|
|
|
|
LEADER |
05556nma a2201285 u 4500 |
001 |
EB002048473 |
003 |
EBX01000000000000001192139 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
220822 ||| eng |
020 |
|
|
|a 9783036527277
|
020 |
|
|
|a 9783036527260
|
020 |
|
|
|a books978-3-0365-2727-7
|
100 |
1 |
|
|a Maglaras, Leandros
|
245 |
0 |
0 |
|a Cyber Security of Critical Infrastructures
|h Elektronische Ressource
|
260 |
|
|
|a Basel, Switzerland
|b MDPI - Multidisciplinary Digital Publishing Institute
|c 2021
|
300 |
|
|
|a 1 electronic resource (316 p.)
|
653 |
|
|
|a T-OTP
|
653 |
|
|
|a machine learning
|
653 |
|
|
|a Hasse diagram
|
653 |
|
|
|a training programmes
|
653 |
|
|
|a post quantum cryptography
|
653 |
|
|
|a probabilistic model checking
|
653 |
|
|
|a random forest
|
653 |
|
|
|a support vector machines
|
653 |
|
|
|a n/a
|
653 |
|
|
|a security training
|
653 |
|
|
|a offensive cybersecurity
|
653 |
|
|
|a image face recognition
|
653 |
|
|
|a web application
|
653 |
|
|
|a deep learning
|
653 |
|
|
|a PCI-DSS
|
653 |
|
|
|a offensive cybersecurity framework
|
653 |
|
|
|a military
|
653 |
|
|
|a computers in education
|
653 |
|
|
|a high performance computing
|
653 |
|
|
|a public key infrastructure
|
653 |
|
|
|a CNR
|
653 |
|
|
|a locker-ransomware
|
653 |
|
|
|a smart shipping
|
653 |
|
|
|a crypto-ransomware
|
653 |
|
|
|a tools combination
|
653 |
|
|
|a interval-valued complex intuitionistic fuzzy relations
|
653 |
|
|
|a false positive
|
653 |
|
|
|a Technology: general issues / bicssc
|
653 |
|
|
|a interval-valued complex intuitionistic fuzzy sets
|
653 |
|
|
|a industrial control system
|
653 |
|
|
|a assessment methodology
|
653 |
|
|
|a security modelling
|
653 |
|
|
|a GDPR
|
653 |
|
|
|a hash chain
|
653 |
|
|
|a serious games
|
653 |
|
|
|a transfer learning
|
653 |
|
|
|a risk assessment
|
653 |
|
|
|a dynamic malware analysis
|
653 |
|
|
|a cyber-ranges
|
653 |
|
|
|a static analysis
|
653 |
|
|
|a false negative
|
653 |
|
|
|a cyber exercises
|
653 |
|
|
|a malware analysis
|
653 |
|
|
|a cyber ranges
|
653 |
|
|
|a security
|
653 |
|
|
|a formal verification
|
653 |
|
|
|a education
|
653 |
|
|
|a static analysis security testing
|
653 |
|
|
|a threat modeling
|
653 |
|
|
|a malware classification
|
653 |
|
|
|a lattice cryptography
|
653 |
|
|
|a training
|
653 |
|
|
|a interactive analysis security testing
|
653 |
|
|
|a code cryptography
|
653 |
|
|
|a research
|
653 |
|
|
|a smart grid
|
653 |
|
|
|a static malware analysis
|
653 |
|
|
|a NISD
|
653 |
|
|
|a VMF
|
653 |
|
|
|a cloud robotics
|
653 |
|
|
|a encryption algorithms
|
653 |
|
|
|a dynamic analysis security testing
|
653 |
|
|
|a bloom
|
653 |
|
|
|a lightweight secure hash (LSH)
|
653 |
|
|
|a image classification
|
653 |
|
|
|a STRIDE
|
653 |
|
|
|a physical unclonable function
|
653 |
|
|
|a testbeds
|
653 |
|
|
|a scoring model
|
653 |
|
|
|a dynamic analysis
|
653 |
|
|
|a security vulnerability
|
653 |
|
|
|a fine-tuning
|
653 |
|
|
|a DSPT
|
653 |
|
|
|a assessment framework
|
653 |
|
|
|a cyber-attacks
|
653 |
|
|
|a analysis security testing
|
653 |
|
|
|a cybersecurity
|
653 |
|
|
|a cybercrime
|
653 |
|
|
|a deep learning algorithms
|
653 |
|
|
|a dynamic adaptation
|
700 |
1 |
|
|a Kantzavelou, Ioanna
|
700 |
1 |
|
|a Ferrag, Mohamed Amine
|
700 |
1 |
|
|a Maglaras, Leandros
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b DOAB
|a Directory of Open Access Books
|
500 |
|
|
|a Creative Commons (cc), https://creativecommons.org/licenses/by/4.0/
|
024 |
8 |
|
|a 10.3390/books978-3-0365-2727-7
|
856 |
4 |
0 |
|u https://www.mdpi.com/books/pdfview/book/4750
|7 0
|x Verlag
|3 Volltext
|
856 |
4 |
2 |
|u https://directory.doabooks.org/handle/20.500.12854/77132
|z DOAB: description of the publication
|
082 |
0 |
|
|a 370
|
082 |
0 |
|
|a 700
|
082 |
0 |
|
|a 600
|
520 |
|
|
|a Critical infrastructures are vital assets for public safety, economic welfare, and the national security of countries. The vulnerabilities of critical infrastructures have increased with the widespread use of information technologies. As Critical National Infrastructures are becoming more vulnerable to cyber-attacks, their protection becomes a significant issue for organizations as well as nations. The risks to continued operations, from failing to upgrade aging infrastructure or not meeting mandated regulatory regimes, are considered highly significant, given the demonstrable impact of such circumstances. Due to the rapid increase of sophisticated cyber threats targeting critical infrastructures with significant destructive effects, the cybersecurity of critical infrastructures has become an agenda item for academics, practitioners, and policy makers. A holistic view which covers technical, policy, human, and behavioural aspects is essential to handle cyber security of critical infrastructures effectively. Moreover, the ability to attribute crimes to criminals is a vital element of avoiding impunity in cyberspace. In this book, both research and practical aspects of cyber security considerations in critical infrastructures are presented. Aligned with the interdisciplinary nature of cyber security, authors from academia, government, and industry have contributed 13 chapters. The issues that are discussed and analysed include cybersecurity training, maturity assessment frameworks, malware analysis techniques, ransomware attacks, security solutions for industrial control systems, and privacy preservation methods.
|