Critical Information Infrastructures Security 4th International Workshop, CRITIS 2009, Bonn, Germany, September 30 - October 2, 2009, Revised Papers

Bibliographic Details
Other Authors: Rome, Erich (Editor), Bloomfield, Robin (Editor)
Format: eBook
Language:English
Published: Berlin, Heidelberg Springer Berlin Heidelberg 2010, 2010
Edition:1st ed. 2010
Series:Security and Cryptology
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
LEADER 03064nmm a2200409 u 4500
001 EB000384862
003 EBX01000000000000000237914
005 00000000000000.0
007 cr|||||||||||||||||||||
008 130626 ||| eng
020 |a 9783642143793 
100 1 |a Rome, Erich  |e [editor] 
245 0 0 |a Critical Information Infrastructures Security  |h Elektronische Ressource  |b 4th International Workshop, CRITIS 2009, Bonn, Germany, September 30 - October 2, 2009, Revised Papers  |c edited by Erich Rome, Robin Bloomfield 
250 |a 1st ed. 2010 
260 |a Berlin, Heidelberg  |b Springer Berlin Heidelberg  |c 2010, 2010 
300 |a XII, 213 p. 70 illus  |b online resource 
505 0 |a On Modelling of Inter-dependent Network Infrastructures by Extended Leontief Models -- Critical Infrastructure Protection in Brazil - Threat Identification and Analysis -- Development of Information Security-Focused Incident Prevention Measures for Critical Information Infrastructure in Japan -- Design of a Mobile Agent-Based Adaptive Communication Middleware for Federations of Critical Infrastructure Simulations -- An Alternate Topology Generator for Joint Study of Power Grids and Communication Networks -- Trouble Brewing: Using Observations of Invariant Behavior to Detect Malicious Agency in Distributed Control Systems -- Optimisation of Critical Infrastructure Protection: The SiVe Project on Airport Security -- Cyber-Critical Infrastructure Protection Using Real-Time Payload-Based Anomaly Detection -- Decision Aid Tool and Ontology-Based Reasoning for Critical Infrastructure Vulnerabilities and Threats Analysis -- Application Filters for TCP/IP Industrial Automation Protocols -- Web Browser Security Update Effectiveness -- State-Based Network Intrusion Detection Systems for SCADA Protocols: A Proof of Concept -- Towards Early Warning Systems – Challenges, Technologies and Architecture -- CII Protection - Lessons for Developing Countries: South Africa as a Case Study -- Energy Theft in the Advanced Metering Infrastructure -- Current Capabilities, Requirements and a Proposed Strategy for Interdependency Analysis in the UK -- Stochastic Modelling of the Effects of Interdependencies between Critical Infrastructure 
653 |a Computer Communication Networks 
653 |a Computer science 
653 |a Hardware Performance and Reliability 
653 |a Cryptography 
653 |a Electronic data processing / Management 
653 |a Computers 
653 |a Computer networks  
653 |a Data encryption (Computer science) 
653 |a Cryptology 
653 |a Theory of Computation 
653 |a Special Purpose and Application-Based Systems 
653 |a Computers, Special purpose 
653 |a IT Operations 
700 1 |a Bloomfield, Robin  |e [editor] 
041 0 7 |a eng  |2 ISO 639-2 
989 |b Springer  |a Springer eBooks 2005- 
490 0 |a Security and Cryptology 
028 5 0 |a 10.1007/978-3-642-14379-3 
856 4 0 |u https://doi.org/10.1007/978-3-642-14379-3?nosfx=y  |x Verlag  |3 Volltext 
082 0 |a 004.6