The SCEAS System
Navigation Menu

Conferences in DBLP

(critis)
2007 (conf/critis/2007)


  1. Towards a European Research Agenda for CIIP: Results from the CI2RCO Project. [Citation Graph (, )][DBLP]


  2. ICT Vulnerabilities of the Power Grid: Towards a Road Map for Future Research. [Citation Graph (, )][DBLP]


  3. An Analysis of Cyclical Interdependencies in Critical Infrastructures. [Citation Graph (, )][DBLP]


  4. A Framework for 3D Geospatial Buffering of Events of Interest in Critical Infrastructures. [Citation Graph (, )][DBLP]


  5. Designing Information System Risk Management Framework Based on the Past Major Failures in the Japanese Financial Industry. [Citation Graph (, )][DBLP]


  6. Advanced Reaction Using Risk Assessment in Intrusion Detection Systems. [Citation Graph (, )][DBLP]


  7. Managing Critical Infrastructures through Virtual Network Communities. [Citation Graph (, )][DBLP]


  8. The Structure of the Sense of Security, Anshin. [Citation Graph (, )][DBLP]


  9. Securing Agents against Malicious Host in an Intrusion Detection System. [Citation Graph (, )][DBLP]


  10. UML Diagrams Supporting Domain Specification Inside the CRUTIAL Project. [Citation Graph (, )][DBLP]


  11. Expert System CRIPS: Support of Situation Assessment and Decision Making. [Citation Graph (, )][DBLP]


  12. Using Dependent CORAS Diagrams to Analyse Mutual Dependency. [Citation Graph (, )][DBLP]


  13. A Methodology to Estimate Input-Output Inoperability Model Parameters. [Citation Graph (, )][DBLP]


  14. Efficient Access Control for Secure XML Query Processing in Data Streams. [Citation Graph (, )][DBLP]


  15. An Approach to Trust Management Challenges for Critical Infrastructures. [Citation Graph (, )][DBLP]


  16. Detecting DNS Amplification Attacks. [Citation Graph (, )][DBLP]


  17. LoRDAS: A Low-Rate DoS Attack against Application Servers. [Citation Graph (, )][DBLP]


  18. Intra Autonomous System Overlay Dedicated to Communication Resilience. [Citation Graph (, )][DBLP]


  19. A Proposal for the Definition of Operational Plans to Provide Dependability and Security. [Citation Graph (, )][DBLP]


  20. Application of Kohonen Maps to Improve Security Tests on Automation Devices. [Citation Graph (, )][DBLP]


  21. Ideal Based Cyber Security Technical Metrics for Control Systems. [Citation Graph (, )][DBLP]


  22. Designing Critical Infrastructure Cyber Security Segmentation Architecture by Balancing Security with Reliability and Availability. [Citation Graph (, )][DBLP]


  23. A General Model and Guidelines for Attack Manifestation Generation. [Citation Graph (, )][DBLP]


  24. A Survey on Detection Techniques to Prevent Cross-Site Scripting Attacks on Current Web Applications. [Citation Graph (, )][DBLP]


  25. Attack Modeling of SIP-Oriented SPIT. [Citation Graph (, )][DBLP]


  26. A Malware Detector Placement Game for Intrusion Detection. [Citation Graph (, )][DBLP]


  27. Modeling and Simulating Information Security Management. [Citation Graph (, )][DBLP]


  28. Design of a Platform for Information Exchange on Protection of Critical Infrastructures. [Citation Graph (, )][DBLP]


  29. Towards a Standardised Cross-Sector Information Exchange on Present Risk Factors. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002