


default search action
CRITIS 2012: Lillehammer, Norway
- Bernhard M. Hämmerli, Nils Kalstad Svendsen, Javier López

:
Critical Information Infrastructures Security - 7th International Workshop, CRITIS 2012, Lillehammer, Norway, September 17-18, 2012, Revised Selected Papers. Lecture Notes in Computer Science 7722, Springer 2013, ISBN 978-3-642-41484-8
Session 1: Intrusion Management
- Björn-C. Bösch:

Approach to Enhance the Efficiency of Security Operation Centers to Heterogeneous IDS Landscapes. 1-9 - Luigi Coppolino

, Salvatore D'Antonio, Valerio Formicola
, Luigi Romano:
Enhancing SIEM Technology to Protect Critical Infrastructures. 10-21 - Cristina Alcaraz

, Meltem Sönmez Turan:
PDR: A Prevention, Detection and Response Mechanism for Anomalies in Energy Control Systems. 22-33
Session 2: Smart Metering and Grid
- Massimiliano Raciti, Simin Nadjm-Tehrani:

Embedded Cyber-Physical Anomaly Detection in Smart Meters. 34-45 - Ondrej Linda, Milos Manic, Miles McQueen:

Improving Control System Cyber-State Awareness Using Known Secure Sensor Measurements. 46-58 - Stephen Jackson, Bruce M. McMillin

:
The Effects of Network Link Unreliability for Leader Election Algorithm in a Smart Grid System. 59-70 - Antonio Scala

, Mario Mureddu
, Alessandro Chessa, Guido Caldarelli
, Alfonso Damiano
:
Distributed Generation and Resilience in Power Grids. 71-79 - Thomas P. Roth, Bruce M. McMillin

:
Breaking Nondeducible Attacks on the Smart Grid. 80-91
Session 3: Analysis and Modeling
- Dale Fitch

, Sahra Sedigh
, Bruce M. McMillin
, Ravi Akella:
CPS-CSH Cyber-Physical Analysis and Design. 92-105 - Manuel Cheminod, Ivan Cibrario Bertolotti, Luca Durante

, Adriano Valenzano:
Modeling Emergency Response Plans with Coloured Petri Nets. 106-117
Session 4: SCADA
- Görkem Kilinç

, Igor Nai Fovino:
Distributed Identity Based Private Key Generation for SCADA Systems. 118-129 - David Guidry, Mike Burmester, Xiuwen Liu, Jonathan Jenkins, Sean Easton, Xin Yuan:

A Trusted Computing Architecture for Secure Substation Automation. 130-142
Session 5: Cyber Issues
- Emmanouela Stachtiari, Yannis Soupionis, Panagiotis Katsaros

, Anakreontas Mentis, Dimitris Gritzalis:
Probabilistic Model Checking of CAPTCHA Admission Control for DoS Resistant Anti-SPIT Protection. 143-154 - Adedayo Oyelakin Adetoye, Sadie Creese, Michael Goldsmith:

Reasoning about Vulnerabilities in Dependent Information Infrastructures: A Cyber Range Experiment. 155-167
Session 6: CI Analysis
- Thomas Richard McEvoy

, Stephen D. Wolthusen:
Algebraic Analysis of Attack Impacts and Countermeasures in Critical Infrastructures. 168-179 - Angelo Alessandri

, Roberto Filippini:
Evaluation of Resilience of Interconnected Systems Based on Stability Analysis. 180-190
Session 7: CIP Sectors
- Maria Carla De Maggio, Roberto Setola

:
System Dynamics for Railway Infrastructure Protection. 191-202 - Demetrios G. Eliades

, Marios M. Polycarpou:
Contaminant Detection in Urban Water Distribution Networks Using Chlorine Measurements. 203-214 - Peter Schoo, Manfred Schäfer, André Egners, Hans Hofinger, Sascha Wessel, Marián Kühnel, Sascha Todt, Michael Montag:

Collaboration between Competing Mobile Network Operators to Improve CIIP. 215-227
Session 8: CI Assessment
- Béla Genge, Christos Siaterlis, Marc Hohenadel:

AMICI: An Assessment Platform for Multi-domain Security Experimentation on Critical Infrastructures. 228-239 - Mats B.-O. Larsson, Gunnar Björkman, Mathias Ekstedt:

Assessment of Social Impact Costs and Social Impact Magnitude from Breakdowns in Critical Infrastructures. 240-251
Session 9: Threat Modeling
- Cen Nan, Irene Eusgeld, Wolfgang Kröger:

Hidden Vulnerabilities Due to Interdependencies between Two Systems. 252-263 - Inger Anne Tøndel, Martin Gilje Jaatun

, Maria Bartnes Line:
Threat Modeling of AMI. 264-275

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














