語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Cyber-Physical Security for Critical...
~
Giunta, Gabriele.
Cyber-Physical Security for Critical Infrastructures Protection = First International Workshop, CPS4CIP 2020, Guildford, UK, September 18, 2020, Revised Selected Papers /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Cyber-Physical Security for Critical Infrastructures Protection/ edited by Habtamu Abie, Silvio Ranise, Luca Verderame, Enrico Cambiaso, Rita Ugarelli, Gabriele Giunta, Isabel Praça, Federica Battisti.
其他題名:
First International Workshop, CPS4CIP 2020, Guildford, UK, September 18, 2020, Revised Selected Papers /
其他作者:
Battisti, Federica.
面頁冊數:
X, 225 p. 80 illus., 73 illus. in color.online resource. :
Contained By:
Springer Nature eBook
標題:
Software Engineering/Programming and Operating Systems. -
電子資源:
https://doi.org/10.1007/978-3-030-69781-5
ISBN:
9783030697815
Cyber-Physical Security for Critical Infrastructures Protection = First International Workshop, CPS4CIP 2020, Guildford, UK, September 18, 2020, Revised Selected Papers /
Cyber-Physical Security for Critical Infrastructures Protection
First International Workshop, CPS4CIP 2020, Guildford, UK, September 18, 2020, Revised Selected Papers /[electronic resource] :edited by Habtamu Abie, Silvio Ranise, Luca Verderame, Enrico Cambiaso, Rita Ugarelli, Gabriele Giunta, Isabel Praça, Federica Battisti. - 1st ed. 2021. - X, 225 p. 80 illus., 73 illus. in color.online resource. - Security and Cryptology ;12618. - Security and Cryptology ;9241.
Security Threat Intelligence -- Privacy-Preserving CCTV Analytics for Cyber-Physical Threat Intelligence -- TLSAssistant goes FINSEC: A Security Platform Integration Extending Threat Intelligence Language -- Cyber Threat Monitoring Systems - Comparing attack detection performance of ensemble algorithms -- FINSTIX: a Cyber-Physical Data Model for Financial Critical Infrastructures -- Data Anomaly Detection: Predict & Prevent -- Inferring anomaly situation from multiple data sources in CyberPhysical Systems -- Fusing RGB and Thermal Imagery with Channel State Information for Abnormal Activity Detection using Multimodal Bidirectional LSTM -- A Cloud-Based Anomaly Detection for IoT Big Data -- Computer Vision & Dataset for Security -- An advanced Framework for Critical Infrastructure Protection using computer vision technologies -- A Comprehensive Dataset from a Smart Grid Testbed for Machine Learning based CPS Security Research -- Security Management & Governance -- Cross-Domain Security Asset Management for Healthcare -- Towards a global CIs' cyber-physical security management and joint coordination approach -- Toward a Context-Aware Methodology for Information Security Governance Assessment Validation -- Impact Propagation & Power Traffic Analysis -- Impact Propagation in Airport Systems -- A Comparative Analysis of Emulated and Real IEC-104 Spontaneous Traffic in Power System Networks. .
This book constitutes the refereed proceedings of the First International Workshop on Cyber-Physical Security for Critical Infrastructures Protection, CPS4CIP 2020, which was organized in conjunction with the European Symposium on Research in Computer Security, ESORICS 2020, and held online on September 2020. The 14 full papers presented in this volume were carefully reviewed and selected from 24 submissions. They were organized in topical sections named: security threat intelligence; data anomaly detection: predict and prevent; computer vision and dataset for security; security management and governance; and impact propagation and power traffic analysis. The book contains 6 chapters which are available open access under a CC-BY license. .
ISBN: 9783030697815
Standard No.: 10.1007/978-3-030-69781-5doiSubjects--Topical Terms:
669780
Software Engineering/Programming and Operating Systems.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Cyber-Physical Security for Critical Infrastructures Protection = First International Workshop, CPS4CIP 2020, Guildford, UK, September 18, 2020, Revised Selected Papers /
LDR
:03787nam a22004215i 4500
001
1055517
003
DE-He213
005
20210826154723.0
007
cr nn 008mamaa
008
220103s2021 sz | s |||| 0|eng d
020
$a
9783030697815
$9
978-3-030-69781-5
024
7
$a
10.1007/978-3-030-69781-5
$2
doi
035
$a
978-3-030-69781-5
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
245
1 0
$a
Cyber-Physical Security for Critical Infrastructures Protection
$h
[electronic resource] :
$b
First International Workshop, CPS4CIP 2020, Guildford, UK, September 18, 2020, Revised Selected Papers /
$c
edited by Habtamu Abie, Silvio Ranise, Luca Verderame, Enrico Cambiaso, Rita Ugarelli, Gabriele Giunta, Isabel Praça, Federica Battisti.
