Contactless 3D Fingerprint Identification / / by Ajay Kumar |
Autore | Kumar Ajay |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
Descrizione fisica | 1 online resource (129 pages) |
Disciplina | 363.258 |
Collana | Advances in Computer Vision and Pattern Recognition |
Soggetto topico |
Biometrics (Biology)
Artificial intelligence Computational intelligence Computers Law and legislation Biometrics Artificial Intelligence Computational Intelligence Legal Aspects of Computing |
ISBN | 3-319-67681-4 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Introduction to Trends in Fingerprint Identification -- 3D Fingerprint Image Acquisition Methods -- Contactless and Live 3D Fingerprint Imaging -- 3D Fingerprint Acquisition Using Colored Photometric Stereo -- 3D Fingerprint Image Preprocessing and Enhancement -- Representation, Recovery and Matching of 3D Minutiae Template -- Other Methods of 3D Fingerprint Matching -- Individuality of 3D Fingerprints. |
Record Nr. | UNINA-9910299162403321 |
Kumar Ajay
![]() |
||
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Contractual Management [[electronic resource] ] : Managing Through Contracts / / edited by Ralph Schuhmann, Bert Eichhorn |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer Vieweg, , 2020 |
Descrizione fisica | 1 online resource (430 pages) |
Disciplina | 346.02 |
Soggetto topico |
Industrial procurement
E-commerce E-business Electronic commerce Computers Law and legislation International business enterprises Procurement e-Commerce/e-business e-Business/e-Commerce Legal Aspects of Computing International Business |
ISBN | 3-662-58482-4 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | I - Theory Part: Contractual Management - A Holistic Approach to a Diverse Issue -- II - Case Study Part: 12-15 Case Studies, all of them arranged unter the Following Headlines -- Enterprise Networks -- Information and Communication -- Change -- Conflict -- Accounting and Financing – Legal Compliance – Societal Steering. |
Record Nr. | UNINA-9910367256003321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer Vieweg, , 2020 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Critical Information Infrastructures Security [[electronic resource] ] : 13th International Conference, CRITIS 2018, Kaunas, Lithuania, September 24-26, 2018, Revised Selected Papers / / edited by Eric Luiijf, Inga Žutautaitė, Bernhard M. Hämmerli |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (XIII, 238 p. 71 illus., 47 illus. in color.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Computer communication systems Computer crimes Application software Computers Law and legislation Systems and Data Security Computer Communication Networks Computer Crime Information Systems Applications (incl. Internet) Legal Aspects of Computing |
ISBN | 3-030-05849-2 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Advanced analysis of critical energy systems -- Strengthening urban resilience -- Securing internet of things and industrial control systems -- Need and tool sets for industrial control system security -- Advancements in governance and resilience of critical infrastructures. . |
Record Nr. | UNISA-996466471003316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Critical Information Infrastructures Security : 13th International Conference, CRITIS 2018, Kaunas, Lithuania, September 24-26, 2018, Revised Selected Papers / / edited by Eric Luiijf, Inga Žutautaitė, Bernhard M. Hämmerli |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (XIII, 238 p. 71 illus., 47 illus. in color.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Computer communication systems Computer crimes Application software Computers Law and legislation Systems and Data Security Computer Communication Networks Computer Crime Information Systems Applications (incl. Internet) Legal Aspects of Computing |
ISBN | 3-030-05849-2 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Advanced analysis of critical energy systems -- Strengthening urban resilience -- Securing internet of things and industrial control systems -- Need and tool sets for industrial control system security -- Advancements in governance and resilience of critical infrastructures. . |
Record Nr. | UNINA-9910337571103321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Critical Information Infrastructures Security [[electronic resource] ] : 12th International Conference, CRITIS 2017, Lucca, Italy, October 8-13, 2017, Revised Selected Papers / / edited by Gregorio D'Agostino, Antonio Scala |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
