{"id":12,"date":"2020-06-01T10:33:19","date_gmt":"2020-06-01T10:33:19","guid":{"rendered":"https:\/\/kioswebsvr1.koios.ucy.ac.cy\/critis2014\/?page_id=12"},"modified":"2020-06-01T13:27:20","modified_gmt":"2020-06-01T13:27:20","slug":"program","status":"publish","type":"page","link":"https:\/\/www.kios.ucy.ac.cy\/critis2014\/program\/","title":{"rendered":"PROGRAM"},"content":{"rendered":"\n<p><a href=\"https:\/\/www.kios.ucy.ac.cy\/critis2014\/wp-content\/uploads\/2020\/06\/CRITIS-2014-Program-FINAL1.pdf\">CRITIS 2014 Program FINAL [pdf]<\/a><\/p>\n\n\n\n<p><strong><em>Monday, 13<sup>th<\/sup>&nbsp;of October<\/em><\/strong><\/p>\n\n\n\n<p>09:00-10:00&nbsp;<strong>CIPRNet Lecture,&nbsp;<\/strong><em>Jose Marti<\/em><\/p>\n\n\n\n<p>Session Chair:<em>&nbsp;E. Kyriakides&nbsp;<\/em><em>&#8211;&nbsp;<\/em>Room: \u03b2\u20ac\u009cGrand Hall B\u03b2\u20ac\u009d<\/p>\n\n\n\n<p>10:00-11:00&nbsp;<strong>Risk Prediction for Increasing Critical Infrastructure Protection: A Key Issue for Enhancing City Resilience,&nbsp;<em>Vittorio Rosato<\/em><\/strong><\/p>\n\n\n\n<p><strong>Session Chair:<em>&nbsp;E. Rome&nbsp;<\/em><\/strong><strong><em>&#8211;&nbsp;<\/em><\/strong>Room: \u03b2\u20ac\u009cGrand Hall B\u03b2\u20ac\u009d<\/p>\n\n\n\n<p>11:00-11:30&nbsp;<strong>Coffee Break<\/strong><\/p>\n\n\n\n<table width=\"603\" border=\"0\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td rowspan=\"2\" valign=\"top\" width=\"92\"><b><span style=\"text-decoration: underline;\"> <\/span><\/b><\/td>\n<td valign=\"top\" width=\"255\"><b>Session 1  \u2013 \u201cGrand Hall B\u03b2\u20ac\u009d<\/b><p><\/p>\n<p>Session Chair:  <i>S. Cavallini<\/i><\/p><\/td>\n<td valign=\"top\" width=\"255\"><b>Session 2 \u2013 \u03b2\u20ac\u009cGrand Hall C\u03b2\u20ac\u009d<\/b><p><\/p>\n<p>Session Chair:  <i>R. Setola<\/i><\/p><\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"255\"><b>Cyber-Physical Systems and Sensor Networks<\/b><p><\/p>\n<p>&nbsp;<\/p><\/td>\n<td valign=\"top\" width=\"255\"><b>Security of Water Systems<\/b><\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"92\"><b>11:30-11:50<p><\/p>\n<\/b><p><b><\/b><\/p>\n<p><b> <\/b><\/p><\/td>\n<td valign=\"top\" width=\"255\"><b>Fault Detection and Isolation in Critical Infrastructure Systems<\/b><p><\/p>\n<p><i>V. Puig, T. Escobet, R. Sarrate and<\/i><\/p>\n<p><i>J. Quevedo<\/i><\/p><\/td>\n<td valign=\"top\" width=\"255\"><b>Decentralised Hierarchical Multi-rate Control of Large-scale Drinking Water Networks<\/b><p><\/p>\n<p><i>A.K. Sampathirao, P. Sopasakis and<\/i><\/p>\n<p><i>A. Bemporad<\/i><\/p>\n<p><b> <\/b><\/p><\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"92\">\n<b>11:50-12:10<p><\/p>\n<\/b><p><b><\/b><\/p>\n<p><b> <\/b><\/p><\/td>\n<\/td>\n<td valign=\"top\" width=\"255\"><b>Critical Infrastructure in the Future City \u2013 Developing Secure and Resilient Cyber\u03b2\u20ac\u201cPhysical Systems<br>\n<\/b><i>H. Boyes, R. Isbell and T. Watson<\/i><\/td>\n<td valign=\"top\" width=\"255\"><b>dbpRisk: Disinfection By-Product Risk Estimation<\/b><p><\/p>\n<p><i>M. Kyriakou, D. Eliades and<\/i><\/p>\n<p><i>M. Polycarpou<\/i><\/p>\n<p>&nbsp;<\/p><\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"92\"><b>12:10-12:30<\/b><p><\/p>\n<p><b> <\/b><\/p><\/td>\n<td