Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/critis/critis2008.bht:"
@proceedings{DBLP:conf/critis/2008, editor = {Roberto Setola and Stefan Geretshuber}, title = {Critical Information Infrastructure Security, Third International Workshop, {CRITIS} 2008, Rome, Italy, October 13-15, 2008. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {5508}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03552-4}, doi = {10.1007/978-3-642-03552-4}, isbn = {978-3-642-03551-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/critis/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/critis/AsplundNS08, author = {Mikael Asplund and Simin Nadjm{-}Tehrani and Johan Sigholm}, editor = {Roberto Setola and Stefan Geretshuber}, title = {Emerging Information Infrastructures: Cooperation in Disasters}, booktitle = {Critical Information Infrastructure Security, Third International Workshop, {CRITIS} 2008, Rome, Italy, October 13-15, 2008. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {5508}, pages = {258--270}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-03552-4\_23}, doi = {10.1007/978-3-642-03552-4\_23}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/critis/AsplundNS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/critis/AssognaBDMPSVZ08, author = {Pierluigi Assogna and Glauco Bertocchi and Antonio DiCarlo and Franco Milicchio and Alberto Paoluzzi and Giorgio Scorzelli and Michele Vicentino and Roberto Zollo}, editor = {Roberto Setola and Stefan Geretshuber}, title = {Critical Infrastructures as Complex Systems: {A} Multi-level Protection Architecture}, booktitle = {Critical Information Infrastructure Security, Third International Workshop, {CRITIS} 2008, Rome, Italy, October 13-15, 2008. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {5508}, pages = {368--375}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-03552-4\_36}, doi = {10.1007/978-3-642-03552-4\_36}, timestamp = {Mon, 06 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/critis/AssognaBDMPSVZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/critis/BaldiniF08, author = {Gianmarco Baldini and Igor Nai Fovino}, editor = {Roberto Setola and Stefan Geretshuber}, title = {Service Modeling Language Applied to Critical Infrastructure}, booktitle = {Critical Information Infrastructure Security, Third International Workshop, {CRITIS} 2008, Rome, Italy, October 13-15, 2008. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {5508}, pages = {271--278}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-03552-4\_24}, doi = {10.1007/978-3-642-03552-4\_24}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/critis/BaldiniF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/critis/BeccutiFKK08, author = {Marco Beccuti and Giuliana Franceschinis and Mohamed Ka{\^{a}}niche and Karama Kanoun}, editor = {Roberto Setola and Stefan Geretshuber}, title = {Multi-level Dependability Modeling of Interdependencies between the Electricity and Information Infrastructures}, booktitle = {Critical Information Infrastructure Security, Third International Workshop, {CRITIS} 2008, Rome, Italy, October 13-15, 2008. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {5508}, pages = {48--59}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-03552-4\_5}, doi = {10.1007/978-3-642-03552-4\_5}, timestamp = {Fri, 02 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/critis/BeccutiFKK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/critis/BlackwellTLXM08, author = {Joshua Blackwell and William J. Tolone and Seok{-}Won Lee and Wei{-}Ning Xiang and Lydia Marsh}, editor = {Roberto Setola and Stefan Geretshuber}, title = {An Ontology-Based Approach to Blind Spot Revelation in Critical Infrastructure Protection Planning}, booktitle = {Critical Information Infrastructure Security, Third International Workshop, {CRITIS} 2008, Rome, Italy, October 13-15, 2008. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {5508}, pages = {352--359}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-03552-4\_34}, doi = {10.1007/978-3-642-03552-4\_34}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/critis/BlackwellTLXM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/critis/BompardMNX08, author = {Ettore Bompard and Marcelo Masera and Roberto Napoli and Fei Xue}, editor = {Roberto Setola and Stefan Geretshuber}, title = {Assessment of Structural Vulnerability for Power Grids by Network Performance Based on Complex Networks}, booktitle = {Critical Information Infrastructure Security, Third International Workshop, {CRITIS} 2008, Rome, Italy, October 13-15, 2008. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {5508}, pages = {144--154}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-03552-4\_13}, doi = {10.1007/978-3-642-03552-4\_13}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/critis/BompardMNX08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/critis/CadiniZP08, author = {Francesco Cadini and Enrico Zio and Cristina{-}Andreea Petrescu}, editor = {Roberto Setola and Stefan Geretshuber}, title = {Using Centrality Measures to Rank the Importance of the Components of a Complex Network Infrastructure}, booktitle = {Critical Information Infrastructure Security, Third International Workshop, {CRITIS} 2008, Rome, Italy, October 13-15, 2008. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {5508}, pages = {155--167}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-03552-4\_14}, doi = {10.1007/978-3-642-03552-4\_14}, timestamp = {Fri, 02 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/critis/CadiniZP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/critis/CarcanoFMT08, author = {Andrea Carcano and Igor Nai Fovino and Marcelo Masera and Alberto Trombetta}, editor = {Roberto Setola and Stefan Geretshuber}, title = {Scada Malware, a Proof of Concept}, booktitle = {Critical Information Infrastructure Security, Third International Workshop, {CRITIS} 2008, Rome, Italy, October 13-15, 2008. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {5508}, pages = {211--222}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-03552-4\_19}, doi = {10.1007/978-3-642-03552-4\_19}, timestamp = {Fri, 02 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/critis/CarcanoFMT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/critis/CasalicchioGT08, author = {Emiliano Casalicchio and Emanuele Galli and Salvatore Tucci}, editor = {Roberto Setola and Stefan Geretshuber}, title = {Modeling and Simulation of Complex Interdependent Systems: {A} Federated Agent-Based Approach}, booktitle = {Critical Information Infrastructure Security, Third International Workshop, {CRITIS} 2008, Rome, Italy, October 13-15, 2008. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {5508}, pages = {72--83}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-03552-4\_7}, doi = {10.1007/978-3-642-03552-4\_7}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/critis/CasalicchioGT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/critis/CerottiGB08, author = {Davide Cerotti and Marco Gribaudo and Andrea Bobbio}, editor = {Roberto Setola and Stefan Geretshuber}, title = {Disaster Propagation in Heterogeneous Media via Markovian Agents}, booktitle = {Critical Information Infrastructure Security, Third International Workshop, {CRITIS} 2008, Rome, Italy, October 13-15, 2008. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {5508}, pages = {328--335}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-03552-4\_31}, doi = {10.1007/978-3-642-03552-4\_31}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/critis/CerottiGB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/critis/ChiaradonnaGL08, author = {Silvano Chiaradonna and Felicita Di Giandomenico and Paolo Lollini}, editor = {Roberto Setola and Stefan Geretshuber}, title = {Interdependency Analysis in Electric Power Systems}, booktitle = {Critical Information Infrastructure Security, Third International Workshop, {CRITIS} 2008, Rome, Italy, October 13-15, 2008. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {5508}, pages = {60--71}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-03552-4\_6}, doi = {10.1007/978-3-642-03552-4\_6}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/critis/ChiaradonnaGL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/critis/DAntonioRKS08, author = {Salvatore D'Antonio and Luigi Romano and Abdelmajid Khelil and Neeraj Suri}, editor = {Roberto Setola and Stefan Geretshuber}, title = {INcreasing Security and Protection through Infrastructure REsilience: The {INSPIRE} Project}, booktitle = {Critical Information Infrastructure Security, Third International Workshop, {CRITIS} 2008, Rome, Italy, October 13-15, 2008. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {5508}, pages = {109--118}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-03552-4\_10}, doi = {10.1007/978-3-642-03552-4\_10}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/critis/DAntonioRKS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/critis/DionisiMRZ08, author = {Carla Dionisi and Francesca Mariani and Maria Cristina Recchioni and Francesco Zirilli}, editor = {Roberto Setola and Stefan Geretshuber}, title = {Blackouts in Power Transmission Networks Due to Spatially Localized Load Anomalies}, booktitle = {Critical Information Infrastructure Security, Third International Workshop, {CRITIS} 2008, Rome, Italy, October 13-15, 2008. