Author of the publication

Policies for Composed Emergencies in Support of Disaster Management.

, , and . Secure Data Management, volume 7482 of Lecture Notes in Computer Science, page 75-92. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A framework in support of emergency management for specified and unspecified emergencies.. University of Insubria, Italy, (2014)SHARE: Secure information sharing framework for emergency management., , and . ICDE, page 1336-1339. IEEE Computer Society, (2013)A Preliminary Study of a Wireless Process Control Network Using Emulation Testbeds., , , and . MOBILIGHT, volume 45 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 268-279. Springer, (2010)Policies for Composed Emergencies in Support of Disaster Management., , and . Secure Data Management, volume 7482 of Lecture Notes in Computer Science, page 75-92. Springer, (2012)Detection of Unspecified Emergencies for Controlled Information Sharing., , and . IEEE Trans. Dependable Secur. Comput., 13 (6): 630-643 (2016)Distributed Intrusion Detection System for SCADA Protocols., , , , and . Critical Infrastructure Protection, volume 342 of IFIP Advances in Information and Communication Technology, page 95-110. Springer, (2010)State-Based Firewall for Industrial Protocols with Critical-State Prediction Monitor., , , , , and . CRITIS, volume 6712 of Lecture Notes in Computer Science, page 116-127. Springer, (2010)Controlled information sharing for unspecified emergencies., , and . CRiSIS, page 1-8. IEEE Computer Society, (2013)A System for Timely and Controlled Information Sharing in Emergency Situations., , and . IEEE Trans. Dependable Secur. Comput., 10 (3): 129-142 (2013)A Multidimensional Critical State Analysis for Detecting Intrusions in SCADA Systems., , , , , and . IEEE Trans. Ind. Informatics, 7 (2): 179-186 (2011)