Cyber Security and Critical Infrastructures 2nd Volume

The second volume of the book contains the manuscripts that were accepted for publication in the MDPI Special Topic "Cyber Security and Critical Infrastructure" after a rigorous peer-review process. Authors from academia, government and industry contributed their innovative solutions, cons...

Full description

Bibliographic Details
Main Author: Maglaras, Leandros
Other Authors: Janicke, Helge, Ferrag, Mohamed Amine
Format: eBook
Language:English
Published: Basel MDPI - Multidisciplinary Digital Publishing Institute 2022
Subjects:
Online Access:
Collection: Directory of Open Access Books - Collection details see MPG.ReNa
LEADER 02009nma a2200385 u 4500
001 EB002143706
003 EBX01000000000000001281832
005 00000000000000.0
007 cr|||||||||||||||||||||
008 230202 ||| eng
020 |a 9783036556611 
020 |a 9783036556628 
020 |a books978-3-0365-5662-8 
100 1 |a Maglaras, Leandros 
245 0 0 |a Cyber Security and Critical Infrastructures 2nd Volume  |h Elektronische Ressource 
260 |a Basel  |b MDPI - Multidisciplinary Digital Publishing Institute  |c 2022 
300 |a 1 electronic resource (326 p.) 
653 |a Cybersecurity 
653 |a critical Infrastructures 
653 |a History of engineering & technology / bicssc 
653 |a Technology: general issues / bicssc 
653 |a privacy preservation 
700 1 |a Janicke, Helge 
700 1 |a Ferrag, Mohamed Amine 
700 1 |a Maglaras, Leandros 
041 0 7 |a eng  |2 ISO 639-2 
989 |b DOAB  |a Directory of Open Access Books 
500 |a Creative Commons (cc), https://creativecommons.org/licenses/by/4.0/ 
028 5 0 |a 10.3390/books978-3-0365-5662-8 
856 4 2 |u https://directory.doabooks.org/handle/20.500.12854/94519  |z DOAB: description of the publication 
856 4 0 |u https://www.mdpi.com/books/pdfview/topic/6351  |7 0  |x Verlag  |3 Volltext 
082 0 |a 900 
082 0 |a 600 
082 0 |a 620 
520 |a The second volume of the book contains the manuscripts that were accepted for publication in the MDPI Special Topic "Cyber Security and Critical Infrastructure" after a rigorous peer-review process. Authors from academia, government and industry contributed their innovative solutions, consistent with the interdisciplinary nature of cybersecurity. The book contains 16 articles, including an editorial that explains the current challenges, innovative solutions and real-world experiences that include critical infrastructure and 15 original papers that present state-of-the-art innovative solutions to attacks on critical systems.