valign=\"top\" width=\"255\"><b>Inferring Field Device Identity and Operating State Using Physical Features of Highway Addressable Remote Transducer (HART) Signals<\/b><p><\/p>\n<p><i>J. Lopez Jr. and M. Temple<\/i><\/p><\/td>\n<td valign=\"top\" width=\"255\"><b>Gaussian-Process-based Demand Forecasting for Predictive Control of Drinking Water Networks<\/b><p><\/p>\n<p><i>Y. Wang, C. Ocampo-Mart\u0393\u00adnez, V. Puig and J.Quevedo<\/i><\/p>\n<p>&nbsp;<\/p><\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"92\"><b>12:30-12:50<\/b><p><\/p>\n<p><b> <\/b><\/p><\/td>\n<td valign=\"top\" width=\"255\"><b>Processing and Communications Rate Requirements in Sensor Networks for Physical Thread Assessment<\/b><p><\/p>\n<p><i>I. Kyriakides, S. Neophytou,<\/i><\/p>\n<p><i>A. Kounoudes, K. Michail, Y. Argyrou and T. Wieland<\/i><\/p>\n<p>&nbsp;<\/p><\/td>\n<td valign=\"top\" width=\"255\"><b>Graph-Based Hydraulic Vulnerability Assessment of Water Distribution Networks<\/b><p><\/p>\n<p><i>M. Fragiadakis, S. Xanthos, D. Eliades, A. Gagatsis and S. Christodoulou<\/i><\/p>\n<p>&nbsp;<\/p><\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"92\"><b>12:50-13:10<\/b><p><\/p>\n<p><b> <\/b><\/p><\/td>\n<td valign=\"top\" width=\"255\"><b>A Comprehensive Approach for Security Assessment in Transport<\/b><p><\/p>\n<p><i>S. Cavallini, F. D\u2019Onofrio, P. Ferreira,<\/i><\/p>\n<p><i>A. Simoes and N. Garcia<\/i><\/p>\n<p>&nbsp;<\/p><\/td>\n<td valign=\"top\" width=\"255\"><b>Sensor Data Validation and Reconstruction in Water Networks: A Methodology and Software Implementation<\/b><p><\/p>\n<p><i>D. Garcia, J. Quevedo, V. Puig and<\/i><\/p>\n<p><i>M.A. Cuguer\u0393\u00b3<\/i><\/p>\n<p>&nbsp;<\/p><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n\n\n\n<p>13:10-14:50&nbsp;<strong>Lunch Break<\/strong><\/p>\n\n\n\n<table width=\"603\" border=\"0\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td rowspan=\"2\" valign=\"top\" width=\"92\"><b><span style=\"text-decoration: underline;\"> <\/span><\/b><\/td>\n<td valign=\"top\" width=\"255\"><b>Session 3 \u2013 \u201cGrand Hall B\u03b2\u20ac\u009d<\/b><p><\/p>\n<p>Session Chair:  <i>B.M. H\u0393\u00a4mmerli<\/i><\/p><\/td>\n<td valign=\"top\" width=\"255\"><b>Session 4 \u2013 \u201cGrand Hall C\u03b2\u20ac\u009d<\/b><p><\/p>\n<p>Session Chair:  <i>G. Sansavini<\/i><\/p><\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"255\"><b>CYCA Session<\/b><p><\/p>\n<p>&nbsp;<\/p><\/td>\n<td valign=\"top\" width=\"255\"><b>Power and Energy System Security<\/b><\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"92\"><b>14:50-15:10<\/b><p><\/p>\n<p><b> <\/b><\/p><\/td>\n<td valign=\"top\" width=\"255\"><b>Critical Infrastructure Online Fault Detection: Application in Water Supply Systems<\/b><p><\/p>\n<p><i>C. Heracleous, E.E. Miciolino, R. Setola, F. Pascucci, D.G. Eliades, G. Ellinas,<\/i><\/p>\n<p><i>C.G. Panayiotou and M.M. Polycarpou<\/i><\/p><\/td>\n<td valign=\"top\" width=\"255\"><b>An Attack Analysis of Managed Pressure Drilling Systems on Oil Drilling Platforms<\/b><p><\/p>\n<p><i>T.R. Mcevoy and S. Wolthusen<\/i><\/p><\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"92\"><b>15:10-15:30<\/b><p><\/p>\n<p align=\"center\"><b> <\/b><\/p>\n<\/td>\n<td valign=\"top\" width=\"255\"><b>Improving Situational Awareness for First Responders<\/b><p><\/p>\n<p><i>F. De Cillis, F. De Simio, F. Inderst,<\/i><\/p>\n<p><i>L. Faramondi, F. Pascucci and R. Setola<\/i><\/p><\/td>\n<td valign=\"top\" width=\"255\"><b>The Effect of Branch Parameter Errors to Voltage Stability Indices<\/b><p><\/p>\n<p><i>V. Kirincic, M. Asprou, P. Mavroeidis and E. Kyriakides<\/i><\/p><\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"92\"><b>15:30-15:50<\/b><p><\/p>\n<p><b> <\/b><\/p><\/td>\n<td valign=\"top\" width=\"255\"><b>Faults and Cyber Attacks Detection in Critical Infrastructures<\/b><p><\/p>\n<p><i>Y. Soupionis, S. Ntalampiras and<\/i><\/p>\n<p><i>G. Giannopoulos<\/i><\/p><\/td>\n<td valign=\"top\" width=\"255\"><b>CFD Simulation of Contaminant Transportation in High-Risk Buildings using CONTAM<\/b><p><\/p>\n<p><i>A. Nikolaou and M. Michaelides<\/i><\/p><\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"92\"><b>15:50-16:10<\/b><p><\/p>\n<p><b> <\/b><\/p><\/td>\n<td valign=\"top\" width=\"255\"><b>Automatic Fault Identification in Sensor Networks Based on Probabilistic Modeling<\/b><p><\/p>\n<p><i>S. Ntalampiras and G. Giannopoulos<\/i><\/p><\/td>\n<td valign=\"top\" width=\"255\"><b>Detection and Management of Large Scale Power System Disturbances<\/b><p><\/p>\n<p><i>A. Sauhats, V. Chuvychin, G. Bockarjova, D. Zalostiba, D. Antonovs and<\/i><\/p>\n<p><i>R. Petrichenko<\/i><\/p><\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"92\"><b>16:10-16:30<\/b><p><\/p>\n<p><b> <\/b><\/p><\/td>\n<td valign=\"top\" width=\"255\"><b>A Decision Support System for Emergency Management of Critical Infrastructures subjected to Natural Hazards<\/b><p><\/p>\n<p><i>V. Rosato, A. Di Pietro, L. La Porta, M. Pollino,<\/i><\/p>\n<p><i>A. Tofani, J.R. Marti and<\/i><\/p>\n<p><i>C. Romani<\/i><\/p><\/td>\n<td valign=\"top\" width=\"255\"><b>Impact of Surface Nuclear Blast on the Transient Stability of the Power System<\/b><p><\/p>\n<p><i>C. Barrett, V. Centeno, S. Eubank,<\/i><\/p>\n<p><i>C.Y. Evrenosoglu, A. Marathe,<\/i><\/p>\n<p><i>M. Marathe, C. Mishra, H. Mortveit,<\/i><\/p>\n<p><i>A. Pal, A. Phadke, J. Thorp, A. Vullikanti and M. Youssef<\/i><\/p><\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"92\"><b>16:30-16:50<\/b><p><\/p>\n<p><b> <\/b><\/p><\/td>\n<td valign=\"top\" width=\"255\"><b>Progressive Recovery from Failure in Multi-layered Interdependent Network Using a New Model of Interdependency<\/b><p><\/p>\n<p><i>A. Mazumder, C. Zhou, A. Das and<\/i><\/p>\n<p><i>A. Sen<\/i><\/p><\/td>\n<td valign=\"top\" width=\"255\"><b>Building an Integrated Metric for Quantifying the Resilience of Interdependent Infrastructure Systems<\/b><p><\/p>\n<p><i>C. Nan, G. Sansavini and W. Kr\u0393\u00b6ger<\/i><\/p><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n\n\n\n<p><strong>18:00-19:00 Welcome Reception (by the hotel pool area)<\/strong><\/p>\n\n\n\n<p><strong><em>Tuesday, 14<sup>th<\/sup>&nbsp;of October<\/em><\/strong><\/p>\n\n\n\n<p>09:00-10:00&nbsp;<strong>Methodologies for the Identification of Critical Information Infrastructure<\/strong><\/p>\n\n\n\n<p><strong>Assets and Services,&nbsp;<\/strong>R<em>ossella Mattioli<\/em><\/p>\n\n\n\n<p>Session Chair:<em>&nbsp;C. Panayiotou&nbsp;<\/em><em>&#8211;&nbsp;<\/em>Room: \u03b2\u20ac\u009cGrand Hall B\u03b2\u20ac\u009d<\/p>\n\n\n\n<p>10:00-11:00&nbsp;<strong>Water Distribution Systems Security Enhancement through Monitoring,<\/strong><\/p>\n\n\n\n<p><em>Avi Ostfeld<\/em><\/p>\n\n\n\n<p>Session Chair:<em>&nbsp;M. Polycarpou&nbsp;<\/em><em>&#8211;&nbsp;<\/em>Room: \u03b2\u20ac\u009cGrand Hall B\u03b2\u20ac\u009d<\/p>\n\n\n\n<p>11:00-11:30&nbsp;<strong>Coffee Break<\/strong><\/p>\n\n\n\n<table width=\"603\" border=\"0\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td rowspan=\"2\" valign=\"top\" width=\"92\"><b><span style=\"text-decoration: underline;\"> <\/span><\/b><\/td>\n<td valign=\"top\" width=\"255\"><b>Session 5 \u2013 \u201cGrand Hall B\u03b2\u20ac\u009d<\/b><p><\/p>\n<p>Session Chair:  <i>T. Bogaard<\/i><\/p><\/td>\n<td valign=\"top\" width=\"255\"><b>Session 6 \u2013 \u201cGrand Hall C\u03b2\u20ac\u009d<\/b><p><\/p>\n<p>Session Chair:  <i>Y. Soupionis<\/i><\/p><\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"255\"><b>Security and Recovery Policies<\/b><p><\/p>\n<p>&nbsp;<\/p><\/td>\n<td valign=\"top\" width=\"255\"><b>Cyber Security<\/b><\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"92\"><b>11:30-11:50<p><\/p>\n<\/b><p><b><\/b><\/p>\n<p><b> <\/b><\/p><\/td>\n<td valign=\"top\" width=\"255\"><b>Public-private Partnership: The Missing Factor in the Resilience Equation. The French Experience on CIIP<\/b><p><\/p>\n<p><i>D. D\u2019Elia<\/i><\/p><\/td>\n<td valign=\"top\" width=\"255\"><b>Model-based Evaluation of the Resilience of Critical Infrastructures under Cyber Attacks<\/b><p><\/p>\n<p><i>O. Netkachev, P. Popov  and  K. Salako<\/i><\/p><\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"92\">\n<b>11:50-12:10<p><\/p>\n<\/b><p><b><\/b><\/p>\n<p><b> <\/b><\/p><\/td>\n<\/td>\n<td valign=\"top\" width=\"255\"><b>Enterprise Security Analysis and Training Experience<\/b><p><\/p>\n<p><i>E. Tyugu and A. Ojamaa<\/i><\/p><\/td>\n<td valign=\"top\" width=\"255\"><b>The Role of One-Class Classification in Detecting Cyberattacks in Critical Infrastructures<\/b><p><\/p>\n<p><i>P. Nader, P. Honeine and P. Beauseroy<\/i><\/p><\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"92\"><b>12:10-12:30<\/b><p><\/p>\n<p><b> <\/b><\/p><\/td>\n<td valign=\"top\" width=\"255\"><b>Storm Surge Defenses at the Dutch Coast \u2013 New Developments on Modeling and Operating Barriers<\/b><p><\/p>\n<p><i>T. Bogaard, A. Zijderveld and<\/i><\/p>\n<p><i>S. de Goederen<\/i><\/p><\/td>\n<td valign=\"top\" width=\"255\"><b>Cyber Attacks in Power Grid ICT Systems leading to Financial Disturbance<\/b><p><\/p>\n<p><i>Y. Soupionis and T. Benoist<\/i><\/p>\n<p>&nbsp;<\/p><\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"92\"><b>12:30-12:50<\/b><p><\/p>\n<p><b> <\/b><\/p><\/td>\n<td valign=\"top\" width=\"255\"><b>Using Programmable Data Networks to Detect Critical Infrastructure Challenges<\/b><p><\/p>\n<p><i>K. White, D. Pezaros