Descrizione fisica | 1 online resource (XI, 272 p. 80 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Computer communication systems Computers and civilization Computers Law and legislation Artificial intelligence Data encryption (Computer science) Systems and Data Security Computer Communication Networks Computers and Society Legal Aspects of Computing Artificial Intelligence Cryptology |
ISBN | 3-319-99843-9 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Resilience of Electrical Distribution Systems with Critical Load Prioritization -- Public tolerance levels of transportation resilience: a focus on the Oresund region within the IMPROVER Project -- Towards a Common Vocabulary for Crisis Management Scenarios -- Analysis and Classification of Adaptation Tools for Transport Sector Adaptation Planning -- Timing-based Anomaly Detection in SCADA Networks -- Operational Resilience metrics for a complex electrical networks -- The Influence of Load Characteristics on Early Warning Signs in Power Systems -- DMA optimal layout for protection of water distribution networks from malicious attack -- Role of urban interactions and damage in seismic resilience of historical centers -- Towards Blockchain-Based Collaborative Intrusion Detection Systems -- Analysis of cybersecurity threats in Industry 4.0: the case of intrusion detection -- De-Synchronisation Attack Modelling in Real-Time Protocols Using Queue Networks: Attacking the ISO/IEC 61850 Substation Automation Protocol -- Assessing Urban Rail Transit Systems Vulnerability: Metrics vs. Interdiction Models -- Automatically Generating Security Models from System Models to Aid in the Evaluation of AMI Deployment Options -- A Gamified Approach to Participatory Modelling of Water System Risks -- Managing gas and electric power network dependencies to secure energy supply: application to the UK system -- What the Stack? On Memory Exploitation and Protection in Resource Constrained Automotive Systems -- Dealing with Functional Safety Requirements for Automotive Systems: A Cyber-Physical-Social Approach -- Side-channel based intrusion detection for industrial control systems -- Security Evaluation of Cyber-Physical Systems using Automatically Generated Attack Trees -- Faulty or Malicious Anchor Detection Criteria for Distance-Based Localization -- One step more : Automatic ICS Protocol Field Analysis -- Motion magnification for urban buildings -- Reputation Systems to Mitigate DoS Attack in Vehicular Network -- On the security of aircraft communication networks. |
Record Nr. | UNISA-996466205203316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Critical Information Infrastructures Security : 12th International Conference, CRITIS 2017, Lucca, Italy, October 8-13, 2017, Revised Selected Papers / / edited by Gregorio D'Agostino, Antonio Scala |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
Descrizione fisica | 1 online resource (XI, 272 p. 80 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Computer communication systems Computers and civilization Computers Law and legislation Artificial intelligence Data encryption (Computer science) Systems and Data Security Computer Communication Networks Computers and Society Legal Aspects of Computing Artificial Intelligence Cryptology |
ISBN | 3-319-99843-9 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Resilience of Electrical Distribution Systems with Critical Load Prioritization -- Public tolerance levels of transportation resilience: a focus on the Oresund region within the IMPROVER Project -- Towards a Common Vocabulary for Crisis Management Scenarios -- Analysis and Classification of Adaptation Tools for Transport Sector Adaptation Planning -- Timing-based Anomaly Detection in SCADA Networks -- Operational Resilience metrics for a complex electrical networks -- The Influence of Load Characteristics on Early Warning Signs in Power Systems -- DMA optimal layout for protection of water distribution networks from malicious attack -- Role of urban interactions and damage in seismic resilience of historical centers -- Towards Blockchain-Based Collaborative Intrusion Detection Systems -- Analysis of cybersecurity threats in Industry 4.0: the case of intrusion detection -- De-Synchronisation Attack Modelling in Real-Time Protocols Using Queue Networks: Attacking the ISO/IEC 61850 Substation Automation Protocol -- Assessing Urban Rail Transit Systems Vulnerability: Metrics vs. Interdiction Models -- Automatically Generating Security Models from System Models to Aid in the Evaluation of AMI Deployment Options -- A Gamified Approach to Participatory Modelling of Water System Risks -- Managing gas and electric power network dependencies to secure energy supply: application to the UK system -- What the Stack? On Memory Exploitation and Protection in Resource Constrained Automotive Systems -- Dealing with Functional Safety Requirements for Automotive Systems: A Cyber-Physical-Social Approach -- Side-channel based intrusion detection for industrial control systems -- Security Evaluation of Cyber-Physical Systems using Automatically Generated Attack Trees -- Faulty or Malicious Anchor Detection Criteria for Distance-Based Localization -- One step more : Automatic ICS Protocol Field Analysis -- Motion magnification for urban buildings -- Reputation Systems to Mitigate DoS Attack in Vehicular Network -- On the security of aircraft communication networks. |
Record Nr. | UNINA-9910349409403321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Critical Information Infrastructures Security [[electronic resource] ] : 11th International Conference, CRITIS 2016, Paris, France, October 10–12, 2016, Revised Selected Papers / / edited by Grigore Havarneanu, Roberto Setola, Hypatia Nassopoulos, Stephen Wolthusen |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
Descrizione fisica | 1 online resource (XI, 348 p. 103 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Computer communication systems Architecture, Computer Computers and civilization Computers Law and legislation Microprogramming Systems and Data Security Computer Communication Networks Computer System Implementation Computers and Society Legal Aspects of Computing Control Structures and Microprogramming |
ISBN | 3-319-71368-X |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Organization -- Contents -- Stealth Low-Level Manipulation of Programmable Logic Controllers I/O by Pin Control Exploitation -- 1 Introduction -- 2 Background -- 2.1 Pin Control Subsystem -- 2.2 How PLCs Control the Pins -- 3 Pin Control Attack -- 3.1 Security Concerns Regarding Pin Control -- 3.2 Pin Control Attack Details -- 3.3 Threat Model -- 4 A Pin Control Attack in Practice -- 4.1 Environment Setup -- 4.2 Attack Implementation -- 5 Discussion -- 5.1 Implications of Attack on the ICS -- 5.2 Detection of Pin Control Attack -- 6 Related Work -- 7 Conclusion -- References -- Developing a Cyber Incident Communication Management Exercise for CI Stakeholders -- 1 Introduction -- 1.1 Background -- 1.2 Case Study: Red Team - Blue Team Exercise -- 2 Communication Management Exercise for ICS Security (CME-ICS) -- 2.1 Peculiarity of Existing Japanese CIP Training -- 2.2 Discussion-Based Exercise -- 2.3 Theme of the Exercise: Communication Management -- 2.4 Scenario -- 2.5 Exercise Steps -- 2.6 Administration Staff -- 2.7 Pilot Exercises -- 3 Results and Discussion -- 3.1 Variation of Incident Management Structure -- 3.2 Results of the Survey -- 3.3 Discussion -- 3.4 Future Work: ``ICS-SIRT'' Exercise -- References -- On Auxiliary Entity Allocation Problem in Multi-layered Interdependent Critical Infrastructures -- 1 Introduction -- 2 Problem Formulation Using the Implicative Interdependency Model -- 3 Computational Complexity Analysis -- 3.1 Special Case: Problem Instance with One Minterm of Size One -- 3.2 General Case: Problem Instance with an Arbitrary Number of Minterms of Arbitrary Size -- 4 Solutions to the AEAP Problem -- 4.1 Optimal Solution to AEAP Problem -- 4.2 Heuristic Solution to the AEAP Problem -- 5 Experimental Results -- 6 Conclusion -- References -- Cyber Targets Water Management -- 1 Introduction.
1.1 Use of Industrial Control Systems -- 1.2 Cyber Threats and Risk -- 1.3 Structure of This Paper -- 2 Related Work -- 3 A Benchmark of the Resilience of the ICS Environment -- 4 Observed ICS Security Dilemmas -- 5 Cyber Security Simulator for Water Management Control Systems -- 5.1 Deployment of Attack Scenarios -- 5.2 DESI Results -- 6 Conclusions and Future Work -- 6.1 Future Work -- References -- Integrated Safety and Security Risk Assessment Methods: A Survey of Key Characteristics and Applications -- 1 Introduction -- 2 Related Work -- 3 Review Methodology -- 4 Integrated Safety and Security Risk Assessment Methods -- 4.1 SAHARA Method -- 4.2 CHASSIS Method -- 4.3 FACT Graph Method -- 4.4 FMVEA Method -- 4.5 Unified Security and Safety Risk Assessment Method -- 4.6 Extended CFT Method -- 4.7 EFT Method -- 5 Analysis of Integrated Safety and Security Risk Assessment Methods -- 6 Conclusions and Future Work -- References -- Railway Station Surveillance System Design: A