Critical Information Infrastructures Security Second International Workshop, CRITIS 2007, Benalmadena-Costa, Spain, October 3-5, 2007 /
This book constitutes the thoroughly refereed post-conference proceedings of the Second International Workshop on Critical Information Infrastructures Security, CRITIS 2007, held in Benalmadena-Costa, Spain, in October 2007 in conjunction with ITCIP 2007, the first conference on Information Technolo...
        Na minha lista:
      
    
                  | Autor Corporativo: | |
|---|---|
| Outros Autores: | |
| Formato: | Recurso Eletrônico livro eletrônico | 
| Idioma: | English | 
| Publicado em: | Berlin, Heidelberg :
        Springer Berlin Heidelberg : Imprint: Springer,
    
      2008. | 
| Edição: | 1st ed. 2008. | 
| coleção: | Security and Cryptology ;
              5141 | 
| Assuntos: | |
| Acesso em linha: | https://doi.org/10.1007/978-3-540-89173-4 | 
| Tags: | Adicionar Tag 
      Sem tags, seja o primeiro a adicionar uma tag!
   | 
                Sumário: 
            
                  - Session 1: R&D Agenda
- Towards a European Research Agenda for CIIP: Results from the CI2RCO Project
- ICT Vulnerabilities of the Power Grid: Towards a Road Map for Future Research
- Session 2: Communication Risk and Assurance I
- An Analysis of Cyclical Interdependencies in Critical Infrastructures
- A Framework for 3D Geospatial Buffering of Events of Interest in Critical Infrastructures
- Designing Information System Risk Management Framework Based on the Past Major Failures in the Japanese Financial Industry
- Advanced Reaction Using Risk Assessment in Intrusion Detection Systems
- Session 3: Communication Risk and Assurance II
- Managing Critical Infrastructures through Virtual Network Communities
- The Structure of the Sense of Security, Anshin
- Securing Agents against Malicious Host in an Intrusion Detection System
- Session 4: Code of Practice and Metrics
- UML Diagrams Supporting Domain Specification Inside the CRUTIAL Project
- Expert System CRIPS: Support of Situation Assessment and Decision Making
- Using Dependent CORAS Diagrams to Analyse Mutual Dependency
- A Methodology to Estimate Input-Output Inoperability Model Parameters
- Session 5: Information Sharing and Exchange
- Efficient Access Control for Secure XML Query Processing in Data Streams
- An Approach to Trust Management Challenges for Critical Infrastructures
- Session 6: Continuity of Services and Resiliency
- Detecting DNS Amplification Attacks
- LoRDAS: A Low-Rate DoS Attack against Application Servers
- Intra Autonomous System Overlay Dedicated to Communication Resilience
- A Proposal for the Definition of Operational Plans to Provide Dependability and Security
- Session 7: SCADA and Embedded Security
- Application of Kohonen Maps to Improve Security Tests on Automation Devices
- Ideal Based Cyber Security Technical Metrics for Control Systems
- Designing Critical Infrastructure Cyber Security Segmentation Architecture by Balancing Security with Reliability and Availability
- Session 8: Threats and Attacks Modeling
- A General Model and Guidelines for Attack Manifestation Generation
- A Survey on Detection Techniques to Prevent Cross-Site Scripting Attacks on Current Web Applications
- Attack Modeling of SIP-Oriented SPIT
- A Malware Detector Placement Game for Intrusion Detection
- Session 9: Information Exchange and Modelling
- Modeling and Simulating Information Security Management
- Design of a Platform for Information Exchange on Protection of Critical Infrastructures
- Towards a Standardised Cross-Sector Information Exchange on Present Risk Factors.