and C. Johnson<\/i><\/p><\/td>\n<td valign=\"top\" width=\"255\"><b>Obfuscation of Critical Infrastructure Network Traffic using Fake Communication<\/b><p><\/p>\n<p><i>S. Jeon, J-H Yun and W-N Kim<\/i><\/p><\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"92\"><b>12:50-13:10<\/b><p><\/p>\n<p><b> <\/b><\/p><\/td>\n<td valign=\"top\" width=\"255\"><b>Security Stress: Evaluating ICT Robustness through a Monte Carlo Method<\/b><p><\/p>\n<p><i>F. Baiardi, F. Tonelli, A. Bertolini,<\/i><\/p>\n<p><i>R. Bertolotti and L. Guidi<\/i><\/p><\/td>\n<td valign=\"top\" width=\"255\"><b>CyNetPhy: Towards Pervasive Defense-in-Depth for Smart Grid Security<\/b><p><\/p>\n<p><i>M. Azab, B. Mokhtar and M. Farag<\/i><\/p>\n<p><i> <\/i><\/p>\n<p>&nbsp;<\/p><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n\n\n\n<p>13:10-14:50&nbsp;<strong>Lunch Break<\/strong><\/p>\n\n\n\n<table width=\"603\" border=\"0\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td rowspan=\"2\" valign=\"top\" width=\"92\"><b><span style=\"text-decoration: underline;\"> <\/span><\/b><\/td>\n<td valign=\"top\" width=\"510\"><b>Session 7 \u2013 \u201cGrand Hall C\u03b2\u20ac\u009d<\/b><p><\/p>\n<p>Session Chair:  <i>M. Caselli<\/i><\/p><\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"510\"><b>Security Tools and Protocols<\/b><\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"92\"><b>14:50-15:10<\/b><p><\/p>\n<p><b> <\/b><\/p><\/td>\n<td valign=\"top\" width=\"510\"><b>Recovering Structural Controllability on Erd\u0395\u2018s\u03b2\u20ac\u201cR\u0393\u00a9nyi Graphs via Partial Control Structure Re-Use<\/b><p><\/p>\n<p><i>B. Alwasel and S. Wolthusen<\/i><\/p><\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"92\"><b>15:10-15:30<\/b><p><\/p>\n<p align=\"center\"><b> <\/b><\/p>\n<\/td>\n<td valign=\"top\" width=\"510\"><b>Self-healing Protocols for Infrastructural Networks<\/b><p><\/p>\n<p><i>A. Scala, W. Quattrociocchi,  G. A. Pagani and M. Aiello<\/i><\/p><\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"92\"><b>15:30-15:50<\/b><p><\/p>\n<p><b> <\/b><\/p><\/td>\n<td valign=\"top\" width=\"510\"><b>PRoCeeD: Process State Prediction for CRITIS using Process Inherent Causal Data and Discrete Event Models <\/b><p><\/p>\n<p><i>C. Horn and J. Krueger<\/i><\/p><\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"92\"><b>15:50-16:10<\/b><p><\/p>\n<p><b> <\/b><\/p><\/td>\n<td valign=\"top\" width=\"510\"><b>Cascading Failures: Dynamic Model for CIP Purposes \u2013 Case of Random Independent Failures following Poisson Stochastic Process<\/b><p><\/p>\n<p><i>M. Eid, T. Kling, T. Hakkarainen, Y. Barbarin, A. Grangeat and D. Serafin<\/i><\/p><\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"92\"><b>16:10-16:30<\/b><p><\/p>\n<p><b> <\/b><\/p><\/td>\n<td valign=\"top\" width=\"510\"><b>A Security Assessment Methodology for Critical Infrastructure<\/b><p><\/p>\n<p><i>M. Caselli and F. Kargl<\/i><\/p>\n<p><b> <\/b><\/p><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n\n\n\n<p><strong>Banquet Dinner at \u03b2\u20ac\u009cForsos Tavern\u03b2\u20ac\u009d<\/strong><\/p>\n\n\n\n<p><em>Meet at the hotel entrance (GrandResort) at 20:00 for transfer to the dinner venue.<\/em><\/p>\n\n\n\n<p><strong><em>Wednesday, 15<sup>th<\/sup>&nbsp;of October<\/em><\/strong><\/p>\n\n\n\n<p>09:00-10:15&nbsp;<strong>CI Panel: Current Status and Future Challenges in CIP in Cyprus<\/strong><\/p>\n\n\n\n<p><strong>Panelists:&nbsp;<\/strong><em>G. Karkas<\/em><strong>&nbsp;(Cyprus Police),&nbsp;<\/strong><em>N. Paris<\/em><strong>&nbsp;(Civil Defense),<\/strong><\/p>\n\n\n\n<p><em>K. Kyrou<\/em><strong>&nbsp;(Water Development Board),&nbsp;<\/strong><em>C. Moritsis<\/em><strong>&nbsp;(Ministry of Foreign Affairs),&nbsp;<\/strong><em>N. Koutras<\/em><strong>&nbsp;(ADITESS LTD)<\/strong><\/p>\n\n\n\n<p>Session Chair:<em>&nbsp;G. Boustras&nbsp;<\/em><em>&#8211;&nbsp;<\/em>Room: \u03b2\u20ac\u009cGrand Hall B\u03b2\u20ac\u009d<\/p>\n\n\n\n<p>10:15-10:35&nbsp;<strong>Coffee Break<\/strong><\/p>\n\n\n\n<p>10:35-13:05&nbsp;<strong>COncORDE Emergency Response Stakeholders Case Studies<\/strong><\/p>\n\n\n\n<p>Session Chair:<em>&nbsp;T. Kotis&nbsp;<\/em><em>&#8211;&nbsp;<\/em>Room: \u03b2\u20ac\u009cGrand Hall B\u03b2\u20ac\u009d<\/p>\n\n\n\n<p>13:05-13:15&nbsp;<strong>Introduction to CRITIS 2015, Erich Rome<\/strong>&nbsp;\u2013 Room: \u03b2\u20ac\u009cGrand Hall B\u03b2\u20ac\u009d<\/p>\n\n\n\n<p>13:05-14:35&nbsp;<strong>Lunch Break<\/strong><\/p>\n\n\n\n<table width=\"603\" border=\"0\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td rowspan=\"2\" valign=\"top\" width=\"92\"><b><span style=\"text-decoration: underline;\"> <\/span><\/b><\/td>\n<td valign=\"top\" width=\"255\"><b>Session 8 \u2013 \u201cGrand Hall B\u03b2\u20ac\u009d<\/b><p><\/p>\n<p>Session Chair:  <i>N. Voropai<\/i><\/p><\/td>\n<td valign=\"top\" width=\"255\"><b>Session 9 \u2013 \u201cGrand Hall C\u03b2\u20ac\u009d<\/b><p><\/p>\n<p>Session Chair:  <i>T. Staykova<\/i><\/p><\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"255\"><b>CRIS2014 Special Session<\/b><p><\/p>\n<p>&nbsp;<\/p><\/td>\n<td valign=\"top\" width=\"255\"><b>COncORDE Special Session:  Coordination Mechanisms and Decision Support in Emergency Environments<\/b>  <a href=\"https:\/\/www.kios.ucy.ac.cy\/critis2014\/wp-content\/uploads\/2020\/06\/COncORDE-Stakeholders-Workshop-Programme-Limassol-Cyprus-15Oct2014-v1.0.pdf\">Workshop Program [pdf]<\/a> <\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"92\"><b>14:35-14:55<\/b><p><\/p>\n<p><b> <\/b><\/p><\/td>\n<td valign=\"top\" width=\"255\"><b>Calculation of Cyber Security Index in the Problem of Power System State Estimation based on SCADA and WAMS Measurements<\/b><p><\/p>\n<p><i>I. Kolosok and L. Gurina<\/i><\/p><\/td>\n<td valign=\"top\" width=\"255\"><b>Utilizing Social Media Data for Enhancing Decision Making during Emergencies<\/b><p><\/p>\n<p><i>I. Kotsiopoulos, L. Baruh,<\/i><\/p>\n<p><i>A. Papadimitriou<\/i><\/p><\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"92\"><b>14:55-15:15<\/b><p><\/p>\n<p align=\"center\"><b> <\/b><\/p>\n<\/td>\n<td valign=\"top\" width=\"255\"><b>Factors influencing Oscillations within Meshed HVDC Grids and Implications for DC Voltage Control<\/b><p><\/p>\n<p><i>A-K Marten, D. Westermann, L. Vento and<\/i><\/p>\n<p><i>P. Favre-Perrod<\/i><\/p><\/td>\n<td