رکورد قبلیرکورد بعدی

" Critical information infrastructure security : "


Document Type : BL
Record Number : 605973
Doc. No : b435192
Main Entry : CRITIS (Workshop)(6th :2011 :, Lucerne, Switzerland)
Title & Author : Critical information infrastructure security : : 6th international workshop, CRITIS 2011, Lucerne, Switzerland, September 8-9, 2011 : revised selected papers /\ Sandro Bologna, Bernhard Hämmerli, Dimitris Gritzalis, Stephen Wolthusen (eds.)
Series Statement : Lecture notes in computer science,; 6983
: LNCS sublibrary. SL 4, Security and cryptology
Page. NO : 1 online resource (xii, 227 pages) :: illustrations
ISBN : 3642414761 (electronic bk.)
: : 9783642414763 (electronic bk.)
: 3642414753 (print)
: 9783642414756 (print)
Bibliographies/Indexes : Includes bibliographical references and index
Contents : Ten National Cyber Security Strategies: A Comparison -- Analysis of Dependencies in Critical Infrastructures -- Assurance and Trust Indicators to Evaluate Accuracy of On-line Risk in Critical Infrastructures -- An Innovative Approach to Emergency Management in Large Infrastructures -- Dynamic Evacuation Guidance as Safety Critical Application in Building Automation -- Defeating Node Based Attacks on SCADA Systems Using Probabilistic Packet Observation -- Sub-optimal Topological Protection Strategy from Advanced Malware -- The Insider Threat in Cloud Computing -- Interdependencies between Critical Infrastructures: Analyzing the Risk of Cascading Effects -- How to Perform Verification and Validation of Critical Infrastructure Modeling Tools -- Petri Net Modelling of Physical Vulnerability -- Investigating the Effect of Network Parameters on Coordinated Cyber Attacks Against a Simulated Power Plant -- The Role of the DNS in the Secure and Resilient Operation of CIs, the Energy System Example -- The Development of Warning, Advice and Reporting Points (WARPs) in UK National Infrastructure -- The Contribution of NEISAS to EP3R -- Policies to Improve Resilience against Major Industrial Accidents -- Fuzzy Input-Output Inoperability Model -- Dependencies Discovery and Analysis in Distributed Systems -- Protecting Critical Infrastructures from Stealth Attacks: A Closed-Loop Approach Involving Detection and Remediation -- Risk Assessment in Critical Infrastructure Security Modelling Based on Dependency Analysis -- Countermeasures Selection via Evidence Theory -- The Robustness of Assortativity
Abstract : This book constitutes revised selected papers from the 6th International Workshop on Critical Information Infrastructure Security, CRITIS 2011, held in Lucerne, Switzerland, in September 2011. The 16 full papers and 6 short papers presented in this volume were carefully reviewed and selected from 38 submissions. They deal with all areas of critical infrastructure protection research
Subject : Computer networks-- Security measures, Congresses
Subject : Computer security, Congresses
Subject : Data encryption (Computer science), Congresses
Dewey Classification : ‭005.8‬
LC Classification : ‭QA76.9.A25‬‭C75 2011‬
: ‭QA76.9.A25‬‭C75 2011‬
Added Entry : Bologna, Sandro
: Hämmerli, Bernhard M.
: Gritzalis, Dimitris
: Wolthusen, Stephen D.
Added Entry : Ohio Library and Information Network
Parallel Title : CRITIS 2011
کپی لینک

پیشنهاد خرید
پیوستها
Search result is zero
نظرسنجی
نظرسنجی منابع دیجیتال

1 - آیا از کیفیت منابع دیجیتال راضی هستید؟