LEADER 06914nam 2200385 450 001 9910522596803321 005 20230517081113.0 035 $a(CKB)5700000000009437 035 $a(NjHacI)995700000000009437 035 $a(EXLCZ)995700000000009437 100 $a20230517d2021 uy 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCyber-Physical Threat Intelligence for Critical Infrastructures Security $eSecuring Critical Infrastructures in Air Transport, Water, Gas, Healthcare, Finance and Industry /$fJohn Soldatos, Isabel Prac?a, Aleksandar Jovanovic? 210 1$aNorwell, Massachusetts :$cNow Publishers,$d2021. 215 $a1 online resource (626 pages) 311 $a1-68083-822-9 327 $aPart I "Securing Critical Infrastructures of Sensitive Industrial Plants and Sites": *Chapter 1 "InfraStress approach on risk modelling of cascading events with live data for decision support". *Chapter 2 "Cyber-physical adversarial attacks and countermeasures for deep learning vision systems on critical infrastructures".*Chapter 3 "Modelling of interdependencies among and InfraStress approach on risk modelling of cascading events with live data for decision support". *Chapter 4 "Data Visualisation for Situational Awareness in Industrial Critical Infrastructure: an InfraStress Case Study".*Chapter 5 "Critical Infrastructures, SIPS and Threat Intelligence: legal and ethical aspects of security research".Part II "Securing Critical Infrastructures in the Water Sector": *Chapter 6 "Cyber security importance in the water sector and the contribution of the STOP-IT project".*Chapter 7 "Cyber-Physical security for critical water infrastructures at strategic and tactical level". *Chapter 8 "Cyber-physical solutions for real-time detection at operational level". *Chapter 9 "Applying Machine Learning and Deep Learning algorithms for Anomaly Detection in Critical Water Infrastructures".Part III "Securing Critical Infrastructures for Air Transport": *Chapter 10 "Security Challenges for Critical Infrastructures in Air Transport".*Chapter 11 "Toolkit to enhance cyber-physical security of Critical Infrastructures in Air Transport".*Chapter 12 "Security ontologies as technological enabler for blended threat detection and enhanced systems interoperability".Part IV "Securing Critical Infrastructures for Gas": *Chapter 13 "Conceptual Model and CONOPS for Secure and Resilient Gas CI".*Chapter 14 "High-Level Reference Architecture (HLRA) for Gas Infrastructures Protection". *Chapter 15 "The SecureGas Key Performance Indicators for resilient gas critical infrastructures". *Chapter 16 "Communication of Security-related Incident Information to the Authorities and the Population".Part V "Securing Critical Infrastructures of the Healthcare Sector": *Chapter 17 "Security monitoring for medical devices".*Chapter 18 "User Experience models for threat monitoring and security management in healthcare". *Chapter 19 "Attacking and defending healthcare building automation networks".*Chapter 20 "An Intuitive Distributed Cyber Situational Awareness Framework Within a Healthcare Environment".Part VI "Securing Critical Infrastructures in the Finance Sector": *Chapter 21 "The FINSEC Platform: End-to-End Data-Driven Cyber-Physical Threat Intelligence for Critical Infrastructures in Finance". *Chapter 22 "Anomaly detection for critical financial infrastructure protection".Part VII "Critical Infrastructure Protection and Smart Resilience": *Chapter 23 "Indicator-based assessment of resilience of critical infrastructures: From single indicators to comprehensive "smart" assessment". 330 $aModern critical infrastructures can be considered as large scale Cyber Physical Systems (CPS). Therefore, when designing, implementing, and operating systems for Critical Infrastructure Protection (CIP), the boundaries between physical security and cybersecurity are blurred. Emerging systems for Critical Infrastructures Security and Protection must therefore consider integrated approaches that emphasize the interplay between cybersecurity and physical security techniques. Hence, there is a need for a new type of integrated security intelligence i.e., Cyber-Physical Threat Intelligence (CPTI).This book presents novel solutions for integrated Cyber-Physical Threat Intelligence for infrastructures in various sectors, such as Industrial Sites and Plants, Air Transport, Gas, Healthcare, and Finance. The solutions rely on novel methods and technologies, such as integrated modelling for cyber-physical systems, novel reliance indicators, and data driven approaches including BigData analytics and Artificial Intelligence (AI). Some of the presented approaches are sector agnostic i.e., applicable to different sectors with a fair customization effort. Nevertheless, the book presents also peculiar challenges of specific sectors and how they can be addressed. The presented solutions consider the European policy context for Security, Cyber security, and Critical Infrastructure protection, as laid out by the European Commission (EC) to support its Member States to protect and ensure the resilience of their critical infrastructures. Most of the co-authors and contributors are from European Research and Technology Organizations, as well as from European Critical Infrastructure Operators. Hence, the presented solutions respect the European approach to CIP, as reflected in the pillars of the European policy framework. The latter includes for example the Directive on security of network and information systems (NIS Directive), the Directive on protecting European Critical Infrastructures, the General Data Protection Regulation (GDPR), and the Cybersecurity Act Regulation. The sector specific solutions that are described in the book have been developed and validated in the scope of several European Commission (EC) co-funded projects on Critical Infrastructure Protection (CIP), which focus on the listed sectors.Overall, the book illustrates a rich set of systems, technologies, and applications that critical infrastructure operators could consult to shape their future strategies. It also provides a catalogue of CPTI case studies in different sectors, which could be useful for security consultants and practitioners as well. 517 $aCyber-Physical Threat Intelligence for Critical Infrastructures Security 606 $aCyber intelligence (Computer security) 615 0$aCyber intelligence (Computer security) 676 $a005.8 700 $aSoldatos$b John$01280648 702 $aJovanovic?$b Aleksandar 702 $aPrac?a$b Isabel 801 0$bNjHacI 801 1$bNjHacl 906 $aBOOK 912 $a9910522596803321 996 $aCyber-Physical Threat Intelligence for Critical Infrastructures Security$93017335 997 $aUNINA LEADER 04717oam 2200649 c 450 001 996308813103316 005 20231110233017.0 010 $a3-8394-0571-8 024 7 $a10.14361/9783839405710 035 $a(CKB)3710000000482694 035 $a(OAPEN)1007403 035 $a(DE-B1597)461469 035 $a(OCoLC)956554368 035 $a(OCoLC)994228107 035 $a(DE-B1597)9783839405710 035 $a(MiAaPQ)EBC5494228 035 $a(Au-PeEL)EBL5494228 035 $a(OCoLC)1049912518 035 $a(transcript Verlag)9783839405710 035 $a(MiAaPQ)EBC6955701 035 $a(Au-PeEL)EBL6955701 035 $a(oapen)https://directory.doabooks.org/handle/20.500.12854/38897 035 $a(EXLCZ)993710000000482694 100 $a20220221d2015 uy 0 101 0 $ager 135 $auuuuu---auuuu 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aZum Identita?tsdiskurs in den Sozialwissenschaften$eEine postkolonial und queer informierte Kritik an George H. Mead, Erik H. Erikson und Erving Goffman$fIngrid Jungwirth 205 $a1st ed. 210 $aBielefeld$ctranscript Verlag$d2015 215 $a1 online resource (410) 225 0 $aSozialtheorie 311 $a3-89942-571-5 327 $aFrontmatter 1 Inhalt 5 Einleitung 9 1. Hintergru?nde der Untersuchung 15 2. Konzeption und Vorgehensweise 39 3. Historische Voraussetzungen fu?r die Entstehung des sozialwissenschaftlichen Identita?tsbegriffs 79 4. Selbst als Spiegel der Gesellschaft 89 5. ,Identita?t' versus Krise: Zur Entstehung sozialwissenschaftlicher Identita?tsmodelle 145 6. Die Infragestellung vorherrschender Normen, oder: Anspruch auf den Status des Menschen 209 7. Rollen und Darstellungen 309 8. Resu?mee 361 Literatur 383 330 $aUnter welchen Bedingungen wurde die »Frage der Identita?t« zu einer akzeptablen - mehr noch: dominanten - Problematisierungsweise sozialer Pha?nomene? In der diskursanalytischen Untersuchung wird die sozialwissenschaftliche Pra?gung der Begriffe Identita?t und Selbst in den Arbeiten von George H. Mead, Erik H. Erikson und Erving Goffman in Zusammenhang mit wissenschaftsgeschichtlichen Entwicklungen und sozialen Bewegungsdiskursen in den USA rekonsturiert. Die Studie ist ein Beitrag zur Geschichte der Soziologie und zu den Gender Studies. Sie verankert feministische, queer und postkoloniale Theorien in Geschichte und Theorie der Sozialwissenschaften und pra?sentiert Diskursanalyse als ein wissenschaftsgeschichtliches Instrument. 330 1 $a»Wer dieses Werk liest, wird zuku?nftig Identita?tsdiskurse aus einem neuen Blickwinkel betrachten.« Christina Harms, Freiburger GeschlechterStudien, 21 (2007) »Jungwirth [pla?diert] in ihrer Schlussbemerkung fu?r pra?zise Fragestellungen, z. B. zu gesellschaftlicher Verteilung von Arbeit und politischer Organisierung, die ihrer Ansicht nach weiter fu?hren als Debatten u?ber Existenz und Ursprungserza?hlungen - und damit als die Fortsetzung der von ihr in ihrer Fragwu?rdigkeit 'entlarvten' Identita?tsdebatte. Dem ist unbedingt zuzustimmen. Um diese Aufgabe anzugehen, Fragen von Normalisierung in Zusammenhang mit den genannten dringenden politischen und o?konomischen Fragestellungen zu bearbeiten, bietet die Arbeit eine hervorragende Grundlage.« Katja Strobel, www.querelles-net.de, 11.03.2008 »Die Studie ist umsichtig und vielschichtig angelegt.« Rainer Schu?tzeichel, Soziologische Revue, 2 (2009) 410 0$aSozialtheorie 606 $aSozialtheorie; Wissenschaftsgeschichte; Diskursanalyse; Soziale Bewegungen; Sozialita?t; Gender; Postkolonialismus; Soziologische Theorie; Gender Studies; Queer Theory; Soziologie; History of Science; Social Movements; Social Relations; Postcolonialism; Sociological Theory; Sociology; 610 $aGender Studies. 610 $aGender. 610 $aPostcolonialism. 610 $aQueer Theory. 610 $aSocial Movements. 610 $aSocial Relations. 610 $aSociological Theory. 610 $aSociology. 615 4$aSozialtheorie; Wissenschaftsgeschichte; Diskursanalyse; Soziale Bewegungen; Sozialita?t; Gender; Postkolonialismus; Soziologische Theorie; Gender Studies; Queer Theory; Soziologie; History of Science; Social Movements; Social Relations; Postcolonialism; Sociological Theory; Sociology; 686 $aMR 6600$2rvk 700 $aJungwirth$b Ingrid$4aut$0928239 801 0$bDE-B1597 801 1$bDE-B1597 906 $aBOOK 912 $a996308813103316 996 $aZum Identitätsdiskurs in den Sozialwissenschaften$92086035 997 $aUNISA