


default search action
CRITIS 2017: Lucca, Italy
- Gregorio D'Agostino, Antonio Scala

:
Critical Information Infrastructures Security - 12th International Conference, CRITIS 2017, Lucca, Italy, October 8-13, 2017, Revised Selected Papers. Lecture Notes in Computer Science 10707, Springer 2018, ISBN 978-3-319-99842-8 - Zejun Yang, José R. Martí:

Resilience of Electrical Distribution Systems with Critical Load Prioritization. 1-12 - Laura Petersen, Laure Fallou, Elisabete Carreira

, Andrei Utkin:
Public Tolerance Levels of Transportation Resilience: A Focus on the Oresund Region Within the IMPROVER Project. 13-24 - Jingquan Xie, Betim Sojeva, Erich Rome, Daniel Lückerath

:
Towards a Common Vocabulary for Crisis Management Scenarios. 25-36 - Georgia Lykou, George Iakovakis, George Chronis, Dimitris Gritzalis:

Analysis and Classification of Adaptation Tools for Transport Sector Adaptation Planning. 37-47 - Chih-Yuan Lin, Simin Nadjm-Tehrani, Mikael Asplund:

Timing-Based Anomaly Detection in SCADA Networks. 48-59 - Alberto Tofani, Gregorio D'Agostino, Antonio Di Pietro

, Giacomo Onori, Maurizio Pollino
, Silvio Alessandroni, Vittorio Rosato
:
Operational Resilience Metrics for a Complex Electrical Network. 60-71 - Steffen O. P. Blume, Giovanni Sansavini

:
The Influence of Load Characteristics on Early Warning Signs in Power Systems. 72-83 - Simeone Chianese

, Armando Di Nardo, Michele Di Natale, Carlo Giudicianni
, Dino Musmarra, Giovanni Francesco Santonastaso
:
DMA Optimal Layout for Protection of Water Distribution Networks from Malicious Attack. 84-96 - Anna Bozza

, Domenico Asprone
, Fulvio Parisi
, Gaetano Manfredi
:
Role of Urban Interactions and Damage in Seismic Resilience of Historical Centers. 97-106 - Nikolaos Alexopoulos, Emmanouil Vasilomanolakis

, Natália Réka Ivánkó, Max Mühlhäuser:
Towards Blockchain-Based Collaborative Intrusion Detection Systems. 107-118 - Juan E. Rubio, Rodrigo Roman, Javier López:

Analysis of Cybersecurity Threats in Industry 4.0: The Case of Intrusion Detection. 119-130 - James G. Wright, Stephen D. Wolthusen:

De-Synchronisation Attack Modelling in Real-Time Protocols Using Queue Networks: Attacking the ISO/IEC 61850 Substation Automation Protocol. 131-143 - Stefano Starita

, Annunziata Esposito Amideo
, Maria Paola Scaparra:
Assessing Urban Rail Transit Systems Vulnerability: Metrics vs. Interdiction Models. 144-155 - Michael J. Rausch, Ken Keefe, Brett Feddersen, William H. Sanders:

Automatically Generating Security Models from System Models to Aid in the Evaluation of AMI Deployment Options. 156-167 - Alex Coletti

, Antonio De Nicola
, Giordano Vicoli
, Maria Luisa Villani
:
A Gamified Approach to Participatory Modelling of Water System Risks. 168-180 - Dominique Wassermann, Andrea Antenucci, Giovanni Sansavini

:
Managing Gas and Electric Power Network Dependencies to secure Energy Supply: Application to the UK System. 181-184 - Aljoscha Lautenbach, Magnus Almgren

, Tomas Olovsson:
What the Stack? On Memory Exploitation and Protection in Resource Constrained Automotive Systems. 185-193 - Mohamad Gharib

, Paolo Lollini
, Andrea Ceccarelli
, Andrea Bondavalli
:
Dealing with Functional Safety Requirements for Automotive Systems: A Cyber-Physical-Social Approach. 194-206 - Pol Van Aubel, Kostas Papagiannopoulos, Lukasz Chmielewski, Christian Doerr:

Side-Channel Based Intrusion Detection for Industrial Control Systems. 207-224 - Laurens Lemaire, Jan Vossaert, Bart De Decker, Vincent Naessens:

Security Evaluation of Cyber-Physical Systems Using Automatically Generated Attack Trees. 225-228 - Federica Inderst, Gabriele Oliva, Stefano Panzieri, Federica Pascucci, Roberto Setola:

Faulty or Malicious Anchor Detection Criteria for Distance-Based Localization. 229-240 - Yeop Chang, Seungoh Choi, Jeong-Han Yun, Sin-Kyu Kim:

One Step More: Automatic ICS Protocol Field Analysis. 241-252 - Vincenzo Fioriti, Ivan Roselli

, Angelo Tatì
, Roberto Romano
, Gerardo De Canio:
Motion Magnification for Urban Buildings. 253-260 - Gianpiero Costantino, Fabio Martinelli, Ilaria Matteucci

:
Reputation Systems to Mitigate DoS Attack in Vehicular Network. 261-265 - Paul Berthier, Corentin Bresteau, José M. Fernandez:

On the Security of Aircraft Communication Networks. 266-269

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