Real Application of an Optimal Coverage Approach -- Abstract -- 1 Introduction -- 2 Railway Station Surveillance and Sensor Placement Problem -- 3 Application of the Optimal Coverage Approach to a Real Case -- 3.1 Area of Interest and Input Data -- 3.2 Coverage Analysis and Coverage Matrix -- 3.3 Modeling of the Coverage Problem and Solution of the Model -- 4 Experimental Results -- 4.1 Set Covering Model -- 4.2 Maximal Covering Model -- 5 Conclusions -- References -- A Synthesis of Optimization Approaches for Tackling Critical Information Infrastructure Survivability -- Abstract -- 1 Introduction -- 2 Identifying Critical Network Components: Survivability-Oriented Interdiction Models -- 3 Enhancing Critical Network Survivability: Resource Allocation Strategy Models -- 3.1 Optimization Models for Protecting CII Physical Components. 3.2 Optimization Models for CII Service Restoration -- 4 Planning Survivable Networks: Design Models -- 5 Future Research Suggestions -- 6 Conclusions -- References -- A Dataset to Support Research in the Design of Secure Water Treatment Systems -- 1 Introduction -- 2 Secure Water Treatment (SWaT) -- 2.1 Water Treatment Process -- 2.2 Communications -- 3 Attack Scenarios -- 4 Data Collection Process -- 4.1 Physical Properties -- 4.2 Network Traffic -- 4.3 Labelling Data -- 5 Conclusion -- References -- Human Vulnerability Mapping Facing Critical Service Disruptions for Crisis Managers -- Abstract -- 1 Introduction -- 2 Consequence Assessment -- 3 Modelling People Mobility -- 4 Results and Interests of Mapping Human Vulnerability -- 5 Improving Human Vulnerability Assessment -- 6 Conclusion -- Acknowledgments -- References -- A Methodology for Monitoring and Control Network Design -- 1 Introduction -- 2 Related Work -- 3 Asset Risk Assessment in ICS -- 3.1 Overview of the CAIA Approach -- 3.2 Risk Assessment Based on the Impact Measures -- 4 Optimal Control Network Design -- 5 Experimental Results -- 5.1 Results on the TEP -- 5.2 Results on the IEEE 14-Bus Electricity Grid -- 5.3 Results on the IEEE 300-Bus Electricity Grid Model -- 6 Conclusions -- References -- Effective Defence Against Zero-Day Exploits Using Bayesian Networks -- 1 Introduction -- 2 Modelling and Problem Representation -- 3 Case Study and Results -- 3.1 Case Study Settings -- 3.2 Results -- Deploying a Single Control -- 3.3 Results -- Deploying Combined Controls -- 4 Related Work -- 5 Conclusion and Future Work -- References -- Power Auctioning in Resource Constrained Micro-grids: Cases of Cheating -- 1 Introduction -- 2 Related Work -- 3 Decentralised Continuous Double Auction Model -- 4 Cheating CDA Attacks -- 4.1 Case 1: Victim Strategy Downgrade -- 4.2 Case 2: Collusion Attack. 5 Sketch Countermeasures -- 6 Conclusions -- References -- Using Incentives to Foster Security Information Sharing and Cooperation: A General Theory and Application to Critical Infrastructure Protection -- 1 Introduction -- 2 Theoretical Framework and Propositions -- 2.1 Regulation Alone Cannot Solve the Free Rider Problem -- 2.2 Linking Incentives to Voluntary SIS -- 2.3 A Holistic and Multidisciplinary Approach -- 2.4 A Model Linking Incentives, Behavior, and SIS -- 2.5 Reciprocity Expectation -- 2.6 Value Expectation -- 2.7 Institutional Expectation -- 2.8 Reputation Expectation -- 2.9 The Moderating Role of Trust -- 3 Application of the Proposed Model to Critical Infrastructure Protection -- 3.1 The Swiss Reporting and Analysis Centre for Information Security -- 3.2 Reciprocity Expectation -- 3.3 Value Expectation -- 3.4 Institutional Expectation -- 3.5 Reputation Expectation -- 3.6 The Moderating Role of Trust -- 4 Discussion -- 5 Concluding Comments and Next Steps -- References -- Dynamic Risk Analyses and Dependency-Aware Root Cause Model for Critical Infrastructures -- 1 Introduction -- 2 Terminology -- 3 Risk Assessments Using the Dependency-Aware Root Cause (DARC) Model -- 4 Risk Taxonomy for Critical Infrastructures -- 4.1 Dependency Definition Language -- 4.2 Generating the Dependency Graph -- 5 The `Smart Grid Luxembourg' Use-Case -- 5.1 Compiling a Dependency-Aware Inventory -- 5.2 Threat Model -- 5.3 Generation of the Dependency Graph -- 5.4 Results -- 6 Conclusion and Future Work -- References -- Selecting Privacy Solutions to Prioritise Control in Smart Metering Systems -- 1 Introduction -- 2 Privacy and Automation Properties -- 3 Selecting Techniques: Analysis and Discussion -- 3.1 Analysis of Privacy Techniques -- 3.2 Discussion: Privacy vs. Control -- 4 Conclusions and Future Work -- References. A Six-Step Model for