|
|
|
|
LEADER |
05556nma a2201285 u 4500 |
001 |
EB002048473 |
003 |
EBX01000000000000001192139 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
220822 ||| eng |
020 |
|
|
|a 9783036527277
|
020 |
|
|
|a 9783036527260
|
020 |
|
|
|a books978-3-0365-2727-7
|
100 |
1 |
|
|a Maglaras, Leandros
|
245 |
0 |
0 |
|a Cyber Security of Critical Infrastructures
|h Elektronische Ressource
|
260 |
|
|
|a Basel, Switzerland
|b MDPI - Multidisciplinary Digital Publishing Institute
|c 2021
|
300 |
|
|
|a 1 electronic resource (316 p.)
|
653 |
|
|
|a T-OTP
|
653 |
|
|
|a machine learning
|
653 |
|
|
|a Hasse diagram
|
653 |
|
|
|a post quantum cryptography
|
653 |
|
|
|a probabilistic model checking
|
653 |
|
|
|a image face recognition
|
653 |
|
|
|a deep learning
|
653 |
|
|
|a offensive cybersecurity framework
|
653 |
|
|
|a smart shipping
|
653 |
|
|
|a crypto-ransomware
|
653 |
|
|
|a tools combination
|
653 |
|
|
|a interval-valued complex intuitionistic fuzzy relations
|
653 |
|
|
|a Technology: general issues / bicssc
|
653 |
|
|
|a interval-valued complex intuitionistic fuzzy sets
|
653 |
|
|
|a assessment methodology
|
653 |
|
|
|a industrial control system
|
653 |
|
|
|a GDPR
|
653 |
|
|
|a dynamic malware analysis
|
653 |
|
|
|a risk assessment
|
653 |
|
|
|a cyber-ranges
|
653 |
|
|
|a static analysis
|
653 |
|
|
|a cyber exercises
|
653 |
|
|
|a cyber ranges
|
653 |
|
|
|a security
|
653 |
|
|
|a static analysis security testing
|
653 |
|
|
|a formal verification
|
653 |
|
|
|a lattice cryptography
|
653 |
|
|
|a interactive analysis security testing
|
653 |
|
|
|a static malware analysis
|
653 |
|
|
|a encryption algorithms
|
653 |
|
|
|a dynamic analysis security testing
|
653 |
|
|
|a bloom
|
653 |
|
|
|a image classification
|
653 |
|
|
|a dynamic analysis
|
653 |
|
|
|a scoring model
|
653 |
|
|
|a DSPT
|
653 |
|
|
|a cyber-attacks
|
653 |
|
|
|a cybersecurity
|
653 |
|
|
|a deep learning algorithms
|
653 |
|
|
|a training programmes
|
653 |
|
|
|a random forest
|
653 |
|
|
|a support vector machines
|
653 |
|
|
|a n/a
|
653 |
|
|
|a security training
|
653 |
|
|
|a offensive cybersecurity
|
653 |
|
|
|a web application
|
653 |
|
|
|a PCI-DSS
|
653 |
|
|
|a military
|
653 |
|
|
|a computers in education
|
653 |
|
|
|a high performance computing
|
653 |
|
|
|a public key infrastructure
|
653 |
|
|
|a CNR
|
653 |
|
|
|a locker-ransomware
|
653 |
|
|
|a false positive
|
653 |
|
|
|a security modelling
|
653 |
|
|
|a hash chain
|
653 |
|
|
|a serious games
|
653 |
|
|
|a transfer learning
|
653 |
|
|
|a false negative
|
653 |
|
|
|a malware analysis
|
653 |
|
|
|a education
|
653 |
|
|
|a threat modeling
|
653 |
|
|
|a malware classification
|
653 |
|
|
|a training
|
653 |
|
|
|a code cryptography
|
653 |
|
|
|a research
|
653 |
|
|
|a smart grid
|
653 |
|
|
|a NISD
|
653 |
|
|
|a VMF
|
653 |
|
|
|a cloud robotics
|
653 |
|
|
|a lightweight secure hash (LSH)
|
653 |
|
|
|a STRIDE
|
653 |
|
|
|a physical unclonable function
|
653 |
|
|
|a testbeds
|
653 |
|
|
|a security vulnerability
|
653 |
|
|
|a fine-tuning
|
653 |
|
|
|a assessment framework
|
653 |
|
|
|a analysis security testing
|
653 |
|
|
|a cybercrime
|
653 |
|
|
|a dynamic adaptation
|
700 |
1 |
|
|a Kantzavelou, Ioanna
|
700 |
1 |
|
|a Ferrag, Mohamed Amine
|
700 |
1 |
|
|a Maglaras, Leandros
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b DOAB
|a Directory of Open Access Books
|
500 |
|
|
|a Creative Commons (cc), https://creativecommons.org/licenses/by/4.0/
|
028 |
5 |
0 |
|a 10.3390/books978-3-0365-2727-7
|
856 |
4 |
2 |
|u https://directory.doabooks.org/handle/20.500.12854/77132
|z DOAB: description of the publication
|
856 |
4 |
0 |
|u https://www.mdpi.com/books/pdfview/book/4750
|7 0
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 370
|
082 |
0 |
|
|a 700
|
082 |
0 |
|
|a 600
|
520 |
|
|
|a Critical infrastructures are vital assets for public safety, economic welfare, and the national security of countries. The vulnerabilities of critical infrastructures have increased with the widespread use of information technologies. As Critical National Infrastructures are becoming more vulnerable to cyber-attacks, their protection becomes a significant issue for organizations as well as nations. The risks to continued operations, from failing to upgrade aging infrastructure or not meeting mandated regulatory regimes, are considered highly significant, given the demonstrable impact of such circumstances. Due to the rapid increase of sophisticated cyber threats targeting critical infrastructures with significant destructive effects, the cybersecurity of critical infrastructures has become an agenda item for academics, practitioners, and policy makers. A holistic view which covers technical, policy, human, and behavioural aspects is essential to handle cyber security of critical infrastructures effectively. Moreover, the ability to attribute crimes to criminals is a vital element of avoiding impunity in cyberspace. In this book, both research and practical aspects of cyber security considerations in critical infrastructures are presented. Aligned with the interdisciplinary nature of cyber security, authors from academia, government, and industry have contributed 13 chapters. The issues that are discussed and analysed include cybersecurity training, maturity assessment frameworks, malware analysis techniques, ransomware attacks, security solutions for industrial control systems, and privacy preservation methods.
|