valign=\"top\" width=\"255\"><b>An Experimental Evaluation of the HelpNet Emergency Response Networking Protocol<\/b><p><\/p>\n<p><i>K. Koumidis, A. Pingas, P. Kolios, and C.G. Panayiotou<\/i><\/p>\n<p><b> <\/b><\/p><\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"92\"><b>15:15-15:35<\/b><p><\/p>\n<p><b> <\/b><\/p><\/td>\n<td valign=\"top\" width=\"255\"><b>Model-based Security Risk Analysis for Networked Embedded Systems<\/b><p><\/p>\n<p><i>M. Vasilevskaya and S. Nadjm-Tehrani<\/i><\/p><\/td>\n<td valign=\"top\" width=\"255\"><b>Literature Review and State-of-art in Healthcare Emergency Response in Europe<\/b><p><\/p>\n<p><i>T. Staykova<\/i><\/p>\n<p>&nbsp;<\/p><\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"92\"><b>15:35-15:55<\/b><p><\/p>\n<p><b> <\/b><\/p><\/td>\n<td valign=\"top\" width=\"255\"><b>Security of the Russian Information Infrastructures in Power System<\/b><p><\/p>\n<p><i>N. Solonina and K. Suslov<\/i><\/p>\n<p>&nbsp;<\/p><\/td>\n<td valign=\"top\" width=\"255\"><b>Review of Communication Technologies for Emergency Response<\/b><p><\/p>\n<p><i>H. Papadopoulos and E. Zoulias<\/i><\/p>\n<p><i> <\/i><\/p><\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"92\"><b>15:55-16:15<\/b><p><\/p>\n<p><b> <\/b><\/p><\/td>\n<td valign=\"top\" width=\"255\"><b>Using the IEC 61850 Protocol for Safe and Reliable Information Exchange in Smart Grids Power Systems<\/b><p><\/p>\n<p><i>A. Naumann, P. Komarnicki and<\/i><\/p>\n<p><i>Z. Styczynski<\/i><\/p><\/td>\n<td valign=\"top\" width=\"255\"><b> <\/b><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>CRITIS 2014 Program FINAL [pdf] Monday, 13th&nbsp;of October 09:00-10:00&nbsp;CIPRNet Lecture,&nbsp;Jose Marti Session Chair:&nbsp;E. Kyriakides&nbsp;&#8211;&nbsp;Room: \u03b2\u20ac\u009cGrand Hall B\u03b2\u20ac\u009d 10:00-11:00&nbsp;Risk Prediction for Increasing Critical Infrastructure Protection: A Key Issue for Enhancing City Resilience,&nbsp;Vittorio Rosato Session Chair:&nbsp;E. Rome&nbsp;&#8211;&nbsp;Room: \u03b2\u20ac\u009cGrand Hall B\u03b2\u20ac\u009d 11:00-11:30&nbsp;Coffee Break Session 1 \u2013 \u201cGrand Hall B\u03b2\u20ac\u009d Session Chair: S. Cavallini Session 2 \u2013 \u03b2\u20ac\u009cGrand Hall [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-12","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.kios.ucy.ac.cy\/critis2014\/wp-json\/wp\/v2\/pages\/12","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kios.ucy.ac.cy\/critis2014\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.kios.ucy.ac.cy\/critis2014\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.kios.ucy.ac.cy\/critis2014\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kios.ucy.ac.cy\/critis2014\/wp-json\/wp\/v2\/comments?post=12"}],"version-history":[{"count":12,"href":"https:\/\/www.kios.ucy.ac.cy\/critis2014\/wp-json\/wp\/v2\/pages\/12\/revisions"}],"predecessor-version":[{"id":142,"href":"https:\/\/www.kios.ucy.ac.cy\/critis2014\/wp-json\/wp\/v2\/pages\/12\/revisions\/142"}],"wp:attachment":[{"href":"https:\/\/www.kios.ucy.ac.cy\/critis2014\/wp-json\/wp\/v2\/media?parent=12"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}