Conferences in DBLP
(critis) 2007 (conf/critis/2007)
Towards a European Research Agenda for CIIP: Results from the CI2 RCO Project. [Citation Graph (, )][DBLP ] ICT Vulnerabilities of the Power Grid: Towards a Road Map for Future Research. [Citation Graph (, )][DBLP ] An Analysis of Cyclical Interdependencies in Critical Infrastructures. [Citation Graph (, )][DBLP ] A Framework for 3D Geospatial Buffering of Events of Interest in Critical Infrastructures. [Citation Graph (, )][DBLP ] Designing Information System Risk Management Framework Based on the Past Major Failures in the Japanese Financial Industry. [Citation Graph (, )][DBLP ] Advanced Reaction Using Risk Assessment in Intrusion Detection Systems. [Citation Graph (, )][DBLP ] Managing Critical Infrastructures through Virtual Network Communities. [Citation Graph (, )][DBLP ] The Structure of the Sense of Security, Anshin. [Citation Graph (, )][DBLP ] Securing Agents against Malicious Host in an Intrusion Detection System. [Citation Graph (, )][DBLP ] UML Diagrams Supporting Domain Specification Inside the CRUTIAL Project. [Citation Graph (, )][DBLP ] Expert System CRIPS: Support of Situation Assessment and Decision Making. [Citation Graph (, )][DBLP ] Using Dependent CORAS Diagrams to Analyse Mutual Dependency. [Citation Graph (, )][DBLP ] A Methodology to Estimate Input-Output Inoperability Model Parameters. [Citation Graph (, )][DBLP ] Efficient Access Control for Secure XML Query Processing in Data Streams. [Citation Graph (, )][DBLP ] An Approach to Trust Management Challenges for Critical Infrastructures. [Citation Graph (, )][DBLP ] Detecting DNS Amplification Attacks. [Citation Graph (, )][DBLP ] LoRDAS: A Low-Rate DoS Attack against Application Servers. [Citation Graph (, )][DBLP ] Intra Autonomous System Overlay Dedicated to Communication Resilience. [Citation Graph (, )][DBLP ] A Proposal for the Definition of Operational Plans to Provide Dependability and Security. [Citation Graph (, )][DBLP ] Application of Kohonen Maps to Improve Security Tests on Automation Devices. [Citation Graph (, )][DBLP ] Ideal Based Cyber Security Technical Metrics for Control Systems. [Citation Graph (, )][DBLP ] Designing Critical Infrastructure Cyber Security Segmentation Architecture by Balancing Security with Reliability and Availability. [Citation Graph (, )][DBLP ] A General Model and Guidelines for Attack Manifestation Generation. [Citation Graph (, )][DBLP ] A Survey on Detection Techniques to Prevent Cross-Site Scripting Attacks on Current Web Applications. [Citation Graph (, )][DBLP ] Attack Modeling of SIP-Oriented SPIT. [Citation Graph (, )][DBLP ] A Malware Detector Placement Game for Intrusion Detection. [Citation Graph (, )][DBLP ] Modeling and Simulating Information Security Management. [Citation Graph (, )][DBLP ] Design of a Platform for Information Exchange on Protection of Critical Infrastructures. [Citation Graph (, )][DBLP ] Towards a Standardised Cross-Sector Information Exchange on Present Risk Factors. [Citation Graph (, )][DBLP ]