developing Countries: South Africa as a Case Study. 165-175 - Stephen E. McLaughlin, Dmitry Podkuiko, Patrick D. McDaniel:
Energy Theft in the Advanced Metering Infrastructure. 176-187 - Robin E. Bloomfield, Nick Chozos, Kizito Salako:
Current Capabilities, Requirements and a Proposed Strategy for Interdependency Analysis in the UK. 188-200 - Robin E. Bloomfield, Lubos Buzna, Peter T. Popov, Kizito Salako, David Wright:
Stochastic Modelling of the Effects of Interdependencies between Critical Infrastructure. 201-212
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.