CRITIS C

23 papers

YearTitle / Authors
2006A Framework for Conceptualizing Social Engineering Attacks.
Jose J. Gonzalez, Jose M. Sarriegi, Alazne Gurrutxaga
2006A Framework for Secure and Verifiable Logging in Public Communication Networks.
Vassilios Stathopoulos, Panayiotis Kotzanikolaou, Emmanouil Magkos
2006An Overview of R&D Activities in Europe on Critical Information Infrastructure Protection (CIIP).
Sandro Bologna, Giovanni Di Costanzo, Eric A. M. Luiijf, Roberto Setola
2006Applying Key Infrastructures for Sensor Networks in CIP/CIIP Scenarios.
Cristina Alcaraz, Rodrigo Roman
2006Assessing the Risk of an Information Infrastructure Through Security Dependencies.
Fabrizio Baiardi, S. Suin, Claudio Telmon, M. Pioli
2006CRUTIAL: The Blueprint of a Reference Critical Information Infrastructure Architecture.
Paulo Veríssimo, Nuno Ferreira Neves, Miguel Correia
2006Can an Early Warning System for Home Users and SMEs Make a Difference? A Field Study.
Urs E. Gattiker
2006Critical Information Infrastructures Security, First International Workshop, CRITIS 2006, Samos, Greece, August 31 - September 1, 2006, Revised Papers
Javier López
2006Enforcing Trust in Pervasive Computing with Trusted Computing Technology.
Shiqun Li, Shane Balfe, Jianying Zhou, Kefei Chen
2006Experiment Based Validation of CIIP.
Per Mellstrand, Rune Gustavsson
2006High-Speed Intrusion Detection in Support of Critical Infrastructure Protection.
Salvatore D'Antonio, Francesco Oliviero, Roberto Setola
2006Intelligent Network-Based Early Warning Systems.
Karsten Bsufka, Olaf Kroll-Peters, Sahin Albayrak
2006Modelling Risk and Identifying Countermeasure in Organizations.
Yudistira Asnar, Paolo Giorgini
2006Modelling and Analysing Network Security Policies in a Given Vulnerability Setting.
Roland Rieke
2006Multidomain Virtual Security Negotiation over the Session Initiation Protocol (SIP).
Daniel J. Martínez-Manzano, Gabriel López Millán, Antonio Fernandez Gómez-Skarmeta
2006PROSEARCH: A Protocol to Simplify Path Discovery in Critical Scenarios.
Cristina Satizábal, Rafael Páez, Jordi Forné
2006Proposals on Assessment Environments for Anomaly-Based Network Intrusion Detection Systems.
María Bermúdez-Edo, Rolando Salazar-Hernández, Jesús Esteban Díaz Verdejo, Pedro Garcia-Teodoro
2006Protection of Components Based on a Smart-Card Enhanced Security Module.
Joaquín García-Alfaro, Sergio Castillo, Jordi Castellà-Roca, Guillermo Navarro, Joan Borrell
2006Rational Choice of Security Measures Via Multi-parameter Attack Trees.
Ahto Buldas, Peeter Laud, Jaan Priisalu, Märt Saarepera, Jan Willemson
2006Revisiting Colored Networks and Privacy Preserving Censorship.
Yvo Desmedt, Yongge Wang, Mike Burmester
2006Security Requirements Model for Grid Data Management Systems.
Syed Naqvi, Philippe Massonet, Alvaro Arenas
2006Trust Establishment in Ad Hoc and Sensor Networks.
Efthimia Aivaloglou, Stefanos Gritzalis, Charalabos Skianis
2006Vulnerabilities and Possible Attacks Against the GPRS Backbone Network.
Christos Xenakis, Lazaros F. Merakos