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {5508}, pages = {1--13}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-03552-4\_1}, doi = {10.1007/978-3-642-03552-4\_1}, timestamp = {Fri, 02 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/critis/DionisiMRZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/critis/Donatelli08, author = {Susanna Donatelli}, editor = {Roberto Setola and Stefan Geretshuber}, title = {Dependent Automata for the Modelling of Dependencies}, booktitle = {Critical Information Infrastructure Security, Third International Workshop, {CRITIS} 2008, Rome, Italy, October 13-15, 2008. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {5508}, pages = {311--318}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-03552-4\_29}, doi = {10.1007/978-3-642-03552-4\_29}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/critis/Donatelli08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/critis/DondossolaDGB08, author = {Giovanna Dondossola and Geert Deconinck and Fabrizio Garrone and Hakem Beitollahi}, editor = {Roberto Setola and Stefan Geretshuber}, title = {Testbeds for Assessing Critical Scenarios in Power Control Systems}, booktitle = {Critical Information Infrastructure Security, Third International Workshop, {CRITIS} 2008, Rome, Italy, October 13-15, 2008. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {5508}, pages = {223--234}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-03552-4\_20}, doi = {10.1007/978-3-642-03552-4\_20}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/critis/DondossolaDGB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/critis/EliadesP08, author = {Demetrios G. Eliades and Marios M. Polycarpou}, editor = {Roberto Setola and Stefan Geretshuber}, title = {Security of Water Infrastructure Systems}, booktitle = {Critical Information Infrastructure Security, Third International Workshop, {CRITIS} 2008, Rome, Italy, October 13-15, 2008. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {5508}, pages = {360--367}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-03552-4\_35}, doi = {10.1007/978-3-642-03552-4\_35}, timestamp = {Fri, 02 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/critis/EliadesP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/critis/FickertMW08, author = {Lothar Fickert and Helmut Malleck and Christian Wakolbinger}, editor = {Roberto Setola and Stefan Geretshuber}, title = {Challenges Concerning the Energy-Dependency of the Telecom Infrastructure}, booktitle = {Critical Information Infrastructure Security, Third International Workshop, {CRITIS} 2008, Rome, Italy, October 13-15, 2008. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {5508}, pages = {376--385}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-03552-4\_37}, doi = {10.1007/978-3-642-03552-4\_37}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/critis/FickertMW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/critis/FioritiRCMR08, author = {Vincenzo Fioriti and Silvia Ruzzante and Elisa Castorini and Elena Marchei and Vittorio Rosato}, editor = {Roberto Setola and Stefan Geretshuber}, title = {Stability of a Distributed Generation Network Using the Kuramoto Models}, booktitle = {Critical Information Infrastructure Security, Third International Workshop, {CRITIS} 2008, Rome, Italy, October 13-15, 2008. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {5508}, pages = {14--23}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-03552-4\_2}, doi = {10.1007/978-3-642-03552-4\_2}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/critis/FioritiRCMR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/critis/FlamminiGMP08, author = {Francesco Flammini and Andrea Gaglione and Nicola Mazzocca and Concetta Pragliola}, editor = {Roberto Setola and Stefan Geretshuber}, title = {Quantitative Security Risk Assessment and Management for Railway Transportation Infrastructures}, booktitle = {Critical Information Infrastructure Security, Third International Workshop, {CRITIS} 2008, Rome, Italy, October 13-15, 2008. