語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Critical Information Infrastructures...
~
Polycarpou, Marios M.
Critical Information Infrastructures Security = 9th International Conference, CRITIS 2014, Limassol, Cyprus, October 13-15, 2014, Revised Selected Papers /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Critical Information Infrastructures Security/ edited by Christos G. Panayiotou, Georgios Ellinas, Elias Kyriakides, Marios M. Polycarpou.
其他題名:
9th International Conference, CRITIS 2014, Limassol, Cyprus, October 13-15, 2014, Revised Selected Papers /
其他作者:
Panayiotou, Christos G.
面頁冊數:
XIV, 388 p. 139 illus.online resource. :
Contained By:
Springer Nature eBook
標題:
Computer security. -
電子資源:
https://doi.org/10.1007/978-3-319-31664-2
ISBN:
9783319316642
Critical Information Infrastructures Security = 9th International Conference, CRITIS 2014, Limassol, Cyprus, October 13-15, 2014, Revised Selected Papers /
Critical Information Infrastructures Security
9th International Conference, CRITIS 2014, Limassol, Cyprus, October 13-15, 2014, Revised Selected Papers /[electronic resource] :edited by Christos G. Panayiotou, Georgios Ellinas, Elias Kyriakides, Marios M. Polycarpou. - 1st ed. 2016. - XIV, 388 p. 139 illus.online resource. - Security and Cryptology ;8985. - Security and Cryptology ;9241.
Cyber-Physical Systems and Sensor Networks -- Fault Detection and Isolation in Critical Infrastructure Systems -- Critical Infrastructure in the Future City - Developing Secure and Resilient Cyber–Physical Systems -- Exploitation of HART Wired Signal Distinct Native Attribute (WS-DNA) Features to verify Field Device Identity and Infer Operating State -- Processing and Communications Rate Requirements in Sensor Networks for Physical Thread Assessment -- A Comprehensive Approach for Security Assessment in Transport -- Security of Water Systems -- Decentralised Hierarchical Multi-rate Control of Large-scale Drinking Water Networks -- dbpRisk: Disinfection By-Product Risk Estimation -- Gaussian-Process-based Demand Forecasting for Predictive Control of Drinking Water Networks -- Graph-Based Hydraulic Vulnerability Assessment of Water Distribution Networks -- Sensor Data Validation and Reconstruction in Water Networks: A Methodology and Software Implementation -- Critical Infrastructure Online Fault Detection: Application in Water Supply Systems -- Power and Energy System Security -- An Attack Analysis of Managed Pressure Drilling Systems on Oil Drilling Platforms -- The Effect of Branch Parameter Errors to Voltage Stability Indices -- CFD Simulation of Contaminant Transportation in High-Risk Buildings using CONTAM -- Detection and Management of Large Scale Disturbances in Power System -- Impact of Surface Nuclear Blast on the Transient Stability of the Power System -- Building an Integrated Metric for Quantifying the Resilience of Interdependent Infrastructure Systems -- Calculation of Cyber Security Index in the Problem of Power System State Estimation based on SCADA and WAMS Measurements -- Factors influencing Oscillations within Meshed HVDC Grids and Implications for DC Voltage Control -- Security and Recovery Policies -- Public-private Partnership: The Missing Factor in the Resilience Equation - The French Experience on CIIP -- Enterprise Security Analysis and Training Experience -- Using Programmable Data Networks to Detect Critical Infrastructure Challenges -- Security Stress: Evaluating ICT Robustness through a Monte Carlo Method -- Cyber Security -- Model-based Evaluation of the Resilience of Critical Infrastructures under Cyber Attacks -- The Role of One-Class Classification in Detecting Cyberattacks in Critical Infrastructures -- Cyber Attacks in Power Grid ICT Systems leading to Financial Disturbance -- Obfuscation of Critical Infrastructure Network Traffic using Fake Communication -- CyNetPhy: Towards Pervasive Defense-in-Depth for Smart Grid Security -- Faults and Cyber Attacks Detection in Critical Infrastructures -- Security Tools and Protocols -- Recovering Structural Controllability on Erdős–Rényi Graphs via Partial Control Structure Re-Use -- Self-healing Protocols for Infrastructural Networks -- PRoCeeD: Process State Prediction for CRITIS using Process Inherent Causal Data and Discrete Event Models -- Cascading Failures: Dynamic Model for CIP Purposes - Case of Random Independent Failures following Poisson Stochastic Process -- A Security Assessment Methodology for Critical Infrastructures -- Automatic Fault Identification in Sensor Networks Based on Probabilistic Modeling -- Improving Situational Awareness for First Responders -- A Decision Support System for Emergency Management of Critical Infrastructures subjected to Natural Hazards -- Progressive Recovery from Failure in Multi-layered Interdependent Network Using a New Model of Interdependency -- Model-based Security Risk Analysis for Networked Embedded Systems.
This book constitutes revised selected papers from the 9th International Conference on Critical Information Infrastructures Security, CRITIS 2014, held in Limassol, Cyprus, in October 2014. The 20 full and 19 short papers presented in this volume were carefully reviewed and selected from 74 submissions. They are organized in topical sections named: cyber-physical systems and sensor networks; security of water systems; power and energy system security; security and recovery policies, cyber security; and security tools and protocols. .
ISBN: 9783319316642
Standard No.: 10.1007/978-3-319-31664-2doiSubjects--Topical Terms:
557122
Computer security.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Critical Information Infrastructures Security = 9th International Conference, CRITIS 2014, Limassol, Cyprus, October 13-15, 2014, Revised Selected Papers /
LDR
:05690nam a22004215i 4500
001
972892
003
DE-He213
005
20200630142811.0
007
cr nn 008mamaa
008
201211s2016 gw | s |||| 0|eng d
020
$a
9783319316642
$9
978-3-319-31664-2
024
7
$a
10.1007/978-3-319-31664-2
$2
doi
035
$a
978-3-319-31664-2
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
245
1 0
$a
Critical Information Infrastructures Security
$h
[electronic resource] :
$b
9th International Conference, CRITIS 2014, Limassol, Cyprus, October 13-15, 2014, Revised Selected Papers /
$c
edited by Christos G. Panayiotou, Georgios Ellinas, Elias Kyriakides, Marios M. Polycarpou.
250
$a
1st ed. 2016.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2016.
300
$a
XIV, 388 p. 139 illus.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Security and Cryptology ;
$v
8985
505
0
$a
Cyber-Physical Systems and Sensor Networks -- Fault Detection and Isolation in Critical Infrastructure Systems -- Critical Infrastructure in the Future City - Developing Secure and Resilient Cyber–Physical Systems -- Exploitation of HART Wired Signal Distinct Native Attribute (WS-DNA) Features to verify Field Device Identity and Infer Operating State -- Processing and Communications Rate Requirements in Sensor Networks for Physical Thread Assessment -- A Comprehensive Approach for Security Assessment in Transport -- Security of Water Systems -- Decentralised Hierarchical Multi-rate Control of Large-scale Drinking Water Networks -- dbpRisk: Disinfection By-Product Risk Estimation -- Gaussian-Process-based Demand Forecasting for Predictive Control of Drinking Water Networks -- Graph-Based Hydraulic Vulnerability Assessment of Water Distribution Networks -- Sensor Data Validation and Reconstruction in Water Networks: A Methodology and Software Implementation -- Critical Infrastructure Online Fault Detection: Application in Water Supply Systems -- Power and Energy System Security -- An Attack Analysis of Managed Pressure Drilling Systems on Oil Drilling Platforms -- The Effect of Branch Parameter Errors to Voltage Stability Indices -- CFD Simulation of Contaminant Transportation in High-Risk Buildings using CONTAM -- Detection and Management of Large Scale Disturbances in Power System -- Impact of Surface Nuclear Blast on the Transient Stability of the Power System -- Building an Integrated Metric for Quantifying the Resilience of Interdependent Infrastructure Systems -- Calculation of Cyber Security Index in the Problem of Power System State Estimation based on SCADA and WAMS Measurements -- Factors influencing Oscillations within Meshed HVDC Grids and Implications for DC Voltage Control -- Security and Recovery Policies -- Public-private Partnership: The