Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/ifip11-10/cip2008.bht:"
@proceedings{DBLP:conf/ifip11-10/2008, editor = {Mauricio Papa and Sujeet Shenoi}, title = {Critical Infrastructure Protection {II} - Second Annual {IFIP} {WG} 11.10 International Conference on Critical Infrastructure Protection, George Mason University, Arlington, Virginia, USA, March 17-19, 2008, Revised Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {290}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-0-387-88523-0}, doi = {10.1007/978-0-387-88523-0}, isbn = {978-0-387-88522-3}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-10/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-10/AnwarC08, author = {Zahid Anwar and Roy H. Campbell}, editor = {Mauricio Papa and Sujeet Shenoi}, title = {Automated Assessment Of Compliance With Security Best Practices}, booktitle = {Critical Infrastructure Protection {II} - Second Annual {IFIP} {WG} 11.10 International Conference on Critical Infrastructure Protection, George Mason University, Arlington, Virginia, USA, March 17-19, 2008, Revised Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {290}, pages = {173--187}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-88523-0\_13}, doi = {10.1007/978-0-387-88523-0\_13}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-10/AnwarC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-10/AssognaBPVSZ08, author = {Pierluigi Assogna and Glauco Bertocchi and Alberto Paoluzzi and Michele Vicentino and Giorgio Scorzelli and Roberto Zollo}, editor = {Mauricio Papa and Sujeet Shenoi}, title = {Using 3D Models And Discrete Simulations In Infrastructure Security Applications}, booktitle = {Critical Infrastructure Protection {II} - Second Annual {IFIP} {WG} 11.10 International Conference on Critical Infrastructure Protection, George Mason University, Arlington, Virginia, USA, March 17-19, 2008, Revised Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {290}, pages = {269--278}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-88523-0\_20}, doi = {10.1007/978-0-387-88523-0\_20}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-10/AssognaBPVSZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-10/BainaKDK08, author = {Amine Ba{\"{\i}}na and Anas Abou El Kalam and Yves Deswarte and Mohamed Ka{\^{a}}niche}, editor = {Mauricio Papa and Sujeet Shenoi}, title = {Collaborative Access Control For Critical Infrastructures}, booktitle = {Critical Infrastructure Protection {II} - Second Annual {IFIP} {WG} 11.10 International Conference on Critical Infrastructure Protection, George Mason University, Arlington, Virginia, USA, March 17-19, 2008, Revised Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {290}, pages = {189--201}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-88523-0\_14}, doi = {10.1007/978-0-387-88523-0\_14}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-10/BainaKDK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-10/BellettiniR08, author = {Carlo Bellettini and Julian L. Rrushi}, editor = {Mauricio Papa and Sujeet Shenoi}, title = {Combating Memory Corruption Attacks On Scada Devices}, booktitle = {Critical Infrastructure Protection {II} - Second Annual {IFIP} {WG} 11.10 International Conference on Critical Infrastructure Protection, George Mason University, Arlington, Virginia, USA, March 17-19, 2008, Revised Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {290}, pages = {141--156}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-88523-0\_11}, doi = {10.1007/978-0-387-88523-0\_11}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-10/BellettiniR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-10/CasalicchioG08, author = {Emiliano Casalicchio and Emanuele Galli}, editor = {Mauricio Papa and Sujeet Shenoi}, title = {Metrics For Quantifying Interdependencies}, booktitle = {Critical Infrastructure Protection {II} - Second Annual {IFIP} {WG} 11.10 International Conference on Critical Infrastructure Protection, George Mason University, Arlington, Virginia, USA, March 17-19, 2008, Revised Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {290}, pages = {215--227}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-88523-0\_16}, doi = {10.1007/978-0-387-88523-0\_16}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-10/CasalicchioG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-10/CravenO08, author = {Paul Vincent Craven and Paul W. Oman}, editor = {Mauricio Papa and Sujeet Shenoi}, title = {Simulation Of Advanced Train Control Systems}, booktitle = {Critical Infrastructure Protection {II} - Second Annual {IFIP} {WG} 11.10 International Conference on Critical Infrastructure Protection, George Mason University, Arlington, Virginia, USA, March 17-19, 2008, Revised Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {290}, pages = {243--256}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-88523-0\_18}, doi = {10.1007/978-0-387-88523-0\_18}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-10/CravenO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-10/Dynes08, author = {Scott Dynes}, editor = {Mauricio Papa and Sujeet Shenoi}, title = {Emergent Risks In Critical Infrastructures}, booktitle = {Critical Infrastructure Protection {II} - Second Annual {IFIP} {WG} 11.10 International Conference on Critical Infrastructure Protection, George Mason University, Arlington, Virginia, USA, March 17-19, 2008, Revised Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {290}, pages = {3--16}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-88523-0\_1}, doi = {10.1007/978-0-387-88523-0\_1}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-10/Dynes08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-10/FleuryKW08, author = {Terry Fleury and Himanshu Khurana and Von Welch}, editor = {Mauricio Papa and Sujeet Shenoi}, title = {Towards {A} Taxonomy Of Attacks Against Energy Control Systems}, booktitle = {Critical Infrastructure Protection {II} - Second Annual {IFIP} {WG} 11.10 International Conference on Critical Infrastructure Protection, George Mason University, Arlington, Virginia, USA, March 17-19, 2008, Revised Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {290}, pages = {71--85}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-88523-0\_6}, doi = {10.1007/978-0-387-88523-0\_6}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-10/FleuryKW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-10/HiebG08, author = {Jeffrey L. Hieb and James H. Graham}, editor = {Mauricio Papa and Sujeet Shenoi}, title = {Designing Security-Hardened Microkernels For Field Devices}, booktitle = {Critical Infrastructure Protection {II} - Second Annual {IFIP} {WG} 11.10 International Conference on Critical Infrastructure Protection, George Mason University, Arlington, Virginia, USA, March 17-19, 2008, Revised Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {290}, pages = {129--140}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-88523-0\_10}, doi = {10.1007/978-0-387-88523-0\_10}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-10/HiebG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-10/HunkerHM08, author = {Jeffrey Hunker and Robert Hutchinson and Jonathan Margulies}, editor = {Mauricio Papa and Sujeet Shenoi}, title = {Attribution Of Cyber Attacks On Process Control Systems}, booktitle = {Critical Infrastructure Protection {II} - Second Annual {IFIP} {WG} 11.10 International Conference on Critical Infrastructure Protection, George Mason University, Arlington, Virginia, USA, March 17-19, 2008, Revised Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {290}, pages = {87--99}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-88523-0\_7}, doi = {10.1007/978-0-387-88523-0\_7}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-10/HunkerHM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-10/Johnsen08, author = {Stig Ole Johnsen}, editor = {Mauricio Papa and Sujeet Shenoi}, title = {Mitigating Accidents In Oil And Gas Production Facilities}, booktitle = {Critical Infrastructure Protection {II} - Second Annual {IFIP} {WG} 11.10 International Conference on Critical Infrastructure Protection, George Mason University, Arlington, Virginia, USA, March 17-19, 2008, Revised Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {290}, pages = {157--170}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-88523-0\_12}, doi = {10.1007/978-0-387-88523-0\_12}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-10/Johnsen08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-10/MaseraFL08, author = {Marcelo Masera and Igor Nai Fovino and Rafal Leszczyna}, editor = {Mauricio Papa and Sujeet Shenoi}, title = {Security Assessment Of {A} Turbo-Gas Power Plant}, booktitle = {Critical Infrastructure Protection {II} - Second Annual {IFIP} {WG} 11.10 International Conference on Critical Infrastructure Protection, George Mason University, Arlington, Virginia, USA, March 17-19, 2008, Revised Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {290}, pages = {31--40}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-88523-0\_3}, doi = {10.1007/978-0-387-88523-0\_3}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ifip11-10/MaseraFL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-10/NieuwenhuijsLK08, author = {Albert Nieuwenhuijs and Eric A. M. Luiijf and Marieke H. A. Klaver}, editor = {Mauricio Papa and Sujeet Shenoi}, title = {Modeling Dependencies In Critical Infrastructures}, booktitle = {Critical Infrastructure Protection {II} - Second Annual {IFIP} {WG} 11.10 International Conference on Critical Infrastructure Protection, George Mason University, Arlington, Virginia, USA, March 17-19, 2008, Revised Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {290}, pages = {205--213}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-88523-0\_15}, doi = {10.1007/978-0-387-88523-0\_15}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ifip11-10/NieuwenhuijsLK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-10/OkhraviN08, author = {Hamed Okhravi and David M. Nicol}, editor = {Mauricio Papa and Sujeet Shenoi}, title = {Applying Trusted Network Technology To Process Control Systems}, booktitle = {Critical Infrastructure Protection {II} - Second Annual {IFIP} {WG} 11.10 International Conference on Critical Infrastructure Protection, George Mason University, Arlington, Virginia, USA, March 17-19, 2008, Revised Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {290}, pages = {57--70}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-88523-0\_5}, doi = {10.1007/978-0-387-88523-0\_5}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-10/OkhraviN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-10/RrushiC08, author = {Julian L. Rrushi and Roy H. Campbell}, editor = {Mauricio Papa and Sujeet Shenoi}, title = {Detecting Cyber Attacks On Nuclear Power Plants}, booktitle = {Critical Infrastructure Protection {II} - Second Annual {IFIP} {WG} 11.10 International Conference on Critical Infrastructure Protection, George Mason University, Arlington, Virginia, USA, March 17-19, 2008, Revised Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {290}, pages = {41--54}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-88523-0\_4}, doi = {10.1007/978-0-387-88523-0\_4}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-10/RrushiC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-10/SetolaBCM08, author = {Roberto Setola and Sandro Bologna and Emiliano Casalicchio and Vincenzo Masucci}, editor = {Mauricio Papa and Sujeet Shenoi}, title = {An Integrated Approach For Simulating Interdependencies}, booktitle = {Critical Infrastructure Protection {II} - Second Annual {IFIP} {WG} 11.10 International Conference on Critical Infrastructure Protection, George Mason University, Arlington, Virginia, USA, March 17-19, 2008, Revised Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {290}, pages = {229--239}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-88523-0\_17}, doi = {10.1007/978-0-387-88523-0\_17}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ifip11-10/SetolaBCM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-10/ShaytoPCPS08, author = {Ryan Shayto and Brian Porter and Rodrigo Chandia and Mauricio Papa and Sujeet Shenoi}, editor = {Mauricio Papa and Sujeet Shenoi}, title = {Assessing The Integrity Of Field Devices In Modbus Networks}, booktitle = {Critical Infrastructure Protection {II} - Second Annual {IFIP} {WG} 11.10 International Conference on Critical Infrastructure Protection, George Mason University, Arlington, Virginia, USA, March 17-19, 2008, Revised Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {290}, pages = {115--128}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-88523-0\_9}, doi = {10.1007/978-0-387-88523-0\_9}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-10/ShaytoPCPS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-10/SvendsenW08, author = {Nils Kalstad Svendsen and Stephen D. Wolthusen}, editor = {Mauricio Papa and Sujeet Shenoi}, title = {Modeling And Detecting Anomalies In Scada Systems}, booktitle = {Critical Infrastructure Protection {II} - Second Annual {IFIP} {WG} 11.10 International Conference on Critical Infrastructure Protection, George Mason University, Arlington, Virginia, USA, March 17-19, 2008, Revised Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {290}, pages = {101--113}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-88523-0\_8}, doi = {10.1007/978-0-387-88523-0\_8}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-10/SvendsenW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-10/ToloneLXBYSJ08, author = {William J. Tolone and Seok{-}Won Lee and Wei{-}Ning Xiang and Joshua Blackwell and Cody Yeager and Andrew Schumpert and E. Wray Johnson}, editor = {Mauricio Papa and Sujeet Shenoi}, title = {An Integrated Methodology For Critical Infrastructure Modeling And Simulation}, booktitle = {Critical Infrastructure Protection {II} - Second Annual {IFIP} {WG} 11.10 International Conference on Critical Infrastructure Protection, George Mason University, Arlington, Virginia, USA, March 17-19, 2008, Revised Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {290}, pages = {257--268}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-88523-0\_19}, doi = {10.1007/978-0-387-88523-0\_19}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-10/ToloneLXBYSJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-10/WilkinRWH08, author = {Dorsey Wilkin and Richard A. Raines and Paul D. Williams and Kenneth M. Hopkinson}, editor = {Mauricio Papa and Sujeet Shenoi}, title = {Cyberspace Policy For Critical Infrastructures}, booktitle = {Critical Infrastructure Protection {II} - Second Annual {IFIP} {WG} 11.10 International Conference on Critical Infrastructure Protection, George Mason University, Arlington, Virginia, USA, March 17-19, 2008, Revised Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {290}, pages = {17--28}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-88523-0\_2}, doi = {10.1007/978-0-387-88523-0\_2}, timestamp = {Wed, 11 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-10/WilkinRWH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.