Search dblp for Publications

export results for "toc:db/conf/ifip11-10/cip2008.bht:"

 download as .bib file

@proceedings{DBLP:conf/ifip11-10/2008,
  editor       = {Mauricio Papa and
                  Sujeet Shenoi},
  title        = {Critical Infrastructure Protection {II} - Second Annual {IFIP} {WG}
                  11.10 International Conference on Critical Infrastructure Protection,
                  George Mason University, Arlington, Virginia, USA, March 17-19, 2008,
                  Revised Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {290},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-0-387-88523-0},
  doi          = {10.1007/978-0-387-88523-0},
  isbn         = {978-0-387-88522-3},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-10/2008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-10/AnwarC08,
  author       = {Zahid Anwar and
                  Roy H. Campbell},
  editor       = {Mauricio Papa and
                  Sujeet Shenoi},
  title        = {Automated Assessment Of Compliance With Security Best Practices},
  booktitle    = {Critical Infrastructure Protection {II} - Second Annual {IFIP} {WG}
                  11.10 International Conference on Critical Infrastructure Protection,
                  George Mason University, Arlington, Virginia, USA, March 17-19, 2008,
                  Revised Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {290},
  pages        = {173--187},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-88523-0\_13},
  doi          = {10.1007/978-0-387-88523-0\_13},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-10/AnwarC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-10/AssognaBPVSZ08,
  author       = {Pierluigi Assogna and
                  Glauco Bertocchi and
                  Alberto Paoluzzi and
                  Michele Vicentino and
                  Giorgio Scorzelli and
                  Roberto Zollo},
  editor       = {Mauricio Papa and
                  Sujeet Shenoi},
  title        = {Using 3D Models And Discrete Simulations In Infrastructure Security
                  Applications},
  booktitle    = {Critical Infrastructure Protection {II} - Second Annual {IFIP} {WG}
                  11.10 International Conference on Critical Infrastructure Protection,
                  George Mason University, Arlington, Virginia, USA, March 17-19, 2008,
                  Revised Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {290},
  pages        = {269--278},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-88523-0\_20},
  doi          = {10.1007/978-0-387-88523-0\_20},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-10/AssognaBPVSZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-10/BainaKDK08,
  author       = {Amine Ba{\"{\i}}na and
                  Anas Abou El Kalam and
                  Yves Deswarte and
                  Mohamed Ka{\^{a}}niche},
  editor       = {Mauricio Papa and
                  Sujeet Shenoi},
  title        = {Collaborative Access Control For Critical Infrastructures},
  booktitle    = {Critical Infrastructure Protection {II} - Second Annual {IFIP} {WG}
                  11.10 International Conference on Critical Infrastructure Protection,
                  George Mason University, Arlington, Virginia, USA, March 17-19, 2008,
                  Revised Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {290},
  pages        = {189--201},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-88523-0\_14},
  doi          = {10.1007/978-0-387-88523-0\_14},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-10/BainaKDK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-10/BellettiniR08,
  author       = {Carlo Bellettini and
                  Julian L. Rrushi},
  editor       = {Mauricio Papa and
                  Sujeet Shenoi},
  title        = {Combating Memory Corruption Attacks On Scada Devices},
  booktitle    = {Critical Infrastructure Protection {II} - Second Annual {IFIP} {WG}
                  11.10 International Conference on Critical Infrastructure Protection,
                  George Mason University, Arlington, Virginia, USA, March 17-19, 2008,
                  Revised Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {290},
  pages        = {141--156},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-88523-0\_11},
  doi          = {10.1007/978-0-387-88523-0\_11},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-10/BellettiniR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-10/CasalicchioG08,
  author       = {Emiliano Casalicchio and
                  Emanuele Galli},
  editor       = {Mauricio Papa and
                  Sujeet Shenoi},
  title        = {Metrics For Quantifying Interdependencies},
  booktitle    = {Critical Infrastructure Protection {II} - Second Annual {IFIP} {WG}
                  11.10 International Conference on Critical Infrastructure Protection,
                  George Mason University, Arlington, Virginia, USA, March 17-19, 2008,
                  Revised Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {290},
  pages        = {215--227},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-88523-0\_16},
  doi          = {10.1007/978-0-387-88523-0\_16},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-10/CasalicchioG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-10/CravenO08,
  author       = {Paul Vincent Craven and
                  Paul W. Oman},
  editor       = {Mauricio Papa and
                  Sujeet Shenoi},
  title        = {Simulation Of Advanced Train Control Systems},
  booktitle    = {Critical Infrastructure Protection {II} - Second Annual {IFIP} {WG}
                  11.10 International Conference on Critical Infrastructure Protection,
                  George Mason University, Arlington, Virginia, USA, March 17-19, 2008,
                  Revised Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {290},
  pages        = {243--256},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-88523-0\_18},
  doi          = {10.1007/978-0-387-88523-0\_18},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-10/CravenO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-10/Dynes08,