Safety and Security Analysis of Cyber-Physical Systems -- 1 Introduction -- 2 Preliminaries and Background -- 2.1 CPS Safety and Security -- 2.2 GTST-MLD and the 3-Step Model -- 2.3 The SWaT System -- 3 Complex System Safety and Security Modeling: SSM -- 4 Summary and Conclusion -- References -- Availability Study of the Italian Electricity SCADA System in the Cloud -- 1 Introduction -- 1.1 The Hierarchical SCADA System -- 1.2 Cloud Deployments for a Nationwide SCADA System -- 2 Availability Computation in a Hierarchical SCADA Network -- 2.1 Availability Model for an Optical Network -- 2.2 Availability Computation -- 3 Availability Assessment in the SCADA System Managing the Italian Electricity Grid -- 4 Conclusion -- References -- Railway System Failure Scenario Analysis -- 1 Introduction -- 2 Failure Scenario Analysis: From Power Grid to Railway -- 2.1 NESCOR Failure Scenarios for the Energy Sector -- 2.2 Toward Railway Transportation Failure Scenarios -- 3 Sample Railway System Failure Scenarios -- 3.1 Compromised HMI Sends Malicious Commands to Devices -- 3.2 SCADA Firewall Fails and Critical Traffic Cannot Reach Devices -- 4 Analyzing Scenarios for a Railway System -- 4.1 Failure Scenario Analysis Tool -- 4.2 Case Study: Deploying SCADA Firewalls -- 4.3 Discussion -- 5 Related Work -- 6 Conclusion -- References -- Tamper Resistant Secure Digital Silo for Log Storage in Critical Infrastructures -- 1 Introduction -- 1.1 Contribution -- 1.2 Organization -- 2 Motivation -- 3 Background -- 3.1 Intel Software Guard Extensions (SGX) -- 3.2 Trusted Platform Module (TPM) -- 3.3 Enterprise Cryptographic Filesystem (eCryptfs) -- 3.4 Secure Block Device (SBD) -- 4 Design -- 5 Implementation and Evaluation -- 6 Conclusions and Future Work -- References. Access Control and Availability Vulnerabilities in the ISO/IEC 61850 Substation Automation Protocol. |
Record Nr. | UNISA-996466435203316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Critical Information Infrastructures Security : 11th International Conference, CRITIS 2016, Paris, France, October 10–12, 2016, Revised Selected Papers / / edited by Grigore Havarneanu, Roberto Setola, Hypatia Nassopoulos, Stephen Wolthusen |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
Descrizione fisica | 1 online resource (XI, 348 p. 103 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Computer communication systems Architecture, Computer Computers and civilization Computers Law and legislation Microprogramming Systems and Data Security Computer Communication Networks Computer System Implementation Computers and Society Legal Aspects of Computing Control Structures and Microprogramming |
ISBN | 3-319-71368-X |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Organization -- Contents -- Stealth Low-Level Manipulation of Programmable Logic Controllers I/O by Pin Control Exploitation -- 1 Introduction -- 2 Background -- 2.1 Pin Control Subsystem -- 2.2 How PLCs Control the Pins -- 3 Pin Control Attack -- 3.1 Security Concerns Regarding Pin Control -- 3.2 Pin Control Attack Details -- 3.3 Threat Model -- 4 A Pin Control Attack in Practice -- 4.1 Environment Setup -- 4.2 Attack Implementation -- 5 Discussion -- 5.1 Implications of Attack on the ICS -- 5.2 Detection of Pin Control Attack -- 6 Related Work -- 7 Conclusion -- References -- Developing a Cyber Incident Communication Management Exercise for CI Stakeholders -- 1 Introduction -- 1.1 Background -- 1.2 Case Study: Red Team - Blue Team Exercise -- 2 Communication Management Exercise for ICS Security (CME-ICS) -- 2.1 Peculiarity of Existing Japanese CIP Training -- 2.2 Discussion-Based Exercise -- 2.3 Theme of the Exercise: Communication Management -- 2.4 Scenario -- 2.5 Exercise Steps -- 2.6 Administration Staff -- 2.7 Pilot Exercises -- 3 Results and Discussion -- 3.1 Variation of Incident Management Structure -- 3.2 Results of the Survey -- 3.3 Discussion -- 3.4 Future Work: ``ICS-SIRT'' Exercise -- References -- On Auxiliary Entity Allocation Problem in Multi-layered Interdependent Critical Infrastructures -- 1 Introduction -- 2 Problem Formulation Using the Implicative Interdependency Model -- 3 Computational Complexity Analysis -- 3.1 Special Case: Problem Instance with One Minterm of Size One -- 3.2 General Case: Problem Instance with an Arbitrary Number of Minterms of Arbitrary Size -- 4 Solutions to the AEAP Problem -- 4.1 Optimal Solution to AEAP Problem -- 4.2 Heuristic Solution to the AEAP Problem -- 5 Experimental Results -- 6 Conclusion -- References -- Cyber Targets Water Management -- 1 Introduction.
