Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/ifip11-10/iccip2010.bht:"
@inproceedings{DBLP:conf/ifip11-10/AlvarezAMOTS10, author = {Mar{\'{\i}}a Jes{\'{u}}s {\'{A}}lvarez and Ainara Alvarez and Maria Carla De Maggio and Ainhoa Oses and Marcella Trombetta and Roberto Setola}, editor = {Tyler Moore and Sujeet Shenoi}, title = {Protecting the Food Supply Chain from Terrorist Attack}, booktitle = {Critical Infrastructure Protection {IV} - Fourth Annual {IFIP} {WG} 11.10 International Conference on Critical Infrastructure Protection, {ICCIP} 2010, Washington, DC, USA, March 15-17, 2010, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {342}, pages = {157--167}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16806-2\_11}, doi = {10.1007/978-3-642-16806-2\_11}, timestamp = {Wed, 12 Aug 2020 17:59:01 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-10/AlvarezAMOTS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-10/Assaf10, author = {Dan Assaf}, editor = {Tyler Moore and Sujeet Shenoi}, title = {Foreign Direct Investment in an Era of Increased Threats to Critical Infrastructures}, booktitle = {Critical Infrastructure Protection {IV} - Fourth Annual {IFIP} {WG} 11.10 International Conference on Critical Infrastructure Protection, {ICCIP} 2010, Washington, DC, USA, March 15-17, 2010, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {342}, pages = {17--27}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16806-2\_2}, doi = {10.1007/978-3-642-16806-2\_2}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-10/Assaf10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-10/AungW10, author = {Zaw Zaw Aung and Kenji Watanabe}, editor = {Tyler Moore and Sujeet Shenoi}, title = {Modeling Inoperability Propagation Using Bayesian Networks}, booktitle = {Critical Infrastructure Protection {IV} - Fourth Annual {IFIP} {WG} 11.10 International Conference on Critical Infrastructure Protection, {ICCIP} 2010, Washington, DC, USA, March 15-17, 2010, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {342}, pages = {199--212}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16806-2\_14}, doi = {10.1007/978-3-642-16806-2\_14}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-10/AungW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-10/BisogniC10, author = {Fabio Bisogni and Simona Cavallini}, editor = {Tyler Moore and Sujeet Shenoi}, title = {Assessing the Economic Loss and Social Impact of Information System Breakdowns}, booktitle = {Critical Infrastructure Protection {IV} - Fourth Annual {IFIP} {WG} 11.10 International Conference on Critical Infrastructure Protection, {ICCIP} 2010, Washington, DC, USA, March 15-17, 2010, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {342}, pages = {185--198}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16806-2\_13}, doi = {10.1007/978-3-642-16806-2\_13}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-10/BisogniC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-10/BrandstetterKR10, author = {Thomas Brandstetter and Konstantin Knorr and Ute Rosenbaum}, editor = {Tyler Moore and Sujeet Shenoi}, title = {A Manufacturer-Specific Security Assessment Methodology for Critical Infrastructure Components}, booktitle = {Critical Infrastructure Protection {IV} - Fourth Annual {IFIP} {WG} 11.10 International Conference on Critical Infrastructure Protection, {ICCIP} 2010, Washington, DC, USA, March 15-17, 2010, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {342}, pages = {229--244}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16806-2\_16}, doi = {10.1007/978-3-642-16806-2\_16}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-10/BrandstetterKR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-10/ButtsRS10, author = {Jonathan Butts and Mason Rice and Sujeet Shenoi}, editor = {Tyler Moore and Sujeet Shenoi}, title = {Modeling Control System Failures and Attacks - The Waterloo Campaign to Oil Pipelines}, booktitle = {Critical Infrastructure Protection {IV} - Fourth Annual {IFIP} {WG} 11.10 International Conference on Critical Infrastructure Protection, {ICCIP} 2010, Washington, DC, USA, March 15-17, 2010, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {342}, pages = {43--62}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16806-2\_4}, doi = {10.1007/978-3-642-16806-2\_4}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-10/ButtsRS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-10/ChenHWMAMG10, author = {Yousu Chen and Zhenyu Huang and Pak Chung Wong and Patrick Mackey and Craig Allwardt and Jian Ma and Frank L. Greitzer}, editor = {Tyler Moore and Sujeet Shenoi}, title = {An Advanced Decision-Support Tool for Electricity Infrastructure Operations}, booktitle = {Critical Infrastructure Protection {IV} - Fourth Annual {IFIP} {WG} 11.10 International Conference on Critical Infrastructure Protection, {ICCIP} 2010, Washington, DC, USA, March 15-17, 2010, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {342}, pages = {245--260}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16806-2\_17}, doi = {10.1007/978-3-642-16806-2\_17}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ifip11-10/ChenHWMAMG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-10/EllefsenS10, author = {Ian Ellefsen and Sebastiaan H. von Solms}, editor = {Tyler Moore and Sujeet Shenoi}, title = {Critical Information Infrastructure Protection in the Developing World}, booktitle = {Critical Infrastructure Protection {IV} - Fourth Annual {IFIP} {WG} 11.10 International Conference on Critical Infrastructure Protection, {ICCIP} 2010, Washington, DC, USA, March 15-17, 2010, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {342}, pages = {29--40}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16806-2\_3}, doi = {10.1007/978-3-642-16806-2\_3}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-10/EllefsenS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-10/FovinoMGCT10, author = {Igor Nai Fovino and Marcelo Masera and Michele Guglielmi and Andrea Carcano and Alberto Trombetta}, editor = {Tyler Moore and Sujeet Shenoi}, title = {Distributed Intrusion Detection System for {SCADA} Protocols}, booktitle = {Critical Infrastructure Protection {IV} - Fourth Annual {IFIP} {WG} 11.10 International Conference on Critical Infrastructure Protection, {ICCIP} 2010, Washington, DC, USA, March 15-17, 2010, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {342}, pages = {95--110}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16806-2\_7}, doi = {10.1007/978-3-642-16806-2\_7}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-10/FovinoMGCT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-10/GuernseyEBS10, author = {Daniel Guernsey and Aaron Engel and Jonathan Butts and Sujeet Shenoi}, editor = {Tyler Moore and Sujeet Shenoi}, title = {Security Analysis of the {MPLS} Label Distribution Protocol}, booktitle = {Critical Infrastructure Protection {IV} - Fourth Annual {IFIP} {WG} 11.10 International Conference on Critical Infrastructure Protection, {ICCIP} 2010, Washington, DC, USA, March 15-17, 2010, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {342}, pages = {127--139}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16806-2\_9}, doi = {10.1007/978-3-642-16806-2\_9}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-10/GuernseyEBS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-10/HartongGW10, author = {Mark Hartong and Rajni Goel and Duminda Wijesekera}, editor = {Tyler Moore and Sujeet Shenoi}, title = {{U.S.} Federal Oversight of Rail Transportation of Toxic by Inhalation Materials}, booktitle = {Critical Infrastructure Protection {IV} - Fourth Annual {IFIP} {WG} 11.10 International Conference on Critical Infrastructure Protection, {ICCIP} 2010, Washington, DC, USA, March 15-17, 2010, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {342}, pages = {141--155}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16806-2\_10}, doi = {10.1007/978-3-642-16806-2\_10}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-10/HartongGW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-10/Johnsen10, author = {Stig Ole Johnsen}, editor = {Tyler Moore and Sujeet Shenoi}, title = {Resilience in Risk Analysis and Risk Assessment}, booktitle = {Critical Infrastructure Protection {IV} - Fourth Annual {IFIP} {WG} 11.10 International Conference on Critical Infrastructure Protection, {ICCIP} 2010, Washington, DC, USA, March 15-17, 2010, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {342}, pages = {215--227}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16806-2\_15}, doi = {10.1007/978-3-642-16806-2\_15}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-10/Johnsen10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-10/KlumpK10, author = {Ray Klump and Matthew Kwiatkowski}, editor = {Tyler Moore and Sujeet Shenoi}, title = {Distributed {IP} Watchlist Generation for Intrusion Detection in the Electrical Smart Grid}, booktitle = {Critical Infrastructure Protection {IV} - Fourth Annual {IFIP} {WG} 11.10 International Conference on Critical Infrastructure Protection, {ICCIP} 2010, Washington, DC, USA, March 15-17, 2010, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {342}, pages = {113--126}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16806-2\_8}, doi = {10.1007/978-3-642-16806-2\_8}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-10/KlumpK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-10/LundenSLSW10, author = {Nils Lunden and Robin Sveen and Hans Lund and Nils Kalstad Svendsen and Stephen D. Wolthusen}, editor = {Tyler Moore and Sujeet Shenoi}, title = {Interactive Visualization of Interdependencies and Vulnerabilities in Constrained Environments}, booktitle = {Critical Infrastructure Protection {IV} - Fourth Annual {IFIP} {WG} 11.10 International Conference on Critical Infrastructure Protection, {ICCIP} 2010, Washington, DC, USA, March 15-17, 2010, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {342}, pages = {171--183}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16806-2\_12}, doi = {10.1007/978-3-642-16806-2\_12}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-10/LundenSLSW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-10/McEvoyW10, author = {Thomas Richard McEvoy and Stephen D. Wolthusen}, editor = {Tyler Moore and Sujeet Shenoi}, title = {Detecting Sensor Signal Manipulations in Non-Linear Chemical Processes}, booktitle = {Critical Infrastructure Protection {IV} - Fourth Annual {IFIP} {WG} 11.10 International Conference on Critical Infrastructure Protection, {ICCIP} 2010, Washington, DC, USA, March 15-17, 2010, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {342}, pages = {81--94}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16806-2\_6}, doi = {10.1007/978-3-642-16806-2\_6}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-10/McEvoyW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-10/RobinsonPKBW10, author = {Neil Robinson and Dimitris Potoglou and Chong Kim and Peter Burge and Richard Warnes}, editor = {Tyler Moore and Sujeet Shenoi}, title = {Security At What Cost?}, booktitle = {Critical Infrastructure Protection {IV} - Fourth Annual {IFIP} {WG} 11.10 International Conference on Critical Infrastructure Protection, {ICCIP} 2010, Washington, DC, USA, March 15-17, 2010, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {342}, pages = {3--15}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16806-2\_1}, doi = {10.1007/978-3-642-16806-2\_1}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-10/RobinsonPKBW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-10/SolomakhinTS10, author = {Rouslan Solomakhin and Patrick P. Tsang and Sean W. Smith}, editor = {Tyler Moore and Sujeet Shenoi}, title = {High Security with Low Latency in Legacy {SCADA} Systems}, booktitle = {Critical Infrastructure Protection {IV} - Fourth Annual {IFIP} {WG} 11.10 International Conference on Critical Infrastructure Protection, {ICCIP} 2010, Washington, DC, USA, March 15-17, 2010, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {342}, pages = {63--79}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16806-2\_5}, doi = {10.1007/978-3-642-16806-2\_5}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-10/SolomakhinTS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ifip11-10/2010, editor = {Tyler Moore and Sujeet Shenoi}, title = {Critical Infrastructure Protection {IV} - Fourth Annual {IFIP} {WG} 11.10 International Conference on Critical Infrastructure Protection, {ICCIP} 2010, Washington, DC, USA, March 15-17, 2010, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {342}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16806-2}, doi = {10.1007/978-3-642-16806-2}, isbn = {978-3-642-16805-5}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-10/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.