© 2020

Critical Information Infrastructures Security

14th International Conference, CRITIS 2019, Linköping, Sweden, September 23–25, 2019, Revised Selected Papers

  • Simin Nadjm-Tehrani
Conference proceedings CRITIS 2019

Part of the Lecture Notes in Computer Science book series (LNCS, volume 11777)

Also part of the Security and Cryptology book sub series (LNSC, volume 11777)

Table of contents

  1. Front Matter
    Pages i-xi
  2. Invited Papers

    1. Front Matter
      Pages 1-1
    2. Awais Rashid, Joseph Gardiner, Benjamin Green, Barnaby Craggs
      Pages 3-17
  3. Risk Management

    1. Front Matter
      Pages 29-29
    2. Zack Ellerby, Josie McCulloch, Melanie Wilson, Christian Wagner
      Pages 31-42
    3. Stefan Schauer, Thomas Grafenauer, Sandra König, Manuel Warum, Stefan Rass
      Pages 43-56
    4. Gabriele Oliva, Annunziata Esposito Amideo, Stefano Starita, Roberto Setola, Maria Paola Scaparra
      Pages 57-68
  4. Vulnerability Assessment

    1. Front Matter
      Pages 69-69
    2. Daniel Lückerath, Eva Streberová, Manfred Bogen, Erich Rome, Oliver Ullrich, Eva Pauditsová
      Pages 83-94
  5. Resilience and Mitigation

    1. Front Matter
      Pages 95-95
    2. BooJoong Kang, David Umsonst, Mario Faschang, Christian Seitl, Ivo Friedberg, Friederich Kupzog et al.
      Pages 97-109
    3. Qin Lin, Sicco Verwer, Robert Kooij, Aditya Mathur
      Pages 122-133
  6. Transport and Finance

    1. Front Matter
      Pages 135-135
    2. Tatiana Galibus
      Pages 137-148
  7. Short Papers

    1. Front Matter
      Pages 161-161
    2. Tomomi Aoyama, Atsushi Sato, Giuseppe Lisi, Kenji Watanabe
      Pages 163-168

About these proceedings


This book constitutes the revised selected papers of the 14th International Conference on Critical Information Infrastructures Security, CRITIS 2019, held in Linköping, Sweden, in September 2019.

The 10 full papers and 5 short papers presented were carefully reviewed and selected from 30 submissions. They are grouped in the following topical sections: Invited Papers, Risk Management, Vulnerability Assessment, Resilience and Mitigation Short Papers, and Industry and Practical Experience Reports.


architecture types artificial intelligence computer crime computer networks computer security computer systems cryptography cyber security data security databases engineering internet mathematics network protocols network security security issues signal processing software architecture software design software engineering

Editors and affiliations

  1. 1.Linköping UniversityLinköpingSweden

Bibliographic information