Search dblp for Publications

export results for "toc:db/conf/ifip11-10/iccip2010.bht:"

 download as .bib file

@inproceedings{DBLP:conf/ifip11-10/AlvarezAMOTS10,
  author       = {Mar{\'{\i}}a Jes{\'{u}}s {\'{A}}lvarez and
                  Ainara Alvarez and
                  Maria Carla De Maggio and
                  Ainhoa Oses and
                  Marcella Trombetta and
                  Roberto Setola},
  editor       = {Tyler Moore and
                  Sujeet Shenoi},
  title        = {Protecting the Food Supply Chain from Terrorist Attack},
  booktitle    = {Critical Infrastructure Protection {IV} - Fourth Annual {IFIP} {WG}
                  11.10 International Conference on Critical Infrastructure Protection,
                  {ICCIP} 2010, Washington, DC, USA, March 15-17, 2010, Revised Selected
                  Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {342},
  pages        = {157--167},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16806-2\_11},
  doi          = {10.1007/978-3-642-16806-2\_11},
  timestamp    = {Wed, 12 Aug 2020 17:59:01 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-10/AlvarezAMOTS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-10/Assaf10,
  author       = {Dan Assaf},
  editor       = {Tyler Moore and
                  Sujeet Shenoi},
  title        = {Foreign Direct Investment in an Era of Increased Threats to Critical
                  Infrastructures},
  booktitle    = {Critical Infrastructure Protection {IV} - Fourth Annual {IFIP} {WG}
                  11.10 International Conference on Critical Infrastructure Protection,
                  {ICCIP} 2010, Washington, DC, USA, March 15-17, 2010, Revised Selected
                  Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {342},
  pages        = {17--27},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16806-2\_2},
  doi          = {10.1007/978-3-642-16806-2\_2},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-10/Assaf10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-10/AungW10,
  author       = {Zaw Zaw Aung and
                  Kenji Watanabe},
  editor       = {Tyler Moore and
                  Sujeet Shenoi},
  title        = {Modeling Inoperability Propagation Using Bayesian Networks},
  booktitle    = {Critical Infrastructure Protection {IV} - Fourth Annual {IFIP} {WG}
                  11.10 International Conference on Critical Infrastructure Protection,
                  {ICCIP} 2010, Washington, DC, USA, March 15-17, 2010, Revised Selected
                  Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {342},
  pages        = {199--212},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16806-2\_14},
  doi          = {10.1007/978-3-642-16806-2\_14},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-10/AungW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-10/BisogniC10,
  author       = {Fabio Bisogni and
                  Simona Cavallini},
  editor       = {Tyler Moore and
                  Sujeet Shenoi},
  title        = {Assessing the Economic Loss and Social Impact of Information System
                  Breakdowns},
  booktitle    = {Critical Infrastructure Protection {IV} - Fourth Annual {IFIP} {WG}
                  11.10 International Conference on Critical Infrastructure Protection,
                  {ICCIP} 2010, Washington, DC, USA, March 15-17, 2010, Revised Selected
                  Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {342},
  pages        = {185--198},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16806-2\_13},
  doi          = {10.1007/978-3-642-16806-2\_13},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-10/BisogniC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-10/BrandstetterKR10,
  author       = {Thomas Brandstetter and
                  Konstantin Knorr and
                  Ute Rosenbaum},
  editor       = {Tyler Moore and
                  Sujeet Shenoi},
  title        = {A Manufacturer-Specific Security Assessment Methodology for Critical
                  Infrastructure Components},
  booktitle    = {Critical Infrastructure Protection {IV} - Fourth Annual {IFIP} {WG}
                  11.10 International Conference on Critical Infrastructure Protection,
                  {ICCIP} 2010, Washington, DC, USA, March 15-17, 2010, Revised Selected
                  Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {342},
  pages        = {229--244},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16806-2\_16},
  doi          = {10.1007/978-3-642-16806-2\_16},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-10/BrandstetterKR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-10/ButtsRS10,
  author       = {Jonathan Butts and
                  Mason Rice and
                  Sujeet Shenoi},
  editor       = {Tyler Moore and
                  Sujeet Shenoi},
  title        = {Modeling Control System Failures and Attacks - The Waterloo Campaign
                  to Oil Pipelines},
  booktitle    = {Critical Infrastructure Protection {IV} - Fourth Annual {IFIP} {WG}
                  11.10 International Conference on Critical Infrastructure Protection,
                  {ICCIP} 2010, Washington, DC, USA, March 15-17, 2010, Revised Selected
                  Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {342},
  pages        = {43--62},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16806-2\_4},