  author       = {Scott Dynes},
  editor       = {Mauricio Papa and
                  Sujeet Shenoi},
  title        = {Emergent Risks In Critical Infrastructures},
  booktitle    = {Critical Infrastructure Protection {II} - Second Annual {IFIP} {WG}
                  11.10 International Conference on Critical Infrastructure Protection,
                  George Mason University, Arlington, Virginia, USA, March 17-19, 2008,
                  Revised Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {290},
  pages        = {3--16},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-88523-0\_1},
  doi          = {10.1007/978-0-387-88523-0\_1},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-10/Dynes08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-10/FleuryKW08,
  author       = {Terry Fleury and
                  Himanshu Khurana and
                  Von Welch},
  editor       = {Mauricio Papa and
                  Sujeet Shenoi},
  title        = {Towards {A} Taxonomy Of Attacks Against Energy Control Systems},
  booktitle    = {Critical Infrastructure Protection {II} - Second Annual {IFIP} {WG}
                  11.10 International Conference on Critical Infrastructure Protection,
                  George Mason University, Arlington, Virginia, USA, March 17-19, 2008,
                  Revised Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {290},
  pages        = {71--85},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-88523-0\_6},
  doi          = {10.1007/978-0-387-88523-0\_6},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-10/FleuryKW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-10/HiebG08,
  author       = {Jeffrey L. Hieb and
                  James H. Graham},
  editor       = {Mauricio Papa and
                  Sujeet Shenoi},
  title        = {Designing Security-Hardened Microkernels For Field Devices},
  booktitle    = {Critical Infrastructure Protection {II} - Second Annual {IFIP} {WG}
                  11.10 International Conference on Critical Infrastructure Protection,
                  George Mason University, Arlington, Virginia, USA, March 17-19, 2008,
                  Revised Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {290},
  pages        = {129--140},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-88523-0\_10},
  doi          = {10.1007/978-0-387-88523-0\_10},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-10/HiebG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-10/HunkerHM08,
  author       = {Jeffrey Hunker and
                  Robert Hutchinson and
                  Jonathan Margulies},
  editor       = {Mauricio Papa and
                  Sujeet Shenoi},
  title        = {Attribution Of Cyber Attacks On Process Control Systems},
  booktitle    = {Critical Infrastructure Protection {II} - Second Annual {IFIP} {WG}
                  11.10 International Conference on Critical Infrastructure Protection,
                  George Mason University, Arlington, Virginia, USA, March 17-19, 2008,
                  Revised Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {290},
  pages        = {87--99},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-88523-0\_7},
  doi          = {10.1007/978-0-387-88523-0\_7},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-10/HunkerHM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-10/Johnsen08,
  author       = {Stig Ole Johnsen},
  editor       = {Mauricio Papa and
                  Sujeet Shenoi},
  title        = {Mitigating Accidents In Oil And Gas Production Facilities},
  booktitle    = {Critical Infrastructure Protection {II} - Second Annual {IFIP} {WG}
                  11.10 International Conference on Critical Infrastructure Protection,
                  George Mason University, Arlington, Virginia, USA, March 17-19, 2008,
                  Revised Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {290},
  pages        = {157--170},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-88523-0\_12},
  doi          = {10.1007/978-0-387-88523-0\_12},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-10/Johnsen08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-10/MaseraFL08,
  author       = {Marcelo Masera and
                  Igor Nai Fovino and
                  Rafal Leszczyna},
  editor       = {Mauricio Papa and
                  Sujeet Shenoi},
  title        = {Security Assessment Of {A} Turbo-Gas Power Plant},
  booktitle    = {Critical Infrastructure Protection {II} - Second Annual {IFIP} {WG}
                  11.10 International Conference on Critical Infrastructure Protection,
                  George Mason University, Arlington, Virginia, USA, March 17-19, 2008,
                  Revised Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {290},
  pages        = {31--40},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-88523-0\_3},
  doi          = {10.1007/978-0-387-88523-0\_3},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ifip11-10/MaseraFL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-10/NieuwenhuijsLK08,
  author       = {Albert Nieuwenhuijs and
                  Eric A. M. Luiijf and
                  Marieke H. A. Klaver},
  editor       = {Mauricio Papa and
                  Sujeet Shenoi},
  title        = {Modeling Dependencies In Critical Infrastructures},
  booktitle    = {Critical Infrastructure Protection {II} - Second Annual {IFIP} {WG}
                  11.10 International Conference on Critical Infrastructure Protection,
                  George Mason University, Arlington, Virginia, USA, March 17-19, 2008,
                  Revised Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {290},
  pages        = {205--213},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-88523-0\_15},
  doi          = {10.1007/978-0-387-88523-0\_15},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ifip11-10/NieuwenhuijsLK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-10/OkhraviN08,
  author       = {Hamed Okhravi and
                  David M. Nicol},
  editor       = {Mauricio Papa and
                  Sujeet Shenoi},
  title        = {Applying Trusted Network Technology To Process Control Systems},
