LEADER 05195nam 22006375 450 001 9910984690203321 005 20250228115239.0 010 $a9783031818882 010 $a3031818881 024 7 $a10.1007/978-3-031-81888-2 035 $a(CKB)37726277300041 035 $a(MiAaPQ)EBC31927438 035 $a(Au-PeEL)EBL31927438 035 $a(DE-He213)978-3-031-81888-2 035 $a(OCoLC)1504056258 035 $a(EXLCZ)9937726277300041 100 $a20250228d2025 u| 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCritical Infrastructure Protection XVIII $e18th IFIP WG 11.10 International Conference, ICCIP 2024, Arlington, VA, USA, March 18?19, 2024, Proceedings /$fedited by Jason Staggs, Sujeet Shenoi 205 $a1st ed. 2025. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2025. 215 $a1 online resource (223 pages) 225 1 $aIFIP Advances in Information and Communication Technology,$x1868-422X ;$v725 311 08$a9783031818875 311 08$a3031818873 327 $aInfrastructure Security: Evaluating Cyber Security Risks and Mitigation Strategies for Smart Grids Based on Business Case Scenarios -- On the Security of Electronic Voting Systems. Advanced Manufacturing Security: Detecting Control Injection Attacks Using Energy Data Anomalies in Computer Numerical Control Machining -- Security Assessment of an LBP16-Protocol-Based Computer Numerical Control Machine -- An End-to-End Framework for Verifying and Validating Manufacturing Design Integrity. Industrial Control System Security: Multiple-Bayesian-Network-Based Risk Assessment Methodology for Industrial Control Systems -- Automated Programmable Logic Controller Memory Forensics Using RGB Image Analysis and Deep Learning. Infrastructure Modeling: A Fail-Safe Challenge-Response Mechanism for User Equipment to Detect Rogue IMSI/SUPI Catchers -- Improved Distribution Network Topology Generation with Hierarchical Information Overlay. 330 $aThe cyber infrastructure ? comprising computers, embedded devices, networks and software systems ? is vital to operations in every sector: chemicals, commercial facilities, communications, critical manufacturing, dams, defense industrial base, emergency services, energy, financial services, food and agriculture, government facilities, healthcare and public health, information technology, nuclear reactors, materials and waste, transportation systems, and water and wastewater systems. Global business and industry, governments, indeed society itself, cannot function if major components of the critical infrastructure are degraded, disabled or destroyed. Critical Infrastructure Protection XVIII describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving together science, technology and policy to craft sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. Areas of coverage include: Infrastructure Security Advanced Manufacturing Security Industrial Control System Security Infrastructure Modeling This book is the eighteenth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of nine edited papers from the Eighteenth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, which was held at SRI International, Arlington, Virginia, USA in the spring of 2024. Critical Infrastructure Protection XVIII is an important resource for researchers, faculty members and graduate students, as well as for policy makers, practitioners and other individuals with interests in homeland security. 410 0$aIFIP Advances in Information and Communication Technology,$x1868-422X ;$v725 606 $aData protection 606 $aComputer networks 606 $aComputers$xLaw and legislation 606 $aInformation technology$xLaw and legislation 606 $aData and Information Security 606 $aComputer Communication Networks 606 $aLegal Aspects of Computing 615 0$aData protection. 615 0$aComputer networks. 615 0$aComputers$xLaw and legislation. 615 0$aInformation technology$xLaw and legislation. 615 14$aData and Information Security. 615 24$aComputer Communication Networks. 615 24$aLegal Aspects of Computing. 676 $a005.8 700 $aStaggs$b Jason$01790088 701 $aShenoi$b Sujeet$01433312 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910984690203321 996 $aCritical Infrastructure Protection XVIII$94326204 997 $aUNINA