LEADER 04342nam 22006135 450 001 9910739450603321 005 20251226203301.0 010 $a3-319-03964-4 024 7 $a10.1007/978-3-319-03964-0 035 $a(CKB)3710000000078800 035 $a(DE-He213)978-3-319-03964-0 035 $a(SSID)ssj0001090505 035 $a(PQKBManifestationID)11621816 035 $a(PQKBTitleCode)TC0001090505 035 $a(PQKBWorkID)11024744 035 $a(PQKB)10909500 035 $a(MiAaPQ)EBC3093380 035 $a(PPN)176108866 035 $a(EXLCZ)993710000000078800 100 $a20131217d2013 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCritical Information Infrastructures Security $e8th International Workshop, CRITIS 2013, Amsterdam, The Netherlands, September 16-18, 2013, Revised Selected Papers /$fedited by Eric Luiijf, Pieter Hartel 205 $a1st ed. 2013. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2013. 215 $a1 online resource (XIV, 219 p. 70 illus.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v8328 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-319-03963-6 327 $aSecurity Challenges for Cooperative and Interconnected Mobility Systems -- Study of In-Data Centre Backup Offices for Banks -- Protecting a Federated Database Infrastructure against Denial-of-Service Attacks -- Minimizing the Impact of In-band Jamming Attacks in WDM Optical Networks -- The Role of Critical Infrastructures? Interdependencies on the Impacts Caused by Natural -- Analysis of Severe Space Weather on Critical Infrastructures -- A Plug and Play, Approximation-Based, Selective Load Shedding Mechanism for the Future Electrical Grid -- A Framework for Risk Analysis in Smart Grid: Perspective Based Approach -- Physical Attestation of Cyber Processes in the Smart Grid -- QSec: Supporting Security Decisions on an IT Infrastructure -- Structural Controllability of Networks for Non-interactive Adversarial Vertex Removal -- Real Time Threat Prediction, Identification and Mitigation for Critical Infrastructure Protection Using Semantics, Event Processing and Sequential Analysis -- Determining Risks from Advanced Multi-step Attacks to Critical Information Infrastructures -- On the Feasibility of Device Fingerprinting in Industrial Control Systems -- Bridging Dolev-Yao Adversaries and Control Systems with Time-Sensitive Channels -- An Indoor Contaminant Sensor Placement Toolbox for Critical Infrastructure Buildings -- Optimization Models in a Smart Tool for the Railway Infrastructure Protection -- Towards Automatic Critical Infrastructure Protection through Machine Learning -- Using NATO Labelling to Support Controlled Information Sharing between Partners -- A Framework for Privacy Protection and Usage Control of Personal Data in a Smart City Scenario. 330 $aThis book constitutes the thoroughly refereed post-proceedings of the 8th International Workshop on Critical Information Infrastructures Security, CRITIS 2013, held in Amsterdam, The Netherlands, in September 2013. The 16 revised full papers and 4 short papers were thoroughly reviewed and selected from 57 submissions. The papers are structured in the following topical sections: new challenges, natural disasters, smart grids, threats and risk, and SCADA/ICS and sensors. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v8328 606 $aData protection 606 $aComputers and civilization 606 $aComputer networks 606 $aData and Information Security 606 $aComputers and Society 606 $aComputer Communication Networks 615 0$aData protection. 615 0$aComputers and civilization. 615 0$aComputer networks. 615 14$aData and Information Security. 615 24$aComputers and Society. 615 24$aComputer Communication Networks. 676 $a005.8 702 $aLuiijf$b Eric$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aHartel$b Pieter$4edt$4http://id.loc.gov/vocabulary/relators/edt 906 $aBOOK 912 $a9910739450603321 996 $aCritical Information Infrastructures Security$92584647 997 $aUNINA