  doi          = {10.1007/978-3-642-16806-2\_4},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-10/ButtsRS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-10/ChenHWMAMG10,
  author       = {Yousu Chen and
                  Zhenyu Huang and
                  Pak Chung Wong and
                  Patrick Mackey and
                  Craig Allwardt and
                  Jian Ma and
                  Frank L. Greitzer},
  editor       = {Tyler Moore and
                  Sujeet Shenoi},
  title        = {An Advanced Decision-Support Tool for Electricity Infrastructure Operations},
  booktitle    = {Critical Infrastructure Protection {IV} - Fourth Annual {IFIP} {WG}
                  11.10 International Conference on Critical Infrastructure Protection,
                  {ICCIP} 2010, Washington, DC, USA, March 15-17, 2010, Revised Selected
                  Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {342},
  pages        = {245--260},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16806-2\_17},
  doi          = {10.1007/978-3-642-16806-2\_17},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ifip11-10/ChenHWMAMG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-10/EllefsenS10,
  author       = {Ian Ellefsen and
                  Sebastiaan H. von Solms},
  editor       = {Tyler Moore and
                  Sujeet Shenoi},
  title        = {Critical Information Infrastructure Protection in the Developing World},
  booktitle    = {Critical Infrastructure Protection {IV} - Fourth Annual {IFIP} {WG}
                  11.10 International Conference on Critical Infrastructure Protection,
                  {ICCIP} 2010, Washington, DC, USA, March 15-17, 2010, Revised Selected
                  Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {342},
  pages        = {29--40},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16806-2\_3},
  doi          = {10.1007/978-3-642-16806-2\_3},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-10/EllefsenS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-10/FovinoMGCT10,
  author       = {Igor Nai Fovino and
                  Marcelo Masera and
                  Michele Guglielmi and
                  Andrea Carcano and
                  Alberto Trombetta},
  editor       = {Tyler Moore and
                  Sujeet Shenoi},
  title        = {Distributed Intrusion Detection System for {SCADA} Protocols},
  booktitle    = {Critical Infrastructure Protection {IV} - Fourth Annual {IFIP} {WG}
                  11.10 International Conference on Critical Infrastructure Protection,
                  {ICCIP} 2010, Washington, DC, USA, March 15-17, 2010, Revised Selected
                  Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {342},
  pages        = {95--110},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16806-2\_7},
  doi          = {10.1007/978-3-642-16806-2\_7},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-10/FovinoMGCT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-10/GuernseyEBS10,
  author       = {Daniel Guernsey and
                  Aaron Engel and
                  Jonathan Butts and
                  Sujeet Shenoi},
  editor       = {Tyler Moore and
                  Sujeet Shenoi},
  title        = {Security Analysis of the {MPLS} Label Distribution Protocol},
  booktitle    = {Critical Infrastructure Protection {IV} - Fourth Annual {IFIP} {WG}
                  11.10 International Conference on Critical Infrastructure Protection,
                  {ICCIP} 2010, Washington, DC, USA, March 15-17, 2010, Revised Selected
                  Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {342},
  pages        = {127--139},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16806-2\_9},
  doi          = {10.1007/978-3-642-16806-2\_9},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-10/GuernseyEBS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-10/HartongGW10,
  author       = {Mark Hartong and
                  Rajni Goel and
                  Duminda Wijesekera},
  editor       = {Tyler Moore and
                  Sujeet Shenoi},
  title        = {{U.S.} Federal Oversight of Rail Transportation of Toxic by Inhalation
                  Materials},
  booktitle    = {Critical Infrastructure Protection {IV} - Fourth Annual {IFIP} {WG}
                  11.10 International Conference on Critical Infrastructure Protection,
                  {ICCIP} 2010, Washington, DC, USA, March 15-17, 2010, Revised Selected
                  Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {342},
  pages        = {141--155},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16806-2\_10},
  doi          = {10.1007/978-3-642-16806-2\_10},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-10/HartongGW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-10/Johnsen10,
  author       = {Stig Ole Johnsen},
  editor       = {Tyler Moore and
                  Sujeet Shenoi},
  title        = {Resilience in Risk Analysis and Risk Assessment},
  booktitle    = {Critical Infrastructure Protection {IV} - Fourth Annual {IFIP} {WG}
                  11.10 International Conference on Critical Infrastructure Protection,
                  {ICCIP} 2010, Washington, DC, USA, March 15-17, 2010, Revised Selected
                  Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {342},
  pages        = {215--227},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16806-2\_15},
