| 2006 | A Framework for Conceptualizing Social Engineering Attacks. Jose J. Gonzalez, Jose M. Sarriegi, Alazne Gurrutxaga |
| 2006 | A Framework for Secure and Verifiable Logging in Public Communication Networks. Vassilios Stathopoulos, Panayiotis Kotzanikolaou, Emmanouil Magkos |
| 2006 | An Overview of R&D Activities in Europe on Critical Information Infrastructure Protection (CIIP). Sandro Bologna, Giovanni Di Costanzo, Eric A. M. Luiijf, Roberto Setola |
| 2006 | Applying Key Infrastructures for Sensor Networks in CIP/CIIP Scenarios. Cristina Alcaraz, Rodrigo Roman |
| 2006 | Assessing the Risk of an Information Infrastructure Through Security Dependencies. Fabrizio Baiardi, S. Suin, Claudio Telmon, M. Pioli |
| 2006 | CRUTIAL: The Blueprint of a Reference Critical Information Infrastructure Architecture. Paulo Veríssimo, Nuno Ferreira Neves, Miguel Correia |
| 2006 | Can an Early Warning System for Home Users and SMEs Make a Difference? A Field Study. Urs E. Gattiker |
| 2006 | Critical Information Infrastructures Security, First International Workshop, CRITIS 2006, Samos, Greece, August 31 - September 1, 2006, Revised Papers Javier López |
| 2006 | Enforcing Trust in Pervasive Computing with Trusted Computing Technology. Shiqun Li, Shane Balfe, Jianying Zhou, Kefei Chen |
| 2006 | Experiment Based Validation of CIIP. Per Mellstrand, Rune Gustavsson |
| 2006 | High-Speed Intrusion Detection in Support of Critical Infrastructure Protection. Salvatore D'Antonio, Francesco Oliviero, Roberto Setola |
| 2006 | Intelligent Network-Based Early Warning Systems. Karsten Bsufka, Olaf Kroll-Peters, Sahin Albayrak |
| 2006 | Modelling Risk and Identifying Countermeasure in Organizations. Yudistira Asnar, Paolo Giorgini |
| 2006 | Modelling and Analysing Network Security Policies in a Given Vulnerability Setting. Roland Rieke |
| 2006 | Multidomain Virtual Security Negotiation over the Session Initiation Protocol (SIP). Daniel J. Martínez-Manzano, Gabriel López Millán, Antonio Fernandez Gómez-Skarmeta |
| 2006 | PROSEARCH: A Protocol to Simplify Path Discovery in Critical Scenarios. Cristina Satizábal, Rafael Páez, Jordi Forné |
| 2006 | Proposals on Assessment Environments for Anomaly-Based Network Intrusion Detection Systems. María Bermúdez-Edo, Rolando Salazar-Hernández, Jesús Esteban Díaz Verdejo, Pedro Garcia-Teodoro |
| 2006 | Protection of Components Based on a Smart-Card Enhanced Security Module. Joaquín García-Alfaro, Sergio Castillo, Jordi Castellà-Roca, Guillermo Navarro, Joan Borrell |
| 2006 | Rational Choice of Security Measures Via Multi-parameter Attack Trees. Ahto Buldas, Peeter Laud, Jaan Priisalu, Märt Saarepera, Jan Willemson |
| 2006 | Revisiting Colored Networks and Privacy Preserving Censorship. Yvo Desmedt, Yongge Wang, Mike Burmester |
| 2006 | Security Requirements Model for Grid Data Management Systems. Syed Naqvi, Philippe Massonet, Alvaro Arenas |
| 2006 | Trust Establishment in Ad Hoc and Sensor Networks. Efthimia Aivaloglou, Stefanos Gritzalis, Charalabos Skianis |
| 2006 | Vulnerabilities and Possible Attacks Against the GPRS Backbone Network. Christos Xenakis, Lazaros F. Merakos |