語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Critical Infrastructure Protection X...
~
SpringerLink (Online service)
Critical Infrastructure Protection XIV = 14th IFIP WG 11.10 International Conference, ICCIP 2020, Arlington, VA, USA, March 16–17, 2020, Revised Selected Papers /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Critical Infrastructure Protection XIV/ edited by Jason Staggs, Sujeet Shenoi.
其他題名:
14th IFIP WG 11.10 International Conference, ICCIP 2020, Arlington, VA, USA, March 16–17, 2020, Revised Selected Papers /
其他作者:
Staggs, Jason.
面頁冊數:
XVI, 331 p. 112 illus.online resource. :
Contained By:
Springer Nature eBook
標題:
Computer security. -
電子資源:
https://doi.org/10.1007/978-3-030-62840-6
ISBN:
9783030628406
Critical Infrastructure Protection XIV = 14th IFIP WG 11.10 International Conference, ICCIP 2020, Arlington, VA, USA, March 16–17, 2020, Revised Selected Papers /
Critical Infrastructure Protection XIV
14th IFIP WG 11.10 International Conference, ICCIP 2020, Arlington, VA, USA, March 16–17, 2020, Revised Selected Papers /[electronic resource] :edited by Jason Staggs, Sujeet Shenoi. - 1st ed. 2020. - XVI, 331 p. 112 illus.online resource. - IFIP Advances in Information and Communication Technology,5961868-4238 ;. - IFIP Advances in Information and Communication Technology,449.
Aviation Infrastructure Security -- Cyber-Physical Security of Air Traffic Surveillance Systems -- Simulation-Based Logic Bomb Identification and Verification for Unmanned Aerial Vehicles -- Assessing the Cyber Risk of Small Unmanned Aerial Vehicles -- Cyber State Requirements for Design and Validation of Trust in the Critical Transportation Infrastructure -- Vehicle Infrastructure Security -- An Efficient Blockchain Authentication Scheme for Vehicular Ad-Hoc Networks -- Engaging Empirical Dynamic Modeling to Detect Intrusions in Cyber-Physical Systems -- Telecommunications Systems Security -- Multi-Channel Security Through Data Fragmentation -- Securing an InfiniBand Network and its Effect on Performance -- Industrial Control Systems Security -- Cyber-Resilient SCADA Systems via Secure State Restoration -- Vulnerability Assessments of Building Management Systems -- Forensic Investigation of a Hacked Industrial Robot -- Cyber-Physical Systems Security -- Distributed Bias Detection in Cyber-Physical Systems -- Comparison of Design-Centric and Data-Centric Methods for Distributed Attack Detection in Cyber-Physical Systems -- Infrastructure Modeling and Simulation -- A Model-Based Safety-Security Risk Analysis Framework for Interconnected Critical Infrastructures -- Creating a Cross-Domain Simulation Framework for Risk Analyses of Cities -- Modeling Telecommunications Infrastructures Using the CISIApro 2.0 Simulator.
CRITICAL INFRASTRUCTURE PROTECTION XIV Edited by: Jason Staggs and Sujeet Shenoi The information infrastructure---comprising computers, embedded devices, networks and software systems---is vital to operations in every sector: chemicals, commercial facilities, communications, critical manufacturing, dams, defense industrial base, emergency services, energy, financial services, food and agriculture, government facilities, healthcare and public health, information technology, nuclear reactors, materials and waste, transportation systems, and water and wastewater systems. Global business and industry, governments, indeed society itself, cannot function if major components of the critical information infrastructure are degraded, disabled or destroyed. Critical Infrastructure Protection XIV describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. Areas of coverage include: Aviation Infrastructure Security Vehicle Infrastructure Security Telecommunications Systems Security Industrial Control Systems Security Cyber-Physical Systems Security Infrastructure Modeling and Simulation This book is the fourteenth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of sixteen edited papers from the Fourteenth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, held at SRI International, Arlington, Virginia, USA in the spring of 2020. Critical Infrastructure Protection XIV is an important resource for researchers, faculty members and graduate students, as well as for policy makers, practitioners and other individuals with interests in homeland security. Jason Staggs is an Adjunct Assistant Professor of Computer Science at the University of Tulsa, Tulsa, Oklahoma, USA. Sujeet Shenoi is the F.P. Walter Professor of Computer Science and a Professor of Chemical Engineering at the University of Tulsa, Tulsa, Oklahoma, USA.
