default search action
CRITIS 2012: Lillehammer, Norway
- Bernhard M. Hämmerli, Nils Kalstad Svendsen, Javier López:
Critical Information Infrastructures Security - 7th International Workshop, CRITIS 2012, Lillehammer, Norway, September 17-18, 2012, Revised Selected Papers. Lecture Notes in Computer Science 7722, Springer 2013, ISBN 978-3-642-41484-8
Session 1: Intrusion Management
- Björn-C. Bösch:
Approach to Enhance the Efficiency of Security Operation Centers to Heterogeneous IDS Landscapes. 1-9 - Luigi Coppolino, Salvatore D'Antonio, Valerio Formicola, Luigi Romano:
Enhancing SIEM Technology to Protect Critical Infrastructures. 10-21 - Cristina Alcaraz, Meltem Sönmez Turan:
PDR: A Prevention, Detection and Response Mechanism for Anomalies in Energy Control Systems. 22-33
Session 2: Smart Metering and Grid
- Massimiliano Raciti, Simin Nadjm-Tehrani:
Embedded Cyber-Physical Anomaly Detection in Smart Meters. 34-45 - Ondrej Linda, Milos Manic, Miles McQueen:
Improving Control System Cyber-State Awareness Using Known Secure Sensor Measurements. 46-58 - Stephen Jackson, Bruce M. McMillin:
The Effects of Network Link Unreliability for Leader Election Algorithm in a Smart Grid System. 59-70 - Antonio Scala, Mario Mureddu, Alessandro Chessa, Guido Caldarelli, Alfonso Damiano:
Distributed Generation and Resilience in Power Grids. 71-79 - Thomas P. Roth, Bruce M. McMillin:
Breaking Nondeducible Attacks on the Smart Grid. 80-91
Session 3: Analysis and Modeling
- Dale Fitch, Sahra Sedigh, Bruce M. McMillin, Ravi Akella:
CPS-CSH Cyber-Physical Analysis and Design. 92-105 - Manuel Cheminod, Ivan Cibrario Bertolotti, Luca Durante, Adriano Valenzano:
Modeling Emergency Response Plans with Coloured Petri Nets. 106-117
Session 4: SCADA
- Görkem Kilinç, Igor Nai Fovino:
Distributed Identity Based Private Key Generation for SCADA Systems. 118-129 - David Guidry, Mike Burmester, Xiuwen Liu, Jonathan Jenkins, Sean Easton, Xin Yuan:
A Trusted Computing Architecture for Secure Substation Automation. 130-142
Session 5: Cyber Issues
- Emmanouela Stachtiari, Yannis Soupionis, Panagiotis Katsaros, Anakreontas Mentis, Dimitris Gritzalis:
Probabilistic Model Checking of CAPTCHA Admission Control for DoS Resistant Anti-SPIT Protection. 143-154 - Adedayo Oyelakin Adetoye, Sadie Creese, Michael Goldsmith:
Reasoning about Vulnerabilities in Dependent Information Infrastructures: A Cyber Range Experiment. 155-167
Session 6: CI Analysis
- Thomas Richard McEvoy, Stephen D. Wolthusen:
Algebraic Analysis of Attack Impacts and Countermeasures in Critical Infrastructures. 168-179 - Angelo Alessandri, Roberto Filippini:
Evaluation of Resilience of Interconnected Systems Based on Stability Analysis. 180-190
Session 7: CIP Sectors
- Maria Carla De Maggio, Roberto Setola:
System Dynamics for Railway Infrastructure Protection. 191-202 - Demetrios G. Eliades, Marios M. Polycarpou:
Contaminant Detection in Urban Water Distribution Networks Using Chlorine Measurements. 203-214 - Peter Schoo, Manfred Schäfer, André Egners, Hans Hofinger, Sascha Wessel, Marián Kühnel, Sascha Todt, Michael Montag:
Collaboration between Competing Mobile Network Operators to Improve CIIP. 215-227
Session 8: CI Assessment
- Béla Genge, Christos Siaterlis, Marc Hohenadel:
AMICI: An Assessment Platform for Multi-domain Security Experimentation on Critical Infrastructures. 228-239 - Mats B.-O. Larsson, Gunnar Björkman, Mathias Ekstedt:
Assessment of Social Impact Costs and Social Impact Magnitude from Breakdowns in Critical Infrastructures. 240-251
Session 9: Threat Modeling
- Cen Nan, Irene Eusgeld, Wolfgang Kröger:
Hidden Vulnerabilities Due to Interdependencies between Two Systems. 252-263 - Inger Anne Tøndel, Martin Gilje Jaatun, Maria Bartnes Line:
Threat Modeling of AMI. 264-275
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.