| 2017 | Critical Information Infrastructures Security - 11th International Conference, CRITIS 2016, Paris, France, October 10-12, 2016, Revised Selected Papers Grigore M. Havârneanu, Roberto Setola, Hypatia Nassopoulos, Stephen D. Wolthusen |
| 2016 | A Case Study Assessing the Effects of Cyber Attacks on a River Zonal Dispatcher. Ronald Joseph Wright, Ken Keefe, Brett Feddersen, William H. Sanders |
| 2016 | A Dataset to Support Research in the Design of Secure Water Treatment Systems. Jonathan Goh, Sridhar Adepu, Khurum Nazir Junejo, Aditya Mathur |
| 2016 | A Methodology for Monitoring and Control Network Design. István Kiss, Béla Genge |
| 2016 | A Six-Step Model for Safety and Security Analysis of Cyber-Physical Systems. Giedre Sabaliauskaite, Sridhar Adepu, Aditya Mathur |
| 2016 | A Synthesis of Optimization Approaches for Tackling Critical Information Infrastructure Survivability. Annunziata Esposito Amideo, Maria Paola Scaparra |
| 2016 | Access Control and Availability Vulnerabilities in the ISO/IEC 61850 Substation Automation Protocol. James G. Wright, Stephen D. Wolthusen |
| 2016 | An Operator-Driven Approach for Modeling Interdependencies in Critical Infrastructures Based on Critical Services and Sectors. Elisa Canzani, Helmut Kaufmann, Ulrike Lechner |
| 2016 | Availability Study of the Italian Electricity SCADA System in the Cloud. Stefano Sebastio, Antonio Scala, Gregorio D'Agostino |
| 2016 | Behavioral Intentions and Threat Perception During Terrorist, Fire and Earthquake Scenarios. Simona A. Popusoi, Cornelia Mairean, Grigore M. Havârneanu |
| 2016 | Cyber Security Investment in the Context of Disruptive Technologies: Extension of the Gordon-Loeb Model and Application to Critical Infrastructure Protection. Dimitri Percia David, Marcus Matthias Keupp, Solange Ghernaouti, Alain Mermoud |
| 2016 | Cyber Targets Water Management. Pieter Burghouwt, Marinus Maris, Sjaak van Peski, Eric A. M. Luiijf, Imelda van de Voorde, Marcel E. M. Spruit |
| 2016 | Developing a Cyber Incident Communication Management Exercise for CI Stakeholders. Tomomi Aoyama, Kenji Watanabe, Ichiro Koshijima, Yoshihiro Hashimoto |
| 2016 | Domain Specific Stateful Filtering with Worst-Case Bandwidth. Maxime Puys, Jean-Louis Roch, Marie-Laure Potet |
| 2016 | Dynamic Risk Analyses and Dependency-Aware Root Cause Model for Critical Infrastructures. Steve Muller, Carlo Harpes, Yves Le Traon, Sylvain Gombault, Jean-Marie Bonnin, Paul Hoffmann |
| 2016 | Effective Defence Against Zero-Day Exploits Using Bayesian Networks. Tingting Li, Chris Hankin |
| 2016 | Human Vulnerability Mapping Facing Critical Service Disruptions for Crisis Managers. Amélie Grangeat, Julie Sina, Vittorio Rosato, Aurélia Bony, Marianthi Theocharidou |
| 2016 | Integrated Safety and Security Risk Assessment Methods: A Survey of Key Characteristics and Applications. Sabarathinam Chockalingam, Dina Hadziosmanovic, Wolter Pieters, André Teixeira, Pieter H. A. J. M. van Gelder |
| 2016 | On Auxiliary Entity Allocation Problem in Multi-layered Interdependent Critical Infrastructures. Joydeep Banerjee, Arunabha Sen, Chenyang Zhou |
| 2016 | Power Auctioning in Resource Constrained Micro-grids: Cases of Cheating. Anesu M. C. Marufu, Anne V. D. M. Kayem, Stephen D. Wolthusen |
| 2016 | Railway Station Surveillance System Design: A Real Application of an Optimal Coverage Approach. Francesca De Cillis, Stefano De Muro, Franco Fiumara, Roberto Setola, Antonio Sforza, Claudio Sterle |
| 2016 | Railway System Failure Scenario Analysis. William G. Temple, Yuan Li, Bao Anh N. Tran, Yan Liu, Binbin Chen |
| 2016 | Reliable Key Distribution in Smart Micro-Grids. Heinrich Strauss, Anne V. D. M. Kayem, Stephen D. Wolthusen |
| 2016 | Securing SCADA Critical Network Against Internal and External Threats - Short Paper. Mounia El Anbal, Anas Abou El Kalam, Siham Benhadou, Fouad Moutaouakkil, Hicham Medromi |
| 2016 | Security Validation for Data Diode with Reverse Channel. Jeong-Han Yun, Yeop Chang, Kyoung-Ho Kim, Woonyon Kim |
| 2016 | Selecting Privacy Solutions to Prioritise Control in Smart Metering Systems. Juan E. Rubio, Cristina Alcaraz, Javier López |
| 2016 | Simulation of Cascading Outages in (Inter)-Dependent Services and Estimate of Their Societal Consequences - Short Paper. Antonio Di Pietro, Luigi La Porta, Luisa Lavalle, Maurizio Pollino, Vittorio Rosato, Alberto Tofani |
| 2016 | Stealth Low-Level Manipulation of Programmable Logic Controllers I/O by Pin Control Exploitation. Ali Abbasi, Majid Hashemi, Emmanuele Zambon, Sandro Etalle |
| 2016 | Tamper Resistant Secure Digital Silo for Log Storage in Critical Infrastructures. Khan Ferdous Wahid, Helmut Kaufmann, Kevin Jones |
| 2016 | Towards a Cybersecurity Game: Operation Digital Chameleon. Andreas Rieb, Ulrike Lechner |
| 2016 | Using Incentives to Foster Security Information Sharing and Cooperation: A General Theory and Application to Critical Infrastructure Protection. Alain Mermoud, Marcus Matthias Keupp, Solange Ghernaouti, Dimitri Percia David |