1.

Record Nr.

UNISA996465800803316

Titolo

Critical Information  Infrastructures Security [[electronic resource] ] : 4th International Workshop, CRITIS 2009, Bonn, Germany, September 30 - October 2, 2009, Revised Papers / / edited by Erich Rome, Robin Bloomfield

Pubbl/distr/stampa

Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010

ISBN

1-280-38793-9

9786613565853

3-642-14379-2

Edizione

[1st ed. 2010.]

Descrizione fisica

1 online resource (XII, 213 p. 70 illus.)

Collana

Security and Cryptology ; ; 6027

Disciplina

005.8

Soggetti

Computer communication systems

Computer software—Reusability

Computers

Management information systems

Computer science

Data encryption (Computer science)

Special purpose computers

Computer Communication Networks

Performance and Reliability

Theory of Computation

Management of Computing and Information Systems

Cryptology

Special Purpose and Application-Based Systems

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Bibliographic Level Mode of Issuance: Monograph

Nota di bibliografia

Includes bibliographical references and index.

Nota di contenuto

On Modelling of Inter-dependent Network Infrastructures by Extended Leontief Models -- Critical Infrastructure Protection in Brazil - Threat Identification and Analysis -- Development of Information Security-Focused Incident Prevention Measures for Critical Information Infrastructure in Japan -- Design of a Mobile Agent-Based Adaptive



Communication Middleware for Federations of Critical Infrastructure Simulations -- An Alternate Topology Generator for Joint Study of Power Grids and Communication Networks -- Trouble Brewing: Using Observations of Invariant Behavior to Detect Malicious Agency in Distributed Control Systems -- Optimisation of Critical Infrastructure Protection: The SiVe Project on Airport Security -- Cyber-Critical Infrastructure Protection Using Real-Time Payload-Based Anomaly Detection -- Decision Aid Tool and Ontology-Based Reasoning for Critical Infrastructure Vulnerabilities and Threats Analysis -- Application Filters for TCP/IP Industrial Automation Protocols -- Web Browser Security Update Effectiveness -- State-Based Network Intrusion Detection Systems for SCADA Protocols: A Proof of Concept -- Towards Early Warning Systems – Challenges, Technologies and Architecture -- CII Protection - Lessons for Developing Countries: South Africa as a Case Study -- Energy Theft in the Advanced Metering Infrastructure -- Current Capabilities, Requirements and a Proposed Strategy for Interdependency Analysis in the UK -- Stochastic Modelling of the Effects of Interdependencies between Critical Infrastructure.