|
|
|
|
LEADER |
03499nmm a2200397 u 4500 |
001 |
EB000412695 |
003 |
EBX01000000000000000265769 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
131001 ||| eng |
020 |
|
|
|a 9783642414763
|
100 |
1 |
|
|a Bologna, Sandro
|e [editor]
|
245 |
0 |
0 |
|a Critical Information Infrastructure Security
|h Elektronische Ressource
|b 6th International Workshop, CRITIS 2011, Lucerne, Switzerland, September 8-9, 2011, Revised Selected Papers
|c edited by Sandro Bologna, Bernhard Hämmerli, Dimitris Gritzalis, Stephen Wolthusen
|
250 |
|
|
|a 1st ed. 2013
|
260 |
|
|
|a Berlin, Heidelberg
|b Springer Berlin Heidelberg
|c 2013, 2013
|
300 |
|
|
|a XII, 227 p. 56 illus
|b online resource
|
505 |
0 |
|
|a Ten National Cyber Security Strategies: A Comparison -- Analysis of Dependencies in Critical Infrastructures -- Assurance and Trust Indicators to Evaluate Accuracy of On-line Risk in Critical Infrastructures -- An Innovative Approach to Emergency Management in Large Infrastructures -- Dynamic Evacuation Guidance as Safety Critical Application in Building Automation -- Defeating Node Based Attacks on SCADA Systems Using Probabilistic Packet Observation -- Sub-optimal Topological Protection Strategy from Advanced Malware -- The Insider Threat in Cloud Computing -- Interdependencies between Critical Infrastructures: Analyzing the Risk of Cascading Effects -- How to Perform Verification and Validation of Critical Infrastructure Modeling Tools -- Petri Net Modelling of Physical Vulnerability -- Investigating the Effect of Network Parameters on Coordinated Cyber Attacks Against a Simulated Power Plant -- The Role of the DNS in the Secure and Resilient Operation of CIs, the Energy System Example -- The Development of Warning, Advice and Reporting Points (WARPs) in UK National Infrastructure -- The Contribution of NEISAS to EP3R -- Policies to Improve Resilience against Major Industrial Accidents -- Fuzzy Input-Output Inoperability Model -- Dependencies Discovery and Analysis in Distributed Systems -- Protecting Critical Infrastructures from Stealth Attacks: A Closed-Loop Approach Involving Detection and Remediation -- Risk Assessment in Critical Infrastructure Security Modelling Based on Dependency Analysis -- Countermeasures Selection via Evidence Theory -- The Robustness of Assortativity
|
653 |
|
|
|a Computer Communication Networks
|
653 |
|
|
|a Computers and Society
|
653 |
|
|
|a Cryptography
|
653 |
|
|
|a Computer networks
|
653 |
|
|
|a Data protection
|
653 |
|
|
|a Data encryption (Computer science)
|
653 |
|
|
|a Cryptology
|
653 |
|
|
|a Data and Information Security
|
653 |
|
|
|a Computers and civilization
|
700 |
1 |
|
|a Hämmerli, Bernhard
|e [editor]
|
700 |
1 |
|
|a Gritzalis, Dimitris
|e [editor]
|
700 |
1 |
|
|a Wolthusen, Stephen
|e [editor]
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b Springer
|a Springer eBooks 2005-
|
490 |
0 |
|
|a Security and Cryptology
|
028 |
5 |
0 |
|a 10.1007/978-3-642-41476-3
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-642-41476-3?nosfx=y
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 005.8
|
520 |
|
|
|a This book constitutes revised selected papers from the 6th International Workshop on Critical Information Infrastructure Security, CRITIS 2011, held in Lucerne, Switzerland, in September 2011. The 16 full papers and 6 short papers presented in this volume were carefully reviewed and selected from 38 submissions. They deal with all areas of critical infrastructure protection research
|