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {5508}, pages = {180--189}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-03552-4\_16}, doi = {10.1007/978-3-642-03552-4\_16}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/critis/FlamminiGMP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/critis/FlamminiVMP08, author = {Francesco Flammini and Valeria Vittorini and Nicola Mazzocca and Concetta Pragliola}, editor = {Roberto Setola and Stefan Geretshuber}, title = {A Study on Multiformalism Modeling of Critical Infrastructures}, booktitle = {Critical Information Infrastructure Security, Third International Workshop, {CRITIS} 2008, Rome, Italy, October 13-15, 2008. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {5508}, pages = {336--343}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-03552-4\_32}, doi = {10.1007/978-3-642-03552-4\_32}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/critis/FlamminiVMP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/critis/FranchinaCGPP08, author = {Luisa Franchina and Marco Carbonelli and Laura Gratta and Claudio Petricca and Daniele Perucchini}, editor = {Roberto Setola and Stefan Geretshuber}, title = {An Effective Approach for Cascading Effects Prevision in Critical Infrastructures}, booktitle = {Critical Information Infrastructure Security, Third International Workshop, {CRITIS} 2008, Rome, Italy, October 13-15, 2008. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {5508}, pages = {386--393}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-03552-4\_38}, doi = {10.1007/978-3-642-03552-4\_38}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/critis/FranchinaCGPP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/critis/GadomskiZ08, author = {Adam Maria Gadomski and Tomasz Adam Zimny}, editor = {Roberto Setola and Stefan Geretshuber}, title = {Application of {IPK} (Information, Preferences, Knowledge) Paradigm for the Modelling of Precautionary Principle Based Decision-Making}, booktitle = {Critical Information Infrastructure Security, Third International Workshop, {CRITIS} 2008, Rome, Italy, October 13-15, 2008. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {5508}, pages = {319--327}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-03552-4\_30}, doi = {10.1007/978-3-642-03552-4\_30}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/critis/GadomskiZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/critis/GustavssonS08, author = {Rune Gustavsson and Bj{\"{o}}rn St{\aa}hl}, editor = {Roberto Setola and Stefan Geretshuber}, title = {Self-healing and Resilient Critical Infrastructures}, booktitle = {Critical Information Infrastructure Security, Third International Workshop, {CRITIS} 2008, Rome, Italy, October 13-15, 2008. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {5508}, pages = {84--94}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-03552-4\_8}, doi = {10.1007/978-3-642-03552-4\_8}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/critis/GustavssonS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/critis/KalamD08, author = {Anas Abou El Kalam and Yves Deswarte}, editor = {Roberto Setola and Stefan Geretshuber}, title = {Critical Infrastructures Security Modeling, Enforcement and Runtime Checking}, booktitle = {Critical Information Infrastructure Security, Third International Workshop, {CRITIS} 2008, Rome, Italy, October 13-15, 2008. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {5508}, pages = {95--108}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-03552-4\_9}, doi = {10.1007/978-3-642-03552-4\_9}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/critis/KalamD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/critis/KivimaaOT08, author = {J{\"{u}}ri Kivimaa and Andres Ojamaa and Enn Tyugu}, editor = {Roberto Setola and Stefan Geretshuber}, title = {Graded Security Expert System}, booktitle = {Critical Information Infrastructure Security, Third International Workshop, {CRITIS} 2008, Rome, Italy, October 13-15, 2008. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {5508}, pages = {279--286}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-03552-4\_25}, doi = {10.1007/978-3-642-03552-4\_25}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/critis/KivimaaOT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/critis/Klein08, author = {R{\"{u}}diger Klein}, editor = {Roberto Setola and Stefan Geretshuber}, title = {Information Modelling and Simulation in Large Dependent Critical Infrastructures - An Overview on the European Integrated Project {IRRIIS}}, booktitle = {Critical Information Infrastructure Security, Third International Workshop, {CRITIS} 2008, Rome, Italy, October 13-15, 2008. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {5508}, pages = {131--143}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-03552-4\_12}, doi = {10.1007/978-3-642-03552-4\_12}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/critis/Klein08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/critis/KleinRBLRU08, author = {R{\"{u}}diger Klein and Erich Rome and C{\'{e}}saire Beyel and Ralf Linnemann and Wolf Reinhardt and Andrij Usov}, editor = {Roberto Setola and Stefan Geretshuber}, title = {Information Modelling and Simulation in Large Interdependent Critical Infrastructures in {IRRIIS}}, booktitle = {Critical Information Infrastructure Security, Third International Workshop, {CRITIS} 2008, Rome, Italy, October 13-15, 2008. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {5508}, pages = {36--47}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-03552-4\_4}, doi = {10.1007/978-3-642-03552-4\_4}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/critis/KleinRBLRU08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/critis/KobayashiBMFBP08, author = {Tiago H. Kobayashi and Aguinaldo B. Batista and Jo{\~{a}}o Paulo S. Medeiros and Jos{\'{e}} Macedo F. Filho and Agostinho M. Brito Jr. and Paulo S. Motta Pires}, editor = {Roberto Setola and Stefan Geretshuber}, title = {Analysis of Malicious Traffic in Modbus/TCP Communications}, booktitle = {Critical Information Infrastructure Security, Third International Workshop, {CRITIS} 2008, Rome, Italy, October 13-15, 2008. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {5508}, pages = {200--210}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-03552-4\_18}, doi = {10.1007/978-3-642-03552-4\_18}, timestamp = {Mon, 16 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/critis/KobayashiBMFBP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/critis/KozakiewiczFK08, author = {Adam Kozakiewicz and Anna Felkner and Tomasz Jordan Kruk}, editor = {Roberto Setola and Stefan Geretshuber}, title = {Simulation of Critical {ICT} Infrastructure for Municipal Crisis Management}, booktitle = {Critical Information Infrastructure Security, Third International Workshop, {CRITIS} 2008, Rome, Italy, October 13-15, 2008. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {5508}, pages = {344--351}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-03552-4\_33}, doi = {10.1007/978-3-642-03552-4\_33}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/critis/KozakiewiczFK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/critis/LineAJTJLW08, author = {Maria B. Line and Eirik Albrechtsen and Martin Gilje Jaatun and Inger Anne T{\o}ndel and Stig Ole Johnsen and Odd Helge Longva and Irene W{\ae}r{\o}}, editor = {Roberto Setola and Stefan Geretshuber}, title = {A Structured Approach to Incident Response Management in the Oil and Gas Industry}, booktitle = {Critical Information Infrastructure Security, Third International Workshop, {CRITIS} 2008, Rome, Italy, October 13-15, 2008. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {5508}, pages = {235--246}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-03552-4\_21}, doi = {10.1007/978-3-642-03552-4\_21}, timestamp = {Fri, 02 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/critis/LineAJTJLW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/critis/LuiijfAZ08, author = {Eric A. M. Luiijf and Manou Ali and Annemarie Zielstra}, editor = {Roberto Setola and Stefan Geretshuber}, title = {Assessing and Improving {SCADA} Security in the Dutch Drinking Water Sector}, booktitle = {Critical Information Infrastructure Security, Third International Workshop, {CRITIS} 2008, Rome, Italy, October 13-15, 2008. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {5508}, pages = {190--199}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-03552-4\_17}, doi = {10.1007/978-3-642-03552-4\_17}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/critis/LuiijfAZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/critis/LuiijfNKEC08, author = {Eric A. M. Luiijf and Albert Nieuwenhuijs and Marieke H. A. Klaver and Michel van Eeten and Edite Cruz}, editor = {Roberto Setola and Stefan Geretshuber}, title = {Empirical Findings on Critical Infrastructure Dependencies in Europe}, booktitle = {Critical Information Infrastructure Security, Third International Workshop, {CRITIS} 2008, Rome, Italy, October 13-15, 2008. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {5508}, pages = {302--310}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-03552-4\_28}, doi = {10.1007/978-3-642-03552-4\_28}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/critis/LuiijfNKEC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/critis/MedeirosS08, author = {Jo{\~{a}}o Paulo S. Medeiros and Selan R. dos Santos}, editor = {Roberto Setola and Stefan Geretshuber}, title = {RadialNet: An Interactive Network Topology Visualization Tool with Visual Auditing Support}, booktitle = {Critical Information Infrastructure Security, Third International Workshop, {CRITIS} 2008, Rome, Italy, October 13-15, 2008. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {5508}, pages = {168--179}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-03552-4\_15}, doi = {10.1007/978-3-642-03552-4\_15}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/critis/MedeirosS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/critis/SarriegiSTG08, author = {Jose M. Sarriegi and Finn Olav Sveen and Jos{\'{e}} Manuel Torres and Jose J. Gonzalez}, editor = {Roberto Setola and Stefan Geretshuber}, title = {Adaptation of Modelling Paradigms to the CIs Interdependencies Problem}, booktitle = {Critical Information Infrastructure Security, Third International Workshop, {CRITIS} 2008, Rome, Italy, October 13-15, 2008. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {5508}, pages = {295--301}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-03552-4\_27}, doi = {10.1007/978-3-642-03552-4\_27}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/critis/SarriegiSTG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/critis/SchwaegerlSBDGL08, author = {Christine Schwaegerl and Olaf Seifert and Robert Buschmann and Hermann Dellwing and Stefan Geretshuber and Claus Leick}, editor = {Roberto Setola and Stefan Geretshuber}, title = {Increase of Power System Survivability with the Decision Support Tool {CRIPS} Based on Network Planning and Simulation Program PSS{\textregistered}SINCAL}, booktitle = {Critical Information Infrastructure Security, Third International Workshop, {CRITIS} 2008, Rome, Italy, October 13-15, 2008. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {5508}, pages = {119--130}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-03552-4\_11}, doi = {10.1007/978-3-642-03552-4\_11}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/critis/SchwaegerlSBDGL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/critis/ToloneJLXMYB08, author = {William J. Tolone and E. Wray Johnson and Seok{-}Won Lee and Wei{-}Ning Xiang and Lydia Marsh and Cody Yeager and Joshua Blackwell}, editor = {Roberto Setola and Stefan Geretshuber}, title = {Enabling System of Systems Analysis of Critical Infrastructure Behaviors}, booktitle = {Critical Information Infrastructure Security, Third International Workshop, {CRITIS} 2008, Rome, Italy, October 13-15, 2008. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {5508}, pages = {24--35}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-03552-4\_3}, doi = {10.1007/978-3-642-03552-4\_3}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/critis/ToloneJLXMYB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/critis/Tomas-BuliartFS08, author = {Joan Tom{\`{a}}s{-}Buliart and Marcel Fernandez and Miguel Soriano}, editor = {Roberto Setola and Stefan Geretshuber}, title = {Protection of Mobile Agents Execution Using a Modified Self-Validating Branch-Based Software Watermarking with External Sentinel}, booktitle = {Critical Information Infrastructure Security, Third International Workshop, {CRITIS} 2008, Rome, Italy, October 13-15, 2008. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {5508}, pages = {287--294}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-03552-4\_26}, doi = {10.1007/978-3-642-03552-4\_26}, timestamp = {Fri, 02 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/critis/Tomas-BuliartFS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/critis/TorresSS08, author = {Jos{\'{e}} Manuel Torres and Finn Olav Sveen and Jose Mar{\'{\i}}a Sarriegi}, editor = {Roberto Setola and Stefan Geretshuber}, title = {Security Strategy Analysis for Critical Information Infrastructures}, booktitle = {Critical Information Infrastructure Security, Third International Workshop, {CRITIS} 2008, Rome, Italy, October 13-15, 2008. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {5508}, pages = {247--257}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-03552-4\_22}, doi = {10.1007/978-3-642-03552-4\_22}, timestamp = {Fri, 19 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/critis/TorresSS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.