default search action
CRITIS 2017: Lucca, Italy
- Gregorio D'Agostino, Antonio Scala:
Critical Information Infrastructures Security - 12th International Conference, CRITIS 2017, Lucca, Italy, October 8-13, 2017, Revised Selected Papers. Lecture Notes in Computer Science 10707, Springer 2018, ISBN 978-3-319-99842-8 - Zejun Yang, José R. Martí:
Resilience of Electrical Distribution Systems with Critical Load Prioritization. 1-12 - Laura Petersen, Laure Fallou, Elisabete Carreira, Andrei Utkin:
Public Tolerance Levels of Transportation Resilience: A Focus on the Oresund Region Within the IMPROVER Project. 13-24 - Jingquan Xie, Betim Sojeva, Erich Rome, Daniel Lückerath:
Towards a Common Vocabulary for Crisis Management Scenarios. 25-36 - Georgia Lykou, George Iakovakis, George Chronis, Dimitris Gritzalis:
Analysis and Classification of Adaptation Tools for Transport Sector Adaptation Planning. 37-47 - Chih-Yuan Lin, Simin Nadjm-Tehrani, Mikael Asplund:
Timing-Based Anomaly Detection in SCADA Networks. 48-59 - Alberto Tofani, Gregorio D'Agostino, Antonio Di Pietro, Giacomo Onori, Maurizio Pollino, Silvio Alessandroni, Vittorio Rosato:
Operational Resilience Metrics for a Complex Electrical Network. 60-71 - Steffen O. P. Blume, Giovanni Sansavini:
The Influence of Load Characteristics on Early Warning Signs in Power Systems. 72-83 - Simeone Chianese, Armando Di Nardo, Michele Di Natale, Carlo Giudicianni, Dino Musmarra, Giovanni Francesco Santonastaso:
DMA Optimal Layout for Protection of Water Distribution Networks from Malicious Attack. 84-96 - Anna Bozza, Domenico Asprone, Fulvio Parisi, Gaetano Manfredi:
Role of Urban Interactions and Damage in Seismic Resilience of Historical Centers. 97-106 - Nikolaos Alexopoulos, Emmanouil Vasilomanolakis, Natália Réka Ivánkó, Max Mühlhäuser:
Towards Blockchain-Based Collaborative Intrusion Detection Systems. 107-118 - Juan E. Rubio, Rodrigo Roman, Javier López:
Analysis of Cybersecurity Threats in Industry 4.0: The Case of Intrusion Detection. 119-130 - James G. Wright, Stephen D. Wolthusen:
De-Synchronisation Attack Modelling in Real-Time Protocols Using Queue Networks: Attacking the ISO/IEC 61850 Substation Automation Protocol. 131-143 - Stefano Starita, Annunziata Esposito Amideo, Maria Paola Scaparra:
Assessing Urban Rail Transit Systems Vulnerability: Metrics vs. Interdiction Models. 144-155 - Michael J. Rausch, Ken Keefe, Brett Feddersen, William H. Sanders:
Automatically Generating Security Models from System Models to Aid in the Evaluation of AMI Deployment Options. 156-167 - Alex Coletti, Antonio De Nicola, Giordano Vicoli, Maria Luisa Villani:
A Gamified Approach to Participatory Modelling of Water System Risks. 168-180 - Dominique Wassermann, Andrea Antenucci, Giovanni Sansavini:
Managing Gas and Electric Power Network Dependencies to secure Energy Supply: Application to the UK System. 181-184 - Aljoscha Lautenbach, Magnus Almgren, Tomas Olovsson:
What the Stack? On Memory Exploitation and Protection in Resource Constrained Automotive Systems. 185-193 - Mohamad Gharib, Paolo Lollini, Andrea Ceccarelli, Andrea Bondavalli:
Dealing with Functional Safety Requirements for Automotive Systems: A Cyber-Physical-Social Approach. 194-206 - Pol Van Aubel, Kostas Papagiannopoulos, Lukasz Chmielewski, Christian Doerr:
Side-Channel Based Intrusion Detection for Industrial Control Systems. 207-224 - Laurens Lemaire, Jan Vossaert, Bart De Decker, Vincent Naessens:
Security Evaluation of Cyber-Physical Systems Using Automatically Generated Attack Trees. 225-228 - Federica Inderst, Gabriele Oliva, Stefano Panzieri, Federica Pascucci, Roberto Setola:
Faulty or Malicious Anchor Detection Criteria for Distance-Based Localization. 229-240 - Yeop Chang, Seungoh Choi, Jeong-Han Yun, Sin-Kyu Kim:
One Step More: Automatic ICS Protocol Field Analysis. 241-252 - Vincenzo Fioriti, Ivan Roselli, Angelo Tatì, Roberto Romano, Gerardo De Canio:
Motion Magnification for Urban Buildings. 253-260 - Gianpiero Costantino, Fabio Martinelli, Ilaria Matteucci:
Reputation Systems to Mitigate DoS Attack in Vehicular Network. 261-265 - Paul Berthier, Corentin Bresteau, José M. Fernandez:
On the Security of Aircraft Communication Networks. 266-269
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.