Missing Factor in the Resilience Equation - The French Experience on CIIP -- Enterprise Security Analysis and Training Experience -- Using Programmable Data Networks to Detect Critical Infrastructure Challenges -- Security Stress: Evaluating ICT Robustness through a Monte Carlo Method -- Cyber Security -- Model-based Evaluation of the Resilience of Critical Infrastructures under Cyber Attacks -- The Role of One-Class Classification in Detecting Cyberattacks in Critical Infrastructures -- Cyber Attacks in Power Grid ICT Systems leading to Financial Disturbance -- Obfuscation of Critical Infrastructure Network Traffic using Fake Communication -- CyNetPhy: Towards Pervasive Defense-in-Depth for Smart Grid Security -- Faults and Cyber Attacks Detection in Critical Infrastructures -- Security Tools and Protocols -- Recovering Structural Controllability on Erdős–Rényi Graphs via Partial Control Structure Re-Use -- Self-healing Protocols for Infrastructural Networks -- PRoCeeD: Process State Prediction for CRITIS using Process Inherent Causal Data and Discrete Event Models -- Cascading Failures: Dynamic Model for CIP Purposes - Case of Random Independent Failures following Poisson Stochastic Process -- A Security Assessment Methodology for Critical Infrastructures -- Automatic Fault Identification in Sensor Networks Based on Probabilistic Modeling -- Improving Situational Awareness for First Responders -- A Decision Support System for Emergency Management of Critical Infrastructures subjected to Natural Hazards -- Progressive Recovery from Failure in Multi-layered Interdependent Network Using a New Model of Interdependency -- Model-based Security Risk Analysis for Networked Embedded Systems.
520
$a
This book constitutes revised selected papers from the 9th International Conference on Critical Information Infrastructures Security, CRITIS 2014, held in Limassol, Cyprus, in October 2014. The 20 full and 19 short papers presented in this volume were carefully reviewed and selected from 74 submissions. They are organized in topical sections named: cyber-physical systems and sensor networks; security of water systems; power and energy system security; security and recovery policies, cyber security; and security tools and protocols. .
650
0
$a
Computer security.
$3
557122
650
0
$a
Computers and civilization.
$3
556557
650
0
$a
Computer communication systems.
$3
1115394
650
0
$a
Application software.
$3
528147
650
0
$a
Computer system failures.
$3
782237
650
1 4
$a
Systems and Data Security.
$3
677062
650
2 4
$a
Computers and Society.
$3
669900
650
2 4
$a
Computer Communication Networks.
$3
669310
650
2 4
$a
Information Systems Applications (incl. Internet).
$3
881699
650
2 4
$a
System Performance and Evaluation.
$3
669346
700
1
$a
Panayiotou, Christos G.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1106636
700
1
$a
Ellinas, Georgios.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
889265
700
1
$a
Kyriakides, Elias.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1062808
700
1
$a
Polycarpou, Marios M.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
884018
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783319316635
776
0 8
$i
Printed edition:
$z
9783319316659
830
0
$a
Security and Cryptology ;
$v
9241
$3
1254069
856
4 0
$u
https://doi.org/10.1007/978-3-319-31664-2
912
$a
ZDB-2-SCS
912
$a
ZDB-2-SXCS
912
$a
ZDB-2-LNC
950
$a
Computer Science (SpringerNature-11645)
950
$a
Computer Science (R0) (SpringerNature-43710)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入