250
$a
1st ed. 2021.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2021.
300
$a
X, 225 p. 80 illus., 73 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Security and Cryptology ;
$v
12618
505
0
$a
Security Threat Intelligence -- Privacy-Preserving CCTV Analytics for Cyber-Physical Threat Intelligence -- TLSAssistant goes FINSEC: A Security Platform Integration Extending Threat Intelligence Language -- Cyber Threat Monitoring Systems - Comparing attack detection performance of ensemble algorithms -- FINSTIX: a Cyber-Physical Data Model for Financial Critical Infrastructures -- Data Anomaly Detection: Predict & Prevent -- Inferring anomaly situation from multiple data sources in CyberPhysical Systems -- Fusing RGB and Thermal Imagery with Channel State Information for Abnormal Activity Detection using Multimodal Bidirectional LSTM -- A Cloud-Based Anomaly Detection for IoT Big Data -- Computer Vision & Dataset for Security -- An advanced Framework for Critical Infrastructure Protection using computer vision technologies -- A Comprehensive Dataset from a Smart Grid Testbed for Machine Learning based CPS Security Research -- Security Management & Governance -- Cross-Domain Security Asset Management for Healthcare -- Towards a global CIs' cyber-physical security management and joint coordination approach -- Toward a Context-Aware Methodology for Information Security Governance Assessment Validation -- Impact Propagation & Power Traffic Analysis -- Impact Propagation in Airport Systems -- A Comparative Analysis of Emulated and Real IEC-104 Spontaneous Traffic in Power System Networks. .
520
$a
This book constitutes the refereed proceedings of the First International Workshop on Cyber-Physical Security for Critical Infrastructures Protection, CPS4CIP 2020, which was organized in conjunction with the European Symposium on Research in Computer Security, ESORICS 2020, and held online on September 2020. The 14 full papers presented in this volume were carefully reviewed and selected from 24 submissions. They were organized in topical sections named: security threat intelligence; data anomaly detection: predict and prevent; computer vision and dataset for security; security management and governance; and impact propagation and power traffic analysis. The book contains 6 chapters which are available open access under a CC-BY license. .
650
2 4
$a
Software Engineering/Programming and Operating Systems.
$3
669780
650
2 4
$a
Information Systems Applications (incl. Internet).
$3
881699
650
2 4
$a
Coding and Information Theory.
$3
669784
650
2 4
$a
Computer Communication Networks.
$3
669310
650
1 4
$a
Systems and Data Security.
$3
677062
650
0
$a
Software engineering.
$3
562952
650
0
$a
Application software.
$3
528147
650
0
$a
Information theory.
$3
595305
650
0
$a
Coding theory.
$3
561460
650
0
$a
Computer communication systems.
$3
1115394
650
0
$a
Computer security.
$3
557122
700
1
$a
Battisti, Federica.
$e
editor.
$1
https://orcid.org/0000-0002-0846-5879
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1360722
700
1
$a
Praça, Isabel.
$e
editor.
$1
https://orcid.org/0000-0002-2519-9859
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1360721
700
1
$a
Giunta, Gabriele.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1360720
700
1
$a
Ugarelli, Rita.
$e
editor.
$1
https://orcid.org/0000-0002-2096-8591
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1360719
700
1
$a
Cambiaso, Enrico.
$e
editor.
$1
https://orcid.org/0000-0002-6932-1975
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1360718
700
1
$a
Verderame, Luca.
$e
editor.
$1
https://orcid.org/0000-0001-7155-7429
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1317490
700
1
$a
Ranise, Silvio.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1069335
700
1
$a
Abie, Habtamu.
$e
editor.
$1
https://orcid.org/0000-0003-0866-5050
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1317489
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783030697808
776
0 8
$i
Printed edition:
$z
9783030697822
830
0
$a
Security and Cryptology ;
$v
9241
$3
1254069
856
4 0
$u
https://doi.org/10.1007/978-3-030-69781-5
912
$a
ZDB-2-SCS
912
$a
ZDB-2-SXCS
912
$a
ZDB-2-LNC
950
$a
Computer Science (SpringerNature-11645)
950
$a
Computer Science (R0) (SpringerNature-43710)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入