FEEDBACK Smiley face
Critical Information Infrastructures Security 4th International Workshop, CRITIS 2009, Bonn, Germany, September 30 - October 2, 2009. Revised Papers / [electronic resource] : edited by Erich Rome, Robin Bloomfield. - XII, 213 p. 70 illus. online resource. - Lecture Notes in Computer Science, 6027 0302-9743 ; . - Lecture Notes in Computer Science, 6027 .

On Modelling of Inter-dependent Network Infrastructures by Extended Leontief Models -- Critical Infrastructure Protection in Brazil - Threat Identification and Analysis -- Development of Information Security-Focused Incident Prevention Measures for Critical Information Infrastructure in Japan -- Design of a Mobile Agent-Based Adaptive Communication Middleware for Federations of Critical Infrastructure Simulations -- An Alternate Topology Generator for Joint Study of Power Grids and Communication Networks -- Trouble Brewing: Using Observations of Invariant Behavior to Detect Malicious Agency in Distributed Control Systems -- Optimisation of Critical Infrastructure Protection: The SiVe Project on Airport Security -- Cyber-Critical Infrastructure Protection Using Real-Time Payload-Based Anomaly Detection -- Decision Aid Tool and Ontology-Based Reasoning for Critical Infrastructure Vulnerabilities and Threats Analysis -- Application Filters for TCP/IP Industrial Automation Protocols -- Web Browser Security Update Effectiveness -- State-Based Network Intrusion Detection Systems for SCADA Protocols: A Proof of Concept -- Towards Early Warning Systems – Challenges, Technologies and Architecture -- CII Protection - Lessons for Developing Countries: South Africa as a Case Study -- Energy Theft in the Advanced Metering Infrastructure -- Current Capabilities, Requirements and a Proposed Strategy for Interdependency Analysis in the UK -- Stochastic Modelling of the Effects of Interdependencies between Critical Infrastructure.


10.1007/978-3-642-14379-3 doi

Computer science.
Computer software--Reusability.
Computer communication systems.
Special purpose computers.
Data encryption (Computer science).
Management information systems.
Computer Science.
Computer Communication Networks.
Performance and Reliability.
Theory of Computation.
Management of Computing and Information Systems.
Data Encryption.
Special Purpose and Application-Based Systems.



© IIIT-Delhi, 2013 | Phone: +91-11-26907510| FAX +91-11-26907405 | E-mail: