Skip to main content
  • Conference proceedings
  • © 2013

Critical Information Infrastructures Security

7th International Workshop, CRITIS 2012, Lillehammer, Norway, September 17-18, 2012. Revised Selected Papers

  • Up-to-date results
  • State-of-the-art research
  • Fast-track conference proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 7722)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): CRITIS: International Conference on Critical Information Infrastructures Security

Conference proceedings info: CRITIS 2012.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 49.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (24 papers)

  1. Front Matter

  2. Session 1: Intrusion Management

    1. Enhancing SIEM Technology to Protect Critical Infrastructures

      • Luigi Coppolino, Salvatore D’Antonio, Valerio Formicola, Luigi Romano
      Pages 10-21
  3. Session 2: Smart Metering and Grid

    1. Embedded Cyber-Physical Anomaly Detection in Smart Meters

      • Massimiliano Raciti, Simin Nadjm-Tehrani
      Pages 34-45
    2. Distributed Generation and Resilience in Power Grids

      • Antonio Scala, Mario Mureddu, Alessandro Chessa, Guido Caldarelli, Alfonso Damiano
      Pages 71-79
    3. Breaking Nondeducible Attacks on the Smart Grid

      • Thomas Roth, Bruce M. McMillin
      Pages 80-91
  4. Session 3: Analysis and Modeling

    1. CPS-CSH Cyber-Physical Analysis and Design

      • Dale Fitch, Sahra Sedigh, Bruce McMillin, Ravi Akella
      Pages 92-105
    2. Modeling Emergency Response Plans with Coloured Petri Nets

      • Manuel Cheminod, Ivan Cibrario Bertolotti, Luca Durante, Adriano Valenzano
      Pages 106-117
  5. Session 4: SCADA

    1. Distributed Identity Based Private Key Generation for SCADA Systems

      • Görkem Kılınç, Igor Nai Fovino
      Pages 118-129
    2. A Trusted Computing Architecture for Secure Substation Automation

      • David Guidry, Mike Burmester, Xiuwen Liu, Jonathan Jenkins, Sean Easton, Xin Yuan
      Pages 130-142
  6. Session 5: Cyber Issues

    1. Probabilistic Model Checking of CAPTCHA Admission Control for DoS Resistant Anti-SPIT Protection

      • Emmanouela Stachtiari, Yannis Soupionis, Panagiotis Katsaros, Anakreontas Mentis, Dimitris Gritzalis
      Pages 143-154
    2. Reasoning about Vulnerabilities in Dependent Information Infrastructures: A Cyber Range Experiment

      • Adedayo O. Adetoye, Sadie Creese, Michael H. Goldsmith
      Pages 155-167
  7. Session 6: CI Analysis

    1. Algebraic Analysis of Attack Impacts and Countermeasures in Critical Infrastructures

      • Thomas Richard McEvoy, Stephen D. Wolthusen
      Pages 168-179
    2. Evaluation of Resilience of Interconnected Systems Based on Stability Analysis

      • Angelo Alessandri, Roberto Filippini
      Pages 180-190
  8. Session 7: CIP Sectors

    1. System Dynamics for Railway Infrastructure Protection

      • Maria Carla De Maggio, Roberto Setola
      Pages 191-202
    2. Contaminant Detection in Urban Water Distribution Networks Using Chlorine Measurements

      • Demetrios G. Eliades, Marios M. Polycarpou
      Pages 203-214
    3. Collaboration between Competing Mobile Network Operators to Improve CIIP

      • Peter Schoo, Manfred Schäfer, André Egners, Hans Hofinger, Sascha Wessel, Marian Kuehnel et al.
      Pages 215-227

About this book

This book constitutes the thoroughly refereed post-proceedings of the 7th International Workshop on Critical Information Infrastructures Security, CRITIS 2012, held in Lillehammer, Norway, in September 2012. The 23 revised full papers were thoroughly reviewed and selected from 67 submissions. The papers are structured in the following topical sections: intrusion management; smart metering and grid, analysis and modeling; SCADA; cyber issues; CI analysis; CIP sectors; CI assessment; and threat modeling.

Editors and Affiliations

  • Hochschule Luzern - Technik und Architektur, CEO Acris GmbH, Bodenhofstrasse 29, 6005 Luzern, Switzerland and Gjøvik University College, Gjøvik, Norway

    Bernhard M. Hämmerli

  • Faculty of Computer Science and Media Technology, Gjøvik University College, Gjøvik, Norway

    Nils Kalstad Svendsen

  • Department of Computer Science, E.T.S. Ingenieria Informatica, University of Malaga, Malaga, Spain

    Javier Lopez

Bibliographic Information

  • Book Title: Critical Information Infrastructures Security

  • Book Subtitle: 7th International Workshop, CRITIS 2012, Lillehammer, Norway, September 17-18, 2012. Revised Selected Papers

  • Editors: Bernhard M. Hämmerli, Nils Kalstad Svendsen, Javier Lopez

  • Series Title: Lecture Notes in Computer Science

  • DOI: https://doi.org/10.1007/978-3-642-41485-5

  • Publisher: Springer Berlin, Heidelberg

  • eBook Packages: Computer Science, Computer Science (R0)

  • Copyright Information: Springer-Verlag Berlin Heidelberg 2013

  • Softcover ISBN: 978-3-642-41484-8Published: 20 November 2013

  • eBook ISBN: 978-3-642-41485-5Published: 18 October 2013

  • Series ISSN: 0302-9743

  • Series E-ISSN: 1611-3349

  • Edition Number: 1

  • Number of Pages: XIV, 277

  • Number of Illustrations: 103 b/w illustrations

  • Topics: Systems and Data Security, Computers and Society, Computer Communication Networks

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 49.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access