home  
 
program  
social events  
registration  
call for papers  
program commitee  
paper submission  
workshops/events  
location  
accomodation  
tourist information  
pictures  
contact  

The proceedings of the conference is published online in the IEEE Xplore database. Below is a list of the papers and abstracts with the corresponding digitabl object identifier link.

  • Quantification of dependencies in electrical and information iunfrastructures: The CRUTIAL approach
    M. Beccuti, G. Franceschinis, S. Donatelli, S. Chiaradonna, F. Di Giandomenico, P. Lollini, G. Dondossola, F. Garrone
    Digital Object Identifier: 10.1109/CRIS.2009.5071482

  • Smart metering tariff schemes combined with distributed energy resources
    Deconinck, G. Decroix, B.
    Digital Object Identifier: 10.1109/CRIS.2009.5071483

  • Smart metering for the future energy systems in the Netherlands
    AlAbdulkarim, L.O. Lukszo, Z.
    Digital Object Identifier: 10.1109/CRIS.2009.5071484

  • RRE: A game-theoretic intrusion Response and Recovery Engine for process control applications (abstract)
    Sanders, W.H.
    Digital Object Identifier: 10.1109/CRIS.2009.5071485

  • Policy informatics for co-evolving socio-technical networks
    Marathe, M.V. Barrett, C.L. Eubank, S.
    Digital Object Identifier: 10.1109/CRIS.2009.5071486

  • Protection And tRuSt In FinanciAL infrastructures (abstract)
    Pasic, A. Gresser, J.Y.
    Digital Object Identifier: 10.1109/CRIS.2009.5071487

  • After the fall of the financial industry, which critical infrastructure will be hit next? (abstract)
    Straumann, H.
    Digital Object Identifier: 10.1109/CRIS.2009.5071488

  • Is secure telephony possible or even desirable? (abstract)
    Prevelakis, V.
    Digital Object Identifier: 10.1109/CRIS.2009.5071489

  • Thinking about denial of service in Internet protocols (abstract)
    Aura, T.
    Digital Object Identifier: 10.1109/CRIS.2009.5071490

  • Analyzing systemic information infrastructure malfunction
    Mellstrand, P. Stahl, B.
    Digital Object Identifier: 10.1109/CRIS.2009.5071491

  • Using UML to model dependencies in systems of systems
    Ligaarden, O.S.
    Digital Object Identifier: 10.1109/CRIS.2009.5071492

  • Criticality hierarchy procedure applied to software applications for electrical networks management
    Viziteu, M. Georges, D. Caire, R. Hadjsaid, N.
    Digital Object Identifier: 10.1109/CRIS.2009.5071493

  • On-line parameter identification for excitation system based on PMU data
    Tianshu Bi Ancheng Xue Guoyi Xu Xiaolong Guo Fei Ge Zhengfeng Wang
    Digital Object Identifier: 10.1109/CRIS.2009.5071494

  • The EU integrated project IRRIIS on CI dependencies an overview (abstract)
    Klein, R.
    Digital Object Identifier: 10.1109/CRIS.2009.5071495

  • Traffic Mining, feel the packets, be the packets (abstract)
    Burschka, S.
    Digital Object Identifier: 10.1109/CRIS.2009.5071496

  • Steps towards a Clean-Slate secure Internet infrastructure (abstract)
    Koyabe, M. El-Moussa, F.A.
    Digital Object Identifier: 10.1109/CRIS.2009.5071497

  • Strategies to secure the IEEE 1588 protocol in digital substation automation
    Tournier, J.-C. Goerlitz, O.
    Digital Object Identifier: 10.1109/CRIS.2009.5071498

  • Collaboration in security assessments for critical infrastructures
    Koster, F. Klaas, M. Nguyen, H.Q. Brandle, M. Obermeier, S. Brenne, W.
    Digital Object Identifier: 10.1109/CRIS.2009.5071499

  • Overview of the power systems security with regard to cyberattacks
    Tranchita, C. Hadjsaid, N. Torres, A.
    Digital Object Identifier: 10.1109/CRIS.2009.5071500

 

Organisers:

Sponsors:

Supporting Nordic Network on Dependability NODES
Last modified Tue Mar 02 10:16:13 2010