06872nam 22009255 450 99646562750331620200703014150.03-642-03552-310.1007/978-3-642-03552-4(CKB)1000000000784712(SSID)ssj0000317062(PQKBManifestationID)11250382(PQKBTitleCode)TC0000317062(PQKBWorkID)10287507(PQKB)10597663(DE-He213)978-3-642-03552-4(MiAaPQ)EBC3064545(PPN)139954996(EXLCZ)99100000000078471220100301d2009 u| 0engurnn|008mamaatxtccrCritical Information Infrastructure Security[electronic resource] Third International Workshop, CRITIS 2008, Rome, Italy, October 13-15, 2008 /edited by Roberto Setola, Stefan Geretshuber1st ed. 2009.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2009.1 online resource (XIV, 396 p.) Security and Cryptology ;5508Bibliographic Level Mode of Issuance: Monograph3-642-03551-5 Includes bibliographical references and index.Blackouts in Power Transmission Networks Due to Spatially Localized Load Anomalies -- Stability of a Distributed Generation Network Using the Kuramoto Models -- Enabling System of Systems Analysis of Critical Infrastructure Behaviors -- Information Modelling and Simulation in Large Interdependent Critical Infrastructures in IRRIIS -- Multi-level Dependability Modeling of Interdependencies between the Electricity and Information Infrastructures -- Interdependency Analysis in Electric Power Systems -- Modeling and Simulation of Complex Interdependent Systems: A Federated Agent-Based Approach -- Self-healing and Resilient Critical Infrastructures -- Critical Infrastructures Security Modeling, Enforcement and Runtime Checking -- INcreasing Security and Protection through Infrastructure REsilience: The INSPIRE Project -- Increase of Power System Survivability with the Decision Support Tool CRIPS Based on Network Planning and Simulation Program PSS®SINCAL -- Information Modelling and Simulation in Large Dependent Critical Infrastructures – An Overview on the European Integrated Project IRRIIS -- Assessment of Structural Vulnerability for Power Grids by Network Performance Based on Complex Networks -- Using Centrality Measures to Rank the Importance of the Components of a Complex Network Infrastructure -- RadialNet: An Interactive Network Topology Visualization Tool with Visual Auditing Support -- Quantitative Security Risk Assessment and Management for Railway Transportation Infrastructures -- Assessing and Improving SCADA Security in the Dutch Drinking Water Sector -- Analysis of Malicious Traffic in Modbus/TCP Communications -- Scada Malware, a Proof of Concept -- Testbeds for Assessing Critical Scenarios in Power Control Systems -- A Structured Approach to Incident Response Management in the Oil and Gas Industry -- Security Strategy Analysis for Critical Information Infrastructures -- Emerging Information Infrastructures: Cooperation in Disasters -- Service Modeling Language Applied to Critical Infrastructure -- Graded Security Expert System -- Protection of Mobile Agents Execution Using a Modified Self-Validating Branch-Based Software Watermarking with External Sentinel -- Adaptation of Modelling Paradigms to the CIs Interdependencies Problem -- Empirical Findings on Critical Infrastructure Dependencies in Europe -- Dependent Automata for the Modelling of Dependencies -- Application of IPK (Information, Preferences, Knowledge) Paradigm for the Modelling of Precautionary Principle Based Decision-Making -- Disaster Propagation in Heterogeneous Media via Markovian Agents -- A Study on Multiformalism Modeling of Critical Infrastructures -- Simulation of Critical ICT Infrastructure for Municipal Crisis Management -- An Ontology-Based Approach to Blind Spot Revelation in Critical Infrastructure Protection Planning -- Security of Water Infrastructure Systems -- Critical Infrastructures as Complex Systems: A Multi-level Protection Architecture -- Challenges Concerning the Energy-Dependency of the Telecom Infrastructure -- An Effective Approach for Cascading Effects Prevision in Critical Infrastructures.Security and Cryptology ;5508Computer securityComputer communication systemsQuality controlReliabilityIndustrial safetyApplied mathematicsEngineering mathematicsManagement information systemsComputer scienceAlgorithmsSystems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Computer Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13022Quality Control, Reliability, Safety and Riskhttps://scigraph.springernature.com/ontologies/product-market-codes/T22032Mathematical and Computational Engineeringhttps://scigraph.springernature.com/ontologies/product-market-codes/T11006Management of Computing and Information Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I24067Algorithm Analysis and Problem Complexityhttps://scigraph.springernature.com/ontologies/product-market-codes/I16021Kongress.swdRom(2008)swdComputer security.Computer communication systems.Quality control.Reliability.Industrial safety.Applied mathematics.Engineering mathematics.Management information systems.Computer science.Algorithms.Systems and Data Security.Computer Communication Networks.Quality Control, Reliability, Safety and Risk.Mathematical and Computational Engineering.Management of Computing and Information Systems.Algorithm Analysis and Problem Complexity.005.8DAT 460fstubDAT 465fstubSS 4800rvkSetola Robertoedthttp://id.loc.gov/vocabulary/relators/edtGeretshuber Stefanedthttp://id.loc.gov/vocabulary/relators/edtCRITIS 2008BOOK996465627503316Critical Information Infrastructure Security774242UNISA