![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
CRITIS 2011: Lucerne, Switzerland
- Sandro Bologna, Bernhard M. Hämmerli, Dimitris Gritzalis, Stephen D. Wolthusen:
Critical Information Infrastructure Security - 6th International Workshop, CRITIS 2011, Lucerne, Switzerland, September 8-9, 2011, Revised Selected Papers. Lecture Notes in Computer Science 6983, Springer 2013, ISBN 978-3-642-41475-6 - Eric A. M. Luiijf
, Kim Besseling, Maartje Spoelstra, Patrick De Graaf:
Ten National Cyber Security Strategies: A Comparison. 1-17 - Adedayo Oyelakin Adetoye, Michael Goldsmith, Sadie Creese:
Analysis of Dependencies in Critical Infrastructures. 18-29 - Thomas Schaberreiter, Filipe Caldeira
, Jocelyn Aubert
, Edmundo Monteiro
, Djamel Khadraoui, Paulo Simões
:
Assurance and Trust Indicators to Evaluate Accuracy of On-line Risk in Critical Infrastructures. 30-41 - Rüdiger Klein:
An Innovative Approach to Emergency Management in Large Infrastructures. 42-57 - Armin Veichtlbauer, Thomas Pfeiffenberger:
Dynamic Evacuation Guidance as Safety Critical Application in Building Automation. 58-69 - Thomas Richard McEvoy
, Stephen D. Wolthusen:
Defeating Node Based Attacks on SCADA Systems Using Probabilistic Packet Observation. 70-80 - Andrea Arbore, Vincenzo Fioriti:
Sub-optimal Topological Protection Strategy from Advanced Malware. 81-92 - Miltiadis Kandias, Nikos Virvilis, Dimitris Gritzalis:
The Insider Threat in Cloud Computing. 93-103 - Panayiotis Kotzanikolaou
, Marianthi Theoharidou
, Dimitris Gritzalis:
Interdependencies between Critical Infrastructures: Analyzing the Risk of Cascading Effects. 104-115 - Alfonso Farina, Antonio Graziano, Stefano Panzieri
, Federica Pascucci
, Roberto Setola
:
How to Perform Verification and Validation of Critical Infrastructure Modeling Tools. 116-127 - Francesco Flammini
, Stefano Marrone
, Nicola Mazzocca
, Valeria Vittorini:
Petri Net Modelling of Physical Vulnerability. 128-139 - Béla Genge, Christos Siaterlis:
Investigating the Effect of Network Parameters on Coordinated Cyber Attacks against a Simulated Power Plant. 140-151 - Igor Nai Fovino, Salvatore Di Blasi, Andrea Rigoni:
The Role of the DNS in the Secure and Resilient Operation of CIs, the Energy System Example. 152-163 - Tony Proctor:
The Development of Warning, Advice and Reporting Points (WARPs) in UK National Infrastructure. 164-174 - David Sutton, John Harrison, Sandro Bologna, Vittorio Rosato
:
The Contribution of NEISAS to EP3R. 175-186 - Leire Labaka
, Josune Hernantes
, Ana Laugé, Jose Mari Sarriegi:
Policies to Improve Resilience against Major Industrial Accidents. 187-199 - Gabriele Oliva
, Roberto Setola
, Stefano Panzieri
:
Fuzzy Input-Output Inoperability Model - (Short Paper). 200-204 - Emiliano Casalicchio:
Dependencies Discovery and Analysis in Distributed Systems - (Short Paper). 205-208 - Stefano Avallone
, Claudio Mazzariello, Francesco Oliviero, Simon Pietro Romano
:
Protecting Critical Infrastructures from Stealth Attacks: A Closed-Loop Approach Involving Detection and Remediation - (Short Paper). 209-212 - Thomas Schaberreiter, Kati Kittilä, Kimmo Halunen, Juha Röning
, Djamel Khadraoui:
Risk Assessment in Critical Infrastructure Security Modelling Based on Dependency Analysis - (Short Paper). 213-217 - Giusj Digioia, Chiara Foglietta
, Gabriele Oliva
, Stefano Panzieri
:
Countermeasures Selection via Evidence Theory - (Short Paper). 218-222 - Antonio Scala
, Gregorio D'Agostino:
The Robustness of Assortativity - (Short Paper). 223-226
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.