Abstract is missing.
- Ten National Cyber Security Strategies: A ComparisonEric A. M. Luiijf, Kim Besseling, Maartje Spoelstra, Patrick De Graaf. 1-17 [doi]
- Analysis of Dependencies in Critical InfrastructuresAdedayo Oyelakin Adetoye, Michael Goldsmith, Sadie Creese. 18-29 [doi]
- Assurance and Trust Indicators to Evaluate Accuracy of On-line Risk in Critical InfrastructuresThomas Schaberreiter, Filipe Caldeira, Jocelyn Aubert, Edmundo Monteiro, Djamel Khadraoui, Paulo Simões. 30-41 [doi]
- An Innovative Approach to Emergency Management in Large InfrastructuresRüdiger Klein. 42-57 [doi]
- Dynamic Evacuation Guidance as Safety Critical Application in Building AutomationArmin Veichtlbauer, Thomas Pfeiffenberger. 58-69 [doi]
- Defeating Node Based Attacks on SCADA Systems Using Probabilistic Packet ObservationThomas Richard McEvoy, Stephen D. Wolthusen. 70-80 [doi]
- Sub-optimal Topological Protection Strategy from Advanced MalwareAndrea Arbore, Vincenzo Fioriti. 81-92 [doi]
- The Insider Threat in Cloud ComputingMiltiadis Kandias, Nikos Virvilis, Dimitris Gritzalis. 93-103 [doi]
- Interdependencies between Critical Infrastructures: Analyzing the Risk of Cascading EffectsPanayiotis Kotzanikolaou, Marianthi Theoharidou, Dimitris Gritzalis. 104-115 [doi]
- How to Perform Verification and Validation of Critical Infrastructure Modeling ToolsAlfonso Farina, Antonio Graziano, Stefano Panzieri, Federica Pascucci, Roberto Setola. 116-127 [doi]
- Petri Net Modelling of Physical VulnerabilityFrancesco Flammini, Stefano Marrone, Nicola Mazzocca, Valeria Vittorini. 128-139 [doi]
- Investigating the Effect of Network Parameters on Coordinated Cyber Attacks against a Simulated Power PlantBéla Genge, Christos Siaterlis. 140-151 [doi]
- The Role of the DNS in the Secure and Resilient Operation of CIs, the Energy System ExampleIgor Nai Fovino, Salvatore Di Blasi, Andrea Rigoni. 152-163 [doi]
- The Development of Warning, Advice and Reporting Points (WARPs) in UK National InfrastructureTony Proctor. 164-174 [doi]
- The Contribution of NEISAS to EP3RDavid Sutton, John Harrison, Sandro Bologna, Vittorio Rosato. 175-186 [doi]
- Policies to Improve Resilience against Major Industrial AccidentsLeire Labaka, Josune Hernantes, Ana Lauge, Jose Maria Sarriegi. 187-199 [doi]
- Fuzzy Input-Output Inoperability Model - (Short Paper)Gabriele Oliva, Roberto Setola, Stefano Panzieri. 200-204 [doi]
- Dependencies Discovery and Analysis in Distributed Systems - (Short Paper)Emiliano Casalicchio. 205-208 [doi]
- Protecting Critical Infrastructures from Stealth Attacks: A Closed-Loop Approach Involving Detection and Remediation - (Short Paper)Stefano Avallone, Claudio Mazzariello, Francesco Oliviero, Simon Pietro Romano. 209-212 [doi]
- Risk Assessment in Critical Infrastructure Security Modelling Based on Dependency Analysis - (Short Paper)Thomas Schaberreiter, Kati Kittilä, Kimmo Halunen, Juha Röning, Djamel Khadraoui. 213-217 [doi]
- Countermeasures Selection via Evidence Theory - (Short Paper)Giusj Digioia, Chiara Foglietta, Gabriele Oliva, Stefano Panzieri. 218-222 [doi]
- The Robustness of Assortativity - (Short Paper)Antonio Scala, Gregorio D'Agostino. 223-226 [doi]