LEADER 05190nam 22006975 450 001 9910366656403321 005 20200904135146.0 010 $a3-030-37670-2 024 7 $a10.1007/978-3-030-37670-3 035 $a(CKB)5280000000190069 035 $a(MiAaPQ)EBC6112324 035 $a(DE-He213)978-3-030-37670-3 035 $a(PPN)242818609 035 $a(EXLCZ)995280000000190069 100 $a20191219d2020 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCritical Information Infrastructures Security $e14th International Conference, CRITIS 2019, Linköping, Sweden, September 23?25, 2019, Revised Selected Papers /$fedited by Simin Nadjm-Tehrani 205 $a1st ed. 2020. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2020. 215 $a1 online resource (xi, 210 pages) $cillustrations 225 1 $aSecurity and Cryptology ;$v11777 311 $a3-030-37669-9 327 $aInvited Papers -- Everything is Awesome! Or is it? Cyber Security Risks in Critical Infrastructure -- Challenges In Quantifying An Adversary?s Cyber Access to Critical Infrastructures -- Risk Management -- Exploring how Component Factors and their Uncertainty A?ect Judgements of Risk in Cyber-Security -- Estimating Cascading E?ects in Cyber-Physical Critical Infrastructures -- Aggregating Centrality Rankings: A Novel Approach to Detect Critical Infrastructure Vulnerabilities -- Vulnerability Assessment -- Cyber-Physical Systems Security Based on A Cross-Linked and Correlated Vulnerability Database -- Climate Change Impact and Vulnerability Analysis in the City of Bratislava: Application and Lessons Learned -- Resilience and Mitigation -- Intrusion Resilience for PV Inverters in a Distribution Grid Use-Case Featuring Dynamic Voltage Control -- Mitigating escalation of cascading e?ects of a payment disruption across other critical infrastructures: lessons learned in 15 simulation-games -- Using Datasets from Industrial Control Systems for Cyber Security Research and Education -- Transport and Finance -- Securing Software Updates for Trains -- A comparison between SWIFT and Blockchain from a cyber resiliency perspective -- Short Papers -- On the Importance of Agility, Transparency, and Positive Reinforcement in Cyber Incident Crisis Communication -- SealedGRID: A Secure Interconnection of Technologies for Smart Grid Applications -- A Dynamic Risk Assessment (DRA) Methodology for High Impact Low Probability (HILP) Security Risks -- On Actuator Security Indices -- Testbed Evaluation of DoS Attacks on PID-controllers -- Industry and Practical Experience Reports -- White Paper on Industry Experiences in Critical Information Infrastructure Security: A Special Session at CRITIS 2019. 330 $aThis book constitutes the revised selected papers of the 14th International Conference on Critical Information Infrastructures Security, CRITIS 2019, held in Linköping, Sweden, in September 2019. The 10 full papers and 5 short papers presented were carefully reviewed and selected from 30 submissions. They are grouped in the following topical sections: Invited Papers, Risk Management, Vulnerability Assessment, Resilience and Mitigation Short Papers, and Industry and Practical Experience Reports. 410 0$aSecurity and Cryptology ;$v11777 606 $aComputer security 606 $aComputers 606 $aComputer organization 606 $aSoftware engineering 606 $aComputer crimes 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aInformation Systems and Communication Service$3https://scigraph.springernature.com/ontologies/product-market-codes/I18008 606 $aComputer Systems Organization and Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13006 606 $aSoftware Engineering/Programming and Operating Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I14002 606 $aComputing Milieux$3https://scigraph.springernature.com/ontologies/product-market-codes/I24008 606 $aComputer Crime$3https://scigraph.springernature.com/ontologies/product-market-codes/I28070 615 0$aComputer security. 615 0$aComputers. 615 0$aComputer organization. 615 0$aSoftware engineering. 615 0$aComputer crimes. 615 14$aSystems and Data Security. 615 24$aInformation Systems and Communication Service. 615 24$aComputer Systems Organization and Communication Networks. 615 24$aSoftware Engineering/Programming and Operating Systems. 615 24$aComputing Milieux. 615 24$aComputer Crime. 676 $a005.8 676 $a005.8 (edition:23) 702 $aNadjm-Tehrani$b Simin$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910366656403321 996 $aCritical Information Infrastructures Security$92584647 997 $aUNINA