Title |
Speakers |
Summary |
Topic Types |
Welcoming Remarks |
Robert Miller
,
Robert Childs
|
N/A |
|
Keynote Lecture Why I am Going to Target Your Infrastructure |
Robert Miller
,
Daniel Kuehl
|
N/A |
|
Understanding the Risk to the Internet Infrastructure |
Ginger Armbruster
,
Barbara Endicott-popovsky
,
Jan Whittington
|
N/A |
|
On the Classification of Telecoms as Critical Infrastructures |
Fabio Bisogni
,
Simona Cavallini
,
Luisa Franchina
,
Giovanni Saja
|
N/A |
|
Critical Infrastructure Protection in the Dutch Financial Sector |
Matthijs van Oers
,
Leon Strous
,
Ron Berndsen
|
N/A |
|
Analysis of the Requirements for Critical Control Systems |
Cristina Alcaraz
,
Javier Lopez
|
N/A |
|
Modeling Security in Cyber-Physical Systems |
Michael Burmester
,
Emmanouil Magkos
,
Vassilis Chrissikopoulos
|
N/A |
|
Vulnerabilities and Security Models of Automobile Systems |
Gerry Howser
,
Bruce Mcmillin
|
N/A |
|
Agent Interaction and State Determination in SCADA Systems |
Thomas Mcevoy
,
Stephen d. Wolthusen
|
N/A |
|
Emergency Messages in the Commercial Mobile Alert System |
Paul Ngo
,
Duminda Wijesekera
|
N/A |
|