ISBN: 9783030628406
Standard No.: 10.1007/978-3-030-62840-6doiSubjects--Topical Terms:
557122
Computer security.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Critical Infrastructure Protection XIV = 14th IFIP WG 11.10 International Conference, ICCIP 2020, Arlington, VA, USA, March 16–17, 2020, Revised Selected Papers /
LDR
:05525nam a22004215i 4500
001
1030813
003
DE-He213
005
20201214193437.0
007
cr nn 008mamaa
008
210318s2020 gw | s |||| 0|eng d
020
$a
9783030628406
$9
978-3-030-62840-6
024
7
$a
10.1007/978-3-030-62840-6
$2
doi
035
$a
978-3-030-62840-6
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
245
1 0
$a
Critical Infrastructure Protection XIV
$h
[electronic resource] :
$b
14th IFIP WG 11.10 International Conference, ICCIP 2020, Arlington, VA, USA, March 16–17, 2020, Revised Selected Papers /
$c
edited by Jason Staggs, Sujeet Shenoi.
250
$a
1st ed. 2020.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2020.
300
$a
XVI, 331 p. 112 illus.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
IFIP Advances in Information and Communication Technology,
$x
1868-4238 ;
$v
596
505
0
$a
Aviation Infrastructure Security -- Cyber-Physical Security of Air Traffic Surveillance Systems -- Simulation-Based Logic Bomb Identification and Verification for Unmanned Aerial Vehicles -- Assessing the Cyber Risk of Small Unmanned Aerial Vehicles -- Cyber State Requirements for Design and Validation of Trust in the Critical Transportation Infrastructure -- Vehicle Infrastructure Security -- An Efficient Blockchain Authentication Scheme for Vehicular Ad-Hoc Networks -- Engaging Empirical Dynamic Modeling to Detect Intrusions in Cyber-Physical Systems -- Telecommunications Systems Security -- Multi-Channel Security Through Data Fragmentation -- Securing an InfiniBand Network and its Effect on Performance -- Industrial Control Systems Security -- Cyber-Resilient SCADA Systems via Secure State Restoration -- Vulnerability Assessments of Building Management Systems -- Forensic Investigation of a Hacked Industrial Robot -- Cyber-Physical Systems Security -- Distributed Bias Detection in Cyber-Physical Systems -- Comparison of Design-Centric and Data-Centric Methods for Distributed Attack Detection in Cyber-Physical Systems -- Infrastructure Modeling and Simulation -- A Model-Based Safety-Security Risk Analysis Framework for Interconnected Critical Infrastructures -- Creating a Cross-Domain Simulation Framework for Risk Analyses of Cities -- Modeling Telecommunications Infrastructures Using the CISIApro 2.0 Simulator.
520
$a
CRITICAL INFRASTRUCTURE PROTECTION XIV Edited by: Jason Staggs and Sujeet Shenoi The information infrastructure---comprising computers, embedded devices, networks and software systems---is vital to operations in every sector: chemicals, commercial facilities, communications, critical manufacturing, dams, defense industrial base, emergency services, energy, financial services, food and agriculture, government facilities, healthcare and public health, information technology, nuclear reactors, materials and waste, transportation systems, and water and wastewater systems. Global business and industry, governments, indeed society itself, cannot function if major components of the critical information infrastructure are degraded, disabled or destroyed. Critical Infrastructure Protection XIV describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. Areas of coverage include: Aviation Infrastructure Security Vehicle Infrastructure Security Telecommunications Systems Security Industrial Control Systems Security Cyber-Physical Systems Security Infrastructure Modeling and Simulation This book is the fourteenth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of sixteen edited papers from the Fourteenth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, held at SRI International, Arlington, Virginia, USA in the spring of 2020. Critical Infrastructure Protection XIV is an important resource for researchers, faculty members and graduate students, as well as for policy makers, practitioners and other individuals with interests in homeland security. Jason Staggs is an Adjunct Assistant Professor of Computer Science at the University of Tulsa, Tulsa, Oklahoma, USA. Sujeet Shenoi is the F.P. Walter Professor of Computer Science and a Professor of Chemical Engineering at the University of Tulsa, Tulsa, Oklahoma, USA.
650
0
$a
Computer security.
$3
557122
650
0
$a
Application software.
$3
528147
650
0
$a
Computer communication systems.
$3
1115394
650
0
$a
Computers.
$3
565115
650
0
$a
Law and legislation.
$3
1069250
650
1 4
$a
Systems and Data Security.
$3
677062
650
2 4
$a
Information Systems Applications (incl. Internet).
$3
881699
650
2 4
$a
Computer Communication Networks.
$3
669310
650
2 4
$a
Legal Aspects of Computing.
$3
669901
700
1
$a
Staggs, Jason.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1211604
700
1
$a
Shenoi, Sujeet.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
682167
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783030628390
776
0 8
$i
Printed edition:
$z
9783030628413
776
0 8
$i
Printed edition:
$z
9783030628420
830
0
$a
IFIP Advances in Information and Communication Technology,
$x
1868-4238 ;
$v
449
$3
1255091
856
4 0
$u
https://doi.org/10.1007/978-3-030-62840-6
912
$a
ZDB-2-SCS
912
$a
ZDB-2-SXCS
950
$a
Computer Science (SpringerNature-11645)
950
$a
Computer Science (R0) (SpringerNature-43710)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入