The SCEAS System
Navigation Menu

Conferences in DBLP

(critis)
2006 (conf/critis/2006)

  1. Paulo Veríssimo, Nuno Ferreira Neves, Miguel Correia
    CRUTIAL: The Blueprint of a Reference Critical Information Infrastructure Architecture. [Citation Graph (0, 0)][DBLP]
    CRITIS, 2006, pp:1-14 [Conf]
  2. Per Mellstrand, Rune Gustavsson
    Experiment Based Validation of CIIP. [Citation Graph (0, 0)][DBLP]
    CRITIS, 2006, pp:15-29 [Conf]
  3. Syed Naqvi, Philippe Massonet, Alvaro Arenas
    Security Requirements Model for Grid Data Management Systems. [Citation Graph (0, 0)][DBLP]
    CRITIS, 2006, pp:30-41 [Conf]
  4. Fabrizio Baiardi, S. Suin, Claudio Telmon, M. Pioli
    Assessing the Risk of an Information Infrastructure Through Security Dependencies. [Citation Graph (0, 0)][DBLP]
    CRITIS, 2006, pp:42-54 [Conf]
  5. Yudistira Asnar, Paolo Giorgini
    Modelling Risk and Identifying Countermeasure in Organizations. [Citation Graph (0, 0)][DBLP]
    CRITIS, 2006, pp:55-66 [Conf]
  6. Roland Rieke
    Modelling and Analysing Network Security Policies in a Given Vulnerability Setting. [Citation Graph (0, 0)][DBLP]
    CRITIS, 2006, pp:67-78 [Conf]
  7. Jose J. Gonzalez, Jose Maria Sarriegi, Alazne Gurrutxaga
    A Framework for Conceptualizing Social Engineering Attacks. [Citation Graph (0, 0)][DBLP]
    CRITIS, 2006, pp:79-90 [Conf]
  8. Sandro Bologna, Giovanni Di Costanzo, Eric A. M. Luiijf, Roberto Setola
    An Overview of R&D Activities in Europe on Critical Information Infrastructure Protection (CIIP). [Citation Graph (0, 0)][DBLP]
    CRITIS, 2006, pp:91-102 [Conf]
  9. Karsten Bsufka, Olaf Kroll-Peters, Sahin Albayrak
    Intelligent Network-Based Early Warning Systems. [Citation Graph (0, 0)][DBLP]
    CRITIS, 2006, pp:103-111 [Conf]
  10. Urs E. Gattiker
    Can an Early Warning System for Home Users and SMEs Make a Difference? A Field Study. [Citation Graph (0, 0)][DBLP]
    CRITIS, 2006, pp:112-127 [Conf]
  11. Joaquín García-Alfaro, Sergio Castillo, Jordi Castellà-Roca, Guillermo Navarro, Joan Borrell
    Protection of Components Based on a Smart-Card Enhanced Security Module. [Citation Graph (0, 0)][DBLP]
    CRITIS, 2006, pp:128-139 [Conf]
  12. Yvo Desmedt, Yongge Wang, Mike Burmester
    Revisiting Colored Networks and Privacy Preserving Censorship. [Citation Graph (0, 0)][DBLP]
    CRITIS, 2006, pp:140-150 [Conf]
  13. Cristina Satizábal, Rafael Páez, Jordi Forné
    PROSEARCH: A Protocol to Simplify Path Discovery in Critical Scenarios. [Citation Graph (0, 0)][DBLP]
    CRITIS, 2006, pp:151-165 [Conf]
  14. Cristina Alcaraz, Rodrigo Roman
    Applying Key Infrastructures for Sensor Networks in CIP/CIIP Scenarios. [Citation Graph (0, 0)][DBLP]
    CRITIS, 2006, pp:166-178 [Conf]
  15. Efthimia Aivaloglou, Stefanos Gritzalis, Charalabos Skianis
    Trust Establishment in Ad Hoc and Sensor Networks. [Citation Graph (0, 0)][DBLP]
    CRITIS, 2006, pp:179-194 [Conf]
  16. Shiqun Li, Shane Balfe, Jianying Zhou, Kefei Chen
    Enforcing Trust in Pervasive Computing with Trusted Computing Technology. [Citation Graph (0, 0)][DBLP]
    CRITIS, 2006, pp:195-209 [Conf]
  17. M. Bermúdez-Edo, R. Salazar-Hernández, Jesús E. Díaz-Verdejo, Pedro Garcia-Teodoro
    Proposals on Assessment Environments for Anomaly-Based Network Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP]
    CRITIS, 2006, pp:210-221 [Conf]
  18. Salvatore D'Antonio, Francesco Oliviero, Roberto Setola
    High-Speed Intrusion Detection in Support of Critical Infrastructure Protection. [Citation Graph (0, 0)][DBLP]
    CRITIS, 2006, pp:222-234 [Conf]
  19. Ahto Buldas, Peeter Laud, Jaan Priisalu, Märt Saarepera, Jan Willemson
    Rational Choice of Security Measures Via Multi-parameter Attack Trees. [Citation Graph (0, 0)][DBLP]
    CRITIS, 2006, pp:235-248 [Conf]
  20. Daniel J. Martínez-Manzano, Gabriel López Millán, Antonio F. Gómez-Skarmeta
    Multidomain Virtual Security Negotiation over the Session Initiation Protocol (SIP). [Citation Graph (0, 0)][DBLP]
    CRITIS, 2006, pp:249-261 [Conf]
  21. Christos Xenakis, Lazaros F. Merakos
    Vulnerabilities and Possible Attacks Against the GPRS Backbone Network. [Citation Graph (0, 0)][DBLP]
    CRITIS, 2006, pp:262-272 [Conf]
  22. Vassilios Stathopoulos, Panayiotis Kotzanikolaou, Emmanouil Magkos
    A Framework for Secure and Verifiable Logging in Public Communication Networks. [Citation Graph (0, 0)][DBLP]
    CRITIS, 2006, pp:273-284 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002