|
|
|
|
LEADER |
02944nma a2200673 u 4500 |
001 |
EB002172497 |
003 |
EBX01000000000000001310274 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
230811 ||| eng |
020 |
|
|
|a 9783036548456
|
020 |
|
|
|a 9783036548463
|
020 |
|
|
|a books978-3-0365-4846-3
|
100 |
1 |
|
|a Maglaras, Leandros
|
245 |
0 |
0 |
|a Cyber Security and Critical Infrastructures
|h Elektronische Ressource
|
260 |
|
|
|a Basel
|b MDPI - Multidisciplinary Digital Publishing Institute
|c 2022
|
300 |
|
|
|a 1 electronic resource (326 p.)
|
653 |
|
|
|a attribution of cyber attacks
|
653 |
|
|
|a cyber threat intelligence
|
653 |
|
|
|a smart grids
|
653 |
|
|
|a cyber-physical systems
|
653 |
|
|
|a COVID-19 pandemic
|
653 |
|
|
|a risk management
|
653 |
|
|
|a coronavirus
|
653 |
|
|
|a critical Infrastructures
|
653 |
|
|
|a big data
|
653 |
|
|
|a network security and protocols
|
653 |
|
|
|a History of engineering and technology / bicssc
|
653 |
|
|
|a cyber security and privacy policy
|
653 |
|
|
|a hardware security solutions
|
653 |
|
|
|a cyber threats
|
653 |
|
|
|a Internet of Things
|
653 |
|
|
|a malware analysis
|
653 |
|
|
|a resiliency and security of cyber systems
|
653 |
|
|
|a hybrid war
|
653 |
|
|
|a blockchain
|
653 |
|
|
|a simulation and test beds for security evaluation of critical infrastructures
|
653 |
|
|
|a industrial control systems
|
653 |
|
|
|a privacy preservation
|
653 |
|
|
|a secure communication protocols
|
653 |
|
|
|a cybersecurity
|
653 |
|
|
|a cybercrime
|
653 |
|
|
|a cyber security modeling and simulation
|
653 |
|
|
|a intrusion detection
|
700 |
1 |
|
|a Janicke, Helge
|
700 |
1 |
|
|a Ferrag, Mohamed Amine
|
700 |
1 |
|
|a Maglaras, Leandros
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b DOAB
|a Directory of Open Access Books
|
500 |
|
|
|a Creative Commons (cc), https://creativecommons.org/licenses/by/4.0/
|
024 |
8 |
|
|a 10.3390/books978-3-0365-4846-3
|
856 |
4 |
0 |
|u https://www.mdpi.com/books/pdfview/topic/5920
|7 0
|x Verlag
|3 Volltext
|
856 |
4 |
2 |
|u https://directory.doabooks.org/handle/20.500.12854/97421
|z DOAB: description of the publication
|
082 |
0 |
|
|a 900
|
082 |
0 |
|
|a 380
|
082 |
0 |
|
|a 700
|
082 |
0 |
|
|a 600
|
082 |
0 |
|
|a 620
|
520 |
|
|
|a This book contains the manuscripts that were accepted for publication in the MDPI Special Topic "Cyber Security and Critical Infrastructure" after a rigorous peer-review process. Authors from academia, government and industry contributed their innovative solutions, consistent with the interdisciplinary nature of cybersecurity. The book contains 16 articles: an editorial explaining current challenges, innovative solutions, real-world experiences including critical infrastructure, 15 original papers that present state-of-the-art innovative solutions to attacks on critical systems, and a review of cloud, edge computing, and fog's security and privacy issues.
|