  doi          = {10.1007/978-3-642-16806-2\_15},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-10/Johnsen10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-10/KlumpK10,
  author       = {Ray Klump and
                  Matthew Kwiatkowski},
  editor       = {Tyler Moore and
                  Sujeet Shenoi},
  title        = {Distributed {IP} Watchlist Generation for Intrusion Detection in the
                  Electrical Smart Grid},
  booktitle    = {Critical Infrastructure Protection {IV} - Fourth Annual {IFIP} {WG}
                  11.10 International Conference on Critical Infrastructure Protection,
                  {ICCIP} 2010, Washington, DC, USA, March 15-17, 2010, Revised Selected
                  Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {342},
  pages        = {113--126},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16806-2\_8},
  doi          = {10.1007/978-3-642-16806-2\_8},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-10/KlumpK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-10/LundenSLSW10,
  author       = {Nils Lunden and
                  Robin Sveen and
                  Hans Lund and
                  Nils Kalstad Svendsen and
                  Stephen D. Wolthusen},
  editor       = {Tyler Moore and
                  Sujeet Shenoi},
  title        = {Interactive Visualization of Interdependencies and Vulnerabilities
                  in Constrained Environments},
  booktitle    = {Critical Infrastructure Protection {IV} - Fourth Annual {IFIP} {WG}
                  11.10 International Conference on Critical Infrastructure Protection,
                  {ICCIP} 2010, Washington, DC, USA, March 15-17, 2010, Revised Selected
                  Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {342},
  pages        = {171--183},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16806-2\_12},
  doi          = {10.1007/978-3-642-16806-2\_12},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-10/LundenSLSW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-10/McEvoyW10,
  author       = {Thomas Richard McEvoy and
                  Stephen D. Wolthusen},
  editor       = {Tyler Moore and
                  Sujeet Shenoi},
  title        = {Detecting Sensor Signal Manipulations in Non-Linear Chemical Processes},
  booktitle    = {Critical Infrastructure Protection {IV} - Fourth Annual {IFIP} {WG}
                  11.10 International Conference on Critical Infrastructure Protection,
                  {ICCIP} 2010, Washington, DC, USA, March 15-17, 2010, Revised Selected
                  Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {342},
  pages        = {81--94},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16806-2\_6},
  doi          = {10.1007/978-3-642-16806-2\_6},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-10/McEvoyW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-10/RobinsonPKBW10,
  author       = {Neil Robinson and
                  Dimitris Potoglou and
                  Chong Kim and
                  Peter Burge and
                  Richard Warnes},
  editor       = {Tyler Moore and
                  Sujeet Shenoi},
  title        = {Security At What Cost?},
  booktitle    = {Critical Infrastructure Protection {IV} - Fourth Annual {IFIP} {WG}
                  11.10 International Conference on Critical Infrastructure Protection,
                  {ICCIP} 2010, Washington, DC, USA, March 15-17, 2010, Revised Selected
                  Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {342},
  pages        = {3--15},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16806-2\_1},
  doi          = {10.1007/978-3-642-16806-2\_1},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-10/RobinsonPKBW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-10/SolomakhinTS10,
  author       = {Rouslan Solomakhin and
                  Patrick P. Tsang and
                  Sean W. Smith},
  editor       = {Tyler Moore and
                  Sujeet Shenoi},
  title        = {High Security with Low Latency in Legacy {SCADA} Systems},
  booktitle    = {Critical Infrastructure Protection {IV} - Fourth Annual {IFIP} {WG}
                  11.10 International Conference on Critical Infrastructure Protection,
                  {ICCIP} 2010, Washington, DC, USA, March 15-17, 2010, Revised Selected
                  Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {342},
  pages        = {63--79},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16806-2\_5},
  doi          = {10.1007/978-3-642-16806-2\_5},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-10/SolomakhinTS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ifip11-10/2010,
  editor       = {Tyler Moore and
                  Sujeet Shenoi},
  title        = {Critical Infrastructure Protection {IV} - Fourth Annual {IFIP} {WG}
                  11.10 International Conference on Critical Infrastructure Protection,
                  {ICCIP} 2010, Washington, DC, USA, March 15-17, 2010, Revised Selected
                  Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {342},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16806-2},
  doi          = {10.1007/978-3-642-16806-2},
  isbn         = {978-3-642-16805-5},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-10/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics