The SCEAS System
Navigation Menu

Conferences in DBLP

(critis)
2008 (conf/critis/2008)


  1. Blackouts in Power Transmission Networks Due to Spatially Localized Load Anomalies. [Citation Graph (, )][DBLP]


  2. Stability of a Distributed Generation Network Using the Kuramoto Models. [Citation Graph (, )][DBLP]


  3. Enabling System of Systems Analysis of Critical Infrastructure Behaviors. [Citation Graph (, )][DBLP]


  4. Information Modelling and Simulation in Large Interdependent Critical Infrastructures in IRRIIS. [Citation Graph (, )][DBLP]


  5. Multi-level Dependability Modeling of Interdependencies between the Electricity and Information Infrastructures. [Citation Graph (, )][DBLP]


  6. Interdependency Analysis in Electric Power Systems. [Citation Graph (, )][DBLP]


  7. Modeling and Simulation of Complex Interdependent Systems: A Federated Agent-Based Approach. [Citation Graph (, )][DBLP]


  8. Self-healing and Resilient Critical Infrastructures. [Citation Graph (, )][DBLP]


  9. Critical Infrastructures Security Modeling, Enforcement and Runtime Checking. [Citation Graph (, )][DBLP]


  10. INcreasing Security and Protection through Infrastructure REsilience: The INSPIRE Project. [Citation Graph (, )][DBLP]


  11. Increase of Power System Survivability with the Decision Support Tool CRIPS Based on Network Planning and Simulation Program PSS®SINCAL. [Citation Graph (, )][DBLP]


  12. Information Modelling and Simulation in Large Dependent Critical Infrastructures - An Overview on the European Integrated Project IRRIIS. [Citation Graph (, )][DBLP]


  13. Assessment of Structural Vulnerability for Power Grids by Network Performance Based on Complex Networks. [Citation Graph (, )][DBLP]


  14. Using Centrality Measures to Rank the Importance of the Components of a Complex Network Infrastructure. [Citation Graph (, )][DBLP]


  15. RadialNet: An Interactive Network Topology Visualization Tool with Visual Auditing Support. [Citation Graph (, )][DBLP]


  16. Quantitative Security Risk Assessment and Management for Railway Transportation Infrastructures. [Citation Graph (, )][DBLP]


  17. Assessing and Improving SCADA Security in the Dutch Drinking Water Sector. [Citation Graph (, )][DBLP]


  18. Analysis of Malicious Traffic in Modbus/TCP Communications. [Citation Graph (, )][DBLP]


  19. Scada Malware, a Proof of Concept. [Citation Graph (, )][DBLP]


  20. Testbeds for Assessing Critical Scenarios in Power Control Systems. [Citation Graph (, )][DBLP]


  21. A Structured Approach to Incident Response Management in the Oil and Gas Industry. [Citation Graph (, )][DBLP]


  22. Security Strategy Analysis for Critical Information Infrastructures. [Citation Graph (, )][DBLP]


  23. Emerging Information Infrastructures: Cooperation in Disasters. [Citation Graph (, )][DBLP]


  24. Service Modeling Language Applied to Critical Infrastructure. [Citation Graph (, )][DBLP]


  25. Graded Security Expert System. [Citation Graph (, )][DBLP]


  26. Protection of Mobile Agents Execution Using a Modified Self-Validating Branch-Based Software Watermarking with External Sentinel. [Citation Graph (, )][DBLP]


  27. Adaptation of Modelling Paradigms to the CIs Interdependencies Problem. [Citation Graph (, )][DBLP]


  28. Empirical Findings on Critical Infrastructure Dependencies in Europe. [Citation Graph (, )][DBLP]


  29. Dependent Automata for the Modelling of Dependencies. [Citation Graph (, )][DBLP]


  30. Application of IPK (Information, Preferences, Knowledge) Paradigm for the Modelling of Precautionary Principle Based Decision-Making. [Citation Graph (, )][DBLP]


  31. Disaster Propagation in Heterogeneous Media via Markovian Agents. [Citation Graph (, )][DBLP]


  32. A Study on Multiformalism Modeling of Critical Infrastructures. [Citation Graph (, )][DBLP]


  33. Simulation of Critical ICT Infrastructure for Municipal Crisis Management. [Citation Graph (, )][DBLP]


  34. An Ontology-Based Approach to Blind Spot Revelation in Critical Infrastructure Protection Planning. [Citation Graph (, )][DBLP]


  35. Security of Water Infrastructure Systems. [Citation Graph (, )][DBLP]


  36. Critical Infrastructures as Complex Systems: A Multi-level Protection Architecture. [Citation Graph (, )][DBLP]


  37. Challenges Concerning the Energy-Dependency of the Telecom Infrastructure. [Citation Graph (, )][DBLP]


  38. An Effective Approach for Cascading Effects Prevision in Critical Infrastructures. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002