Cyber-Physical Security for Critical Infrastructures Protection First International Workshop, CPS4CIP 2020, Guildford, UK, September 18, 2020, Revised Selected Papers

This book constitutes the refereed proceedings of the First International Workshop on Cyber-Physical Security for Critical Infrastructures Protection, CPS4CIP 2020, which was organized in conjunction with the European Symposium on Research in Computer Security, ESORICS 2020, and held online on Septe...

Full description

Bibliographic Details
Other Authors: Abie, Habtamu (Editor), Ranise, Silvio (Editor), Verderame, Luca (Editor), Cambiaso, Enrico (Editor)
Format: eBook
Language:English
Published: Cham Springer International Publishing 2021, 2021
Edition:1st ed. 2021
Series:Security and Cryptology
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
LEADER 03822nmm a2200421 u 4500
001 EB001959495
003 EBX01000000000000001122397
005 00000000000000.0
007 cr|||||||||||||||||||||
008 210312 ||| eng
020 |a 9783030697815 
100 1 |a Abie, Habtamu  |e [editor] 
245 0 0 |a Cyber-Physical Security for Critical Infrastructures Protection  |h Elektronische Ressource  |b First International Workshop, CPS4CIP 2020, Guildford, UK, September 18, 2020, Revised Selected Papers  |c edited by Habtamu Abie, Silvio Ranise, Luca Verderame, Enrico Cambiaso, Rita Ugarelli, Gabriele Giunta, Isabel Praça, Federica Battisti 
250 |a 1st ed. 2021 
260 |a Cham  |b Springer International Publishing  |c 2021, 2021 
300 |a X, 225 p. 80 illus., 73 illus. in color  |b online resource 
505 0 |a Security Threat Intelligence -- Privacy-Preserving CCTV Analytics for Cyber-Physical Threat Intelligence -- TLSAssistant goes FINSEC: A Security Platform Integration Extending Threat Intelligence Language -- Cyber Threat Monitoring Systems - Comparing attack detection performance of ensemble algorithms -- FINSTIX: a Cyber-Physical Data Model for Financial Critical Infrastructures -- Data Anomaly Detection: Predict & Prevent -- Inferring anomaly situation from multiple data sources in CyberPhysical Systems -- Fusing RGB and Thermal Imagery with Channel State Information for Abnormal Activity Detection using Multimodal Bidirectional LSTM -- A Cloud-Based Anomaly Detection for IoT Big Data -- Computer Vision & Dataset for Security -- An advanced Framework for Critical Infrastructure Protection using computer vision technologies -- A Comprehensive Dataset from a Smart Grid Testbed for Machine Learning based CPS Security Research -- Security Management & Governance -- Cross-Domain Security Asset Management for Healthcare -- Towards a global CIs' cyber-physical security management and joint coordination approach -- Toward a Context-Aware Methodology for Information Security Governance Assessment Validation -- Impact Propagation & Power Traffic Analysis -- Impact Propagation in Airport Systems -- A Comparative Analysis of Emulated and Real IEC-104 Spontaneous Traffic in Power System Networks. 
653 |a Computer Communication Networks 
653 |a Coding and Information Theory 
653 |a Coding theory 
653 |a Software engineering 
653 |a Software Engineering 
653 |a Application software 
653 |a Computer networks  
653 |a Data protection 
653 |a Information theory 
653 |a Computer and Information Systems Applications 
653 |a Data and Information Security 
700 1 |a Ranise, Silvio  |e [editor] 
700 1 |a Verderame, Luca  |e [editor] 
700 1 |a Cambiaso, Enrico  |e [editor] 
041 0 7 |a eng  |2 ISO 639-2 
989 |b Springer  |a Springer eBooks 2005- 
490 0 |a Security and Cryptology 
028 5 0 |a 10.1007/978-3-030-69781-5 
856 4 0 |u https://doi.org/10.1007/978-3-030-69781-5?nosfx=y  |x Verlag  |3 Volltext 
082 0 |a 005.8 
520 |a This book constitutes the refereed proceedings of the First International Workshop on Cyber-Physical Security for Critical Infrastructures Protection, CPS4CIP 2020, which was organized in conjunction with the European Symposium on Research in Computer Security, ESORICS 2020, and held online on September 2020. The 14 full papers presented in this volume were carefully reviewed and selected from 24 submissions. They were organized in topical sections named: security threat intelligence; data anomaly detection: predict and prevent; computer vision and dataset for security; security management and governance; and impact propagation and power traffic analysis. The book contains 6 chapters which are available open access under a CC-BY license.