|
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910484715403321 |
|
|
Titolo |
Critical information infrastructures security : 4th International Workshop, CRITIS 2009, Bonn, Germany, September 30-October 2, 2009 : revised papers / / Erich Rome, Robin Bloomfield, (eds.) |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
|
|
|
|
ISBN |
|
1-280-38793-9 |
9786613565853 |
3-642-14379-2 |
|
|
|
|
|
|
|
|
Edizione |
[1st ed.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (XII, 213 p. 70 illus.) |
|
|
|
|
|
|
Collana |
|
Lecture notes in computer science, , 0302-9743 ; ; 6027 |
LNCS sublibrary. SL 4, Security and cryptology |
|
|
|
|
|
|
|
|
Altri autori (Persone) |
|
RomeErich |
BloomfieldRobin |
|
|
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Computer security |
Information networks - Access control |
Data protection |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Bibliographic Level Mode of Issuance: Monograph |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
On Modelling of Inter-dependent Network Infrastructures by Extended Leontief Models -- Critical Infrastructure Protection in Brazil - Threat Identification and Analysis -- Development of Information Security-Focused Incident Prevention Measures for Critical Information Infrastructure in Japan -- Design of a Mobile Agent-Based Adaptive Communication Middleware for Federations of Critical Infrastructure Simulations -- An Alternate Topology Generator for Joint Study of Power Grids and Communication Networks -- Trouble Brewing: Using Observations of Invariant Behavior to Detect Malicious Agency in Distributed Control Systems -- Optimisation of Critical Infrastructure Protection: The SiVe Project on Airport Security -- Cyber-Critical Infrastructure Protection Using Real-Time Payload-Based Anomaly Detection -- Decision Aid Tool and Ontology-Based Reasoning for Critical Infrastructure Vulnerabilities and Threats Analysis -- Application Filters for TCP/IP Industrial Automation Protocols -- Web Browser Security Update Effectiveness -- State-Based Network Intrusion |
|
|
|
|
|
|
|
|
|
|
Detection Systems for SCADA Protocols: A Proof of Concept -- Towards Early Warning Systems – Challenges, Technologies and Architecture -- CII Protection - Lessons for Developing Countries: South Africa as a Case Study -- Energy Theft in the Advanced Metering Infrastructure -- Current Capabilities, Requirements and a Proposed Strategy for Interdependency Analysis in the UK -- Stochastic Modelling of the Effects of Interdependencies between Critical Infrastructure. |
|
|
|
|
|
| |