| 2008 | Critical Information Infrastructures Security, Second International Workshop, CRITIS 2007, Málaga, Spain, October 3-5, 2007. Revised Papers Javier López, Bernhard M. Hämmerli |
| 2007 | A Framework for 3D Geospatial Buffering of Events of Interest in Critical Infrastructures. Nils Kalstad Svendsen, Stephen D. Wolthusen |
| 2007 | A General Model and Guidelines for Attack Manifestation Generation. Ulf Larson, Dennis K. Nilsson, Erland Jonsson |
| 2007 | A Malware Detector Placement Game for Intrusion Detection. Stephan Schmidt, Tansu Alpcan, Sahin Albayrak, Tamer Basar, Achim Müller |
| 2007 | A Methodology to Estimate Input-Output Inoperability Model Parameters. Roberto Setola, Stefano De Porcellinis |
| 2007 | A Proposal for the Definition of Operational Plans to Provide Dependability and Security. Daniel J. Martínez-Manzano, Manuel Gil Pérez, Gabriel López Millán, Antonio Fernandez Gómez-Skarmeta |
| 2007 | A Survey on Detection Techniques to Prevent Cross-Site Scripting Attacks on Current Web Applications. Joaquín García-Alfaro, Guillermo Navarro-Arribas |
| 2007 | Advanced Reaction Using Risk Assessment in Intrusion Detection Systems. Wael Kanoun, Nora Cuppens-Boulahia, Frédéric Cuppens, Fabien Autrel |
| 2007 | An Analysis of Cyclical Interdependencies in Critical Infrastructures. Nils Kalstad Svendsen, Stephen D. Wolthusen |
| 2007 | An Approach to Trust Management Challenges for Critical Infrastructures. Ioanna Dionysiou, Deborah A. Frincke, David E. Bakken, Carl Hauser |
| 2007 | Application of Kohonen Maps to Improve Security Tests on Automation Devices. João Paulo S. Medeiros, Allison C. Cunha, Agostinho M. Brito Jr., Paulo S. Motta Pires |
| 2007 | Attack Modeling of SIP-Oriented SPIT. John Mallios, Stelios Dritsas, Bill Tsoumas, Dimitris Gritzalis |
| 2007 | Design of a Platform for Information Exchange on Protection of Critical Infrastructures. Carlo Ferigato, Marcelo Masera |
| 2007 | Designing Critical Infrastructure Cyber Security Segmentation Architecture by Balancing Security with Reliability and Availability. Kegan Kawano |
| 2007 | Designing Information System Risk Management Framework Based on the Past Major Failures in the Japanese Financial Industry. Kenji Watanabe, Takashi Moriyasu |
| 2007 | Detecting DNS Amplification Attacks. Georgios Kambourakis, Tassos Moschos, Dimitris Geneiatakis, Stefanos Gritzalis |
| 2007 | Efficient Access Control for Secure XML Query Processing in Data Streams. Dong Chan An, Seog Park |
| 2007 | Expert System CRIPS: Support of Situation Assessment and Decision Making. Hermann Dellwing, Walter Schmitz |
| 2007 | ICT Vulnerabilities of the Power Grid: Towards a Road Map for Future Research. Alberto Stefanini, Gerard Doorman, Nouredine Hadjsaid |
| 2007 | Ideal Based Cyber Security Technical Metrics for Control Systems. Wayne F. Boyer, Miles A. McQueen |
| 2007 | Intra Autonomous System Overlay Dedicated to Communication Resilience. Simon Delamare, Gwendal Le Grand |
| 2007 | LoRDAS: A Low-Rate DoS Attack against Application Servers. Gabriel Maciá-Fernández, Jesús Esteban Díaz Verdejo, Pedro Garcia-Teodoro, Francisco de Toro-Negro |
| 2007 | Managing Critical Infrastructures through Virtual Network Communities. Fabrizio Baiardi, Gaspare Sala, Daniele Sgandurra |
| 2007 | Modeling and Simulating Information Security Management. Jose M. Sarriegi, Javier Santos, José Manuel Torres, David Imizcoz, Elyoenai Egozcue, Daniel Liberal |
| 2007 | Securing Agents against Malicious Host in an Intrusion Detection System. Rafael Páez, Joan Tomàs-Buliart, Jordi Forné, Miguel Soriano |
| 2007 | The Structure of the Sense of Security, Anshin. Yuko Murayama, Natsuko Hikage, Yasuhiro Fujihara, Carl Hauser |
| 2007 | Towards a European Research Agenda for CIIP: Results from the CI Uwe Bendisch, Sandro Bologna, Gwendal Le Grand, Eric A. M. Luiijf |
| 2007 | Towards a Standardised Cross-Sector Information Exchange on Present Risk Factors. Felix Flentge, Césaire Beyel, Erich Rome |
| 2007 | UML Diagrams Supporting Domain Specification Inside the CRUTIAL Project. Davide Cerotti, Daniele Codetta Raiteri, Susanna Donatelli, Claudio Brasca, Giovanna Dondossola, Fabrizio Garrone |
| 2007 | Using Dependent CORAS Diagrams to Analyse Mutual Dependency. Gyrd Brændeland, Heidi E. I. Dahl, Iselin Engan, Ketil Stølen |