  booktitle    = {Critical Infrastructure Protection {II} - Second Annual {IFIP} {WG}
                  11.10 International Conference on Critical Infrastructure Protection,
                  George Mason University, Arlington, Virginia, USA, March 17-19, 2008,
                  Revised Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {290},
  pages        = {57--70},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-88523-0\_5},
  doi          = {10.1007/978-0-387-88523-0\_5},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-10/OkhraviN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-10/RrushiC08,
  author       = {Julian L. Rrushi and
                  Roy H. Campbell},
  editor       = {Mauricio Papa and
                  Sujeet Shenoi},
  title        = {Detecting Cyber Attacks On Nuclear Power Plants},
  booktitle    = {Critical Infrastructure Protection {II} - Second Annual {IFIP} {WG}
                  11.10 International Conference on Critical Infrastructure Protection,
                  George Mason University, Arlington, Virginia, USA, March 17-19, 2008,
                  Revised Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {290},
  pages        = {41--54},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-88523-0\_4},
  doi          = {10.1007/978-0-387-88523-0\_4},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-10/RrushiC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-10/SetolaBCM08,
  author       = {Roberto Setola and
                  Sandro Bologna and
                  Emiliano Casalicchio and
                  Vincenzo Masucci},
  editor       = {Mauricio Papa and
                  Sujeet Shenoi},
  title        = {An Integrated Approach For Simulating Interdependencies},
  booktitle    = {Critical Infrastructure Protection {II} - Second Annual {IFIP} {WG}
                  11.10 International Conference on Critical Infrastructure Protection,
                  George Mason University, Arlington, Virginia, USA, March 17-19, 2008,
                  Revised Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {290},
  pages        = {229--239},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-88523-0\_17},
  doi          = {10.1007/978-0-387-88523-0\_17},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ifip11-10/SetolaBCM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-10/ShaytoPCPS08,
  author       = {Ryan Shayto and
                  Brian Porter and
                  Rodrigo Chandia and
                  Mauricio Papa and
                  Sujeet Shenoi},
  editor       = {Mauricio Papa and
                  Sujeet Shenoi},
  title        = {Assessing The Integrity Of Field Devices In Modbus Networks},
  booktitle    = {Critical Infrastructure Protection {II} - Second Annual {IFIP} {WG}
                  11.10 International Conference on Critical Infrastructure Protection,
                  George Mason University, Arlington, Virginia, USA, March 17-19, 2008,
                  Revised Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {290},
  pages        = {115--128},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-88523-0\_9},
  doi          = {10.1007/978-0-387-88523-0\_9},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-10/ShaytoPCPS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-10/SvendsenW08,
  author       = {Nils Kalstad Svendsen and
                  Stephen D. Wolthusen},
  editor       = {Mauricio Papa and
                  Sujeet Shenoi},
  title        = {Modeling And Detecting Anomalies In Scada Systems},
  booktitle    = {Critical Infrastructure Protection {II} - Second Annual {IFIP} {WG}
                  11.10 International Conference on Critical Infrastructure Protection,
                  George Mason University, Arlington, Virginia, USA, March 17-19, 2008,
                  Revised Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {290},
  pages        = {101--113},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-88523-0\_8},
  doi          = {10.1007/978-0-387-88523-0\_8},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-10/SvendsenW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-10/ToloneLXBYSJ08,
  author       = {William J. Tolone and
                  Seok{-}Won Lee and
                  Wei{-}Ning Xiang and
                  Joshua Blackwell and
                  Cody Yeager and
                  Andrew Schumpert and
                  E. Wray Johnson},
  editor       = {Mauricio Papa and
                  Sujeet Shenoi},
  title        = {An Integrated Methodology For Critical Infrastructure Modeling And
                  Simulation},
  booktitle    = {Critical Infrastructure Protection {II} - Second Annual {IFIP} {WG}
                  11.10 International Conference on Critical Infrastructure Protection,
                  George Mason University, Arlington, Virginia, USA, March 17-19, 2008,
                  Revised Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {290},
  pages        = {257--268},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-88523-0\_19},
  doi          = {10.1007/978-0-387-88523-0\_19},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-10/ToloneLXBYSJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-10/WilkinRWH08,
  author       = {Dorsey Wilkin and
                  Richard A. Raines and
                  Paul D. Williams and
                  Kenneth M. Hopkinson},
  editor       = {Mauricio Papa and
                  Sujeet Shenoi},
  title        = {Cyberspace Policy For Critical Infrastructures},
  booktitle    = {Critical Infrastructure Protection {II} - Second Annual {IFIP} {WG}
                  11.10 International Conference on Critical Infrastructure Protection,
                  George Mason University, Arlington, Virginia, USA, March 17-19, 2008,
                  Revised Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {290},
  pages        = {17--28},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-88523-0\_2},
  doi          = {10.1007/978-0-387-88523-0\_2},
  timestamp    = {Wed, 11 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-10/WilkinRWH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics