CRITIS C

31 papers

YearTitle / Authors
2017Critical Information Infrastructures Security - 11th International Conference, CRITIS 2016, Paris, France, October 10-12, 2016, Revised Selected Papers
Grigore M. Havârneanu, Roberto Setola, Hypatia Nassopoulos, Stephen D. Wolthusen
2016A Case Study Assessing the Effects of Cyber Attacks on a River Zonal Dispatcher.
Ronald Joseph Wright, Ken Keefe, Brett Feddersen, William H. Sanders
2016A Dataset to Support Research in the Design of Secure Water Treatment Systems.
Jonathan Goh, Sridhar Adepu, Khurum Nazir Junejo, Aditya Mathur
2016A Methodology for Monitoring and Control Network Design.
István Kiss, Béla Genge
2016A Six-Step Model for Safety and Security Analysis of Cyber-Physical Systems.
Giedre Sabaliauskaite, Sridhar Adepu, Aditya Mathur
2016A Synthesis of Optimization Approaches for Tackling Critical Information Infrastructure Survivability.
Annunziata Esposito Amideo, Maria Paola Scaparra
2016Access Control and Availability Vulnerabilities in the ISO/IEC 61850 Substation Automation Protocol.
James G. Wright, Stephen D. Wolthusen
2016An Operator-Driven Approach for Modeling Interdependencies in Critical Infrastructures Based on Critical Services and Sectors.
Elisa Canzani, Helmut Kaufmann, Ulrike Lechner
2016Availability Study of the Italian Electricity SCADA System in the Cloud.
Stefano Sebastio, Antonio Scala, Gregorio D'Agostino
2016Behavioral Intentions and Threat Perception During Terrorist, Fire and Earthquake Scenarios.
Simona A. Popusoi, Cornelia Mairean, Grigore M. Havârneanu
2016Cyber Security Investment in the Context of Disruptive Technologies: Extension of the Gordon-Loeb Model and Application to Critical Infrastructure Protection.
Dimitri Percia David, Marcus Matthias Keupp, Solange Ghernaouti, Alain Mermoud
2016Cyber Targets Water Management.
Pieter Burghouwt, Marinus Maris, Sjaak van Peski, Eric A. M. Luiijf, Imelda van de Voorde, Marcel E. M. Spruit
2016Developing a Cyber Incident Communication Management Exercise for CI Stakeholders.
Tomomi Aoyama, Kenji Watanabe, Ichiro Koshijima, Yoshihiro Hashimoto
2016Domain Specific Stateful Filtering with Worst-Case Bandwidth.
Maxime Puys, Jean-Louis Roch, Marie-Laure Potet
2016Dynamic Risk Analyses and Dependency-Aware Root Cause Model for Critical Infrastructures.
Steve Muller, Carlo Harpes, Yves Le Traon, Sylvain Gombault, Jean-Marie Bonnin, Paul Hoffmann
2016Effective Defence Against Zero-Day Exploits Using Bayesian Networks.
Tingting Li, Chris Hankin
2016Human Vulnerability Mapping Facing Critical Service Disruptions for Crisis Managers.
Amélie Grangeat, Julie Sina, Vittorio Rosato, Aurélia Bony, Marianthi Theocharidou
2016Integrated Safety and Security Risk Assessment Methods: A Survey of Key Characteristics and Applications.
Sabarathinam Chockalingam, Dina Hadziosmanovic, Wolter Pieters, André Teixeira, Pieter H. A. J. M. van Gelder
2016On Auxiliary Entity Allocation Problem in Multi-layered Interdependent Critical Infrastructures.
Joydeep Banerjee, Arunabha Sen, Chenyang Zhou
2016Power Auctioning in Resource Constrained Micro-grids: Cases of Cheating.
Anesu M. C. Marufu, Anne V. D. M. Kayem, Stephen D. Wolthusen
2016Railway Station Surveillance System Design: A Real Application of an Optimal Coverage Approach.
Francesca De Cillis, Stefano De Muro, Franco Fiumara, Roberto Setola, Antonio Sforza, Claudio Sterle
2016Railway System Failure Scenario Analysis.
William G. Temple, Yuan Li, Bao Anh N. Tran, Yan Liu, Binbin Chen
2016Reliable Key Distribution in Smart Micro-Grids.
Heinrich Strauss, Anne V. D. M. Kayem, Stephen D. Wolthusen
2016Securing SCADA Critical Network Against Internal and External Threats - Short Paper.
Mounia El Anbal, Anas Abou El Kalam, Siham Benhadou, Fouad Moutaouakkil, Hicham Medromi
2016Security Validation for Data Diode with Reverse Channel.
Jeong-Han Yun, Yeop Chang, Kyoung-Ho Kim, Woonyon Kim
2016Selecting Privacy Solutions to Prioritise Control in Smart Metering Systems.
Juan E. Rubio, Cristina Alcaraz, Javier López
2016Simulation of Cascading Outages in (Inter)-Dependent Services and Estimate of Their Societal Consequences - Short Paper.
Antonio Di Pietro, Luigi La Porta, Luisa Lavalle, Maurizio Pollino, Vittorio Rosato, Alberto Tofani
2016Stealth Low-Level Manipulation of Programmable Logic Controllers I/O by Pin Control Exploitation.
Ali Abbasi, Majid Hashemi, Emmanuele Zambon, Sandro Etalle
2016Tamper Resistant Secure Digital Silo for Log Storage in Critical Infrastructures.
Khan Ferdous Wahid, Helmut Kaufmann, Kevin Jones
2016Towards a Cybersecurity Game: Operation Digital Chameleon.
Andreas Rieb, Ulrike Lechner
2016Using Incentives to Foster Security Information Sharing and Cooperation: A General Theory and Application to Critical Infrastructure Protection.
Alain Mermoud, Marcus Matthias Keupp, Solange Ghernaouti, Dimitri Percia David