


default search action
CRITIS 2009: Bonn, Germany
- Erich Rome, Robin E. Bloomfield:

Critical Information Infrastructures Security, 4th International Workshop, CRITIS 2009, Bonn, Germany, September 30 - October 2, 2009. Revised Papers. Lecture Notes in Computer Science 6027, Springer 2010, ISBN 978-3-642-14378-6 - Gregorio D'Agostino, Roberto Cannata, Vittorio Rosato

:
On Modelling of Inter-dependent Network Infrastructures by Extended Leontief Models. 1-13 - João H. A. Franco, Sérgio Luis Ribeiro, Sandra M. C. Tome, Christiane M. S. Cuculo, Marcos B. Trindade, Leonardo M. Lage, Regina M. F. Souza:

Critical Infrastructure Protection in Brazil - Threat Identification and Analysis. 14-21 - Hideaki Kobayashi, Kenji Watanabe, Takahito Watanabe, Yukinobu Nagayasu:

Development of Information Security-Focused Incident Prevention Measures for Critical Information Infrastructure in Japan. 22-33 - Gökçe Görbil, Erol Gelenbe:

Design of a Mobile Agent-Based Adaptive Communication Middleware for Federations of Critical Infrastructure Simulations. 34-49 - Alpha Amadou Diallo, Claude Chaudet

:
An Alternate Topology Generator for Joint Study of Power Grids and Communication Networks. 50-61 - Thomas Richard McEvoy

, Stephen D. Wolthusen:
Trouble Brewing: Using Observations of Invariant Behavior to Detect Malicious Agency in Distributed Control Systems. 62-72 - Marcus Breiing, Mara Cole, John D'Avanzo, Gebhard Geiger, Sascha Goldner, Andreas Kuhlmann, Claudia Lorenz, Alf Papproth, Erhard Petzel, Oliver Schwetje:

Optimisation of Critical Infrastructure Protection: The SiVe Project on Airport Security. 73-84 - Patrick Düssel, Christian Gehl, Pavel Laskov, Jens-Uwe Bußer, Christof Störmann, Jan Kästner:

Cyber-Critical Infrastructure Protection Using Real-Time Payload-Based Anomaly Detection. 85-97 - Michal Choras, Adam Flizikowski

, Rafal Kozik
, Witold Holubowicz
:
Decision Aid Tool and Ontology-Based Reasoning for Critical Infrastructure Vulnerabilities and Threats Analysis. 98-110 - Aguinaldo B. Batista, Tiago H. Kobayashi, João Paulo S. Medeiros, Agostinho M. Brito Jr., Paulo S. Motta Pires:

Application Filters for TCP/IP Industrial Automation Protocols. 111-123 - Thomas Dübendorfer, Stefan Frei:

Web Browser Security Update Effectiveness. 124-137 - Andrea Carcano, Igor Nai Fovino, Marcelo Masera, Alberto Trombetta

:
State-Based Network Intrusion Detection Systems for SCADA Protocols: A Proof of Concept. 138-150 - Martin Apel, Joachim Biskup, Ulrich Flegel, Michael Meier

:
Towards Early Warning Systems - Challenges, Technologies and Architecture. 151-164 - Mboneli Ndlangisa, Deon Herbst:

CII Protection - Lessons for Developing Countries: South Africa as a Case Study. 165-175 - Stephen E. McLaughlin, Dmitry Podkuiko, Patrick D. McDaniel:

Energy Theft in the Advanced Metering Infrastructure. 176-187 - Robin E. Bloomfield, Nick Chozos, Kizito Salako

:
Current Capabilities, Requirements and a Proposed Strategy for Interdependency Analysis in the UK. 188-200 - Robin E. Bloomfield, Lubos Buzna, Peter T. Popov

, Kizito Salako
, David Wright:
Stochastic Modelling of the Effects of Interdependencies between Critical Infrastructure. 201-212

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