1.1 Use of Industrial Control Systems -- 1.2 Cyber Threats and Risk -- 1.3 Structure of This Paper -- 2 Related Work -- 3 A Benchmark of the Resilience of the ICS Environment -- 4 Observed ICS Security Dilemmas -- 5 Cyber Security Simulator for Water Management Control Systems -- 5.1 Deployment of Attack Scenarios -- 5.2 DESI Results -- 6 Conclusions and Future Work -- 6.1 Future Work -- References -- Integrated Safety and Security Risk Assessment Methods: A Survey of Key Characteristics and Applications -- 1 Introduction -- 2 Related Work -- 3 Review Methodology -- 4 Integrated Safety and Security Risk Assessment Methods -- 4.1 SAHARA Method -- 4.2 CHASSIS Method -- 4.3 FACT Graph Method -- 4.4 FMVEA Method -- 4.5 Unified Security and Safety Risk Assessment Method -- 4.6 Extended CFT Method -- 4.7 EFT Method -- 5 Analysis of Integrated Safety and Security Risk Assessment Methods -- 6 Conclusions and Future Work -- References -- Railway Station Surveillance System Design: A Real Application of an Optimal Coverage Approach -- Abstract -- 1 Introduction -- 2 Railway Station Surveillance and Sensor Placement Problem -- 3 Application of the Optimal Coverage Approach to a Real Case -- 3.1 Area of Interest and Input Data -- 3.2 Coverage Analysis and Coverage Matrix -- 3.3 Modeling of the Coverage Problem and Solution of the Model -- 4 Experimental Results -- 4.1 Set Covering Model -- 4.2 Maximal Covering Model -- 5 Conclusions -- References -- A Synthesis of Optimization Approaches for Tackling Critical Information Infrastructure Survivability -- Abstract -- 1 Introduction -- 2 Identifying Critical Network Components: Survivability-Oriented Interdiction Models -- 3 Enhancing Critical Network Survivability: Resource Allocation Strategy Models -- 3.1 Optimization Models for Protecting CII Physical Components. 3.2 Optimization Models for CII Service Restoration -- 4 Planning Survivable Networks: Design Models -- 5 Future Research Suggestions -- 6 Conclusions -- References -- A Dataset to Support Research in the Design of Secure Water Treatment Systems -- 1 Introduction -- 2 Secure Water Treatment (SWaT) -- 2.1 Water Treatment Process -- 2.2 Communications -- 3 Attack Scenarios -- 4 Data Collection Process -- 4.1 Physical Properties -- 4.2 Network Traffic -- 4.3 Labelling Data -- 5 Conclusion -- References -- Human Vulnerability Mapping Facing Critical Service Disruptions for Crisis Managers -- Abstract -- 1 Introduction -- 2 Consequence Assessment -- 3 Modelling People Mobility -- 4 Results and Interests of Mapping Human Vulnerability -- 5 Improving Human Vulnerability Assessment -- 6 Conclusion -- Acknowledgments -- References -- A Methodology for Monitoring and Control Network Design -- 1 Introduction -- 2 Related Work -- 3 Asset Risk Assessment in ICS -- 3.1 Overview of the CAIA Approach -- 3.2 Risk Assessment Based on the Impact Measures -- 4 Optimal Control Network Design -- 5 Experimental Results -- 5.1 Results on the TEP -- 5.2 Results on the IEEE 14-Bus Electricity Grid -- 5.3 Results on the IEEE 300-Bus Electricity Grid Model -- 6 Conclusions -- References -- Effective Defence Against Zero-Day Exploits Using Bayesian Networks -- 1 Introduction -- 2 Modelling and Problem Representation -- 3 Case Study and Results -- 3.1 Case Study Settings -- 3.2 Results -- Deploying a Single Control -- 3.3 Results -- Deploying Combined Controls -- 4 Related Work -- 5 Conclusion and Future Work -- References -- Power Auctioning in Resource Constrained Micro-grids: Cases of Cheating -- 1 Introduction -- 2 Related Work -- 3 Decentralised Continuous Double Auction Model -- 4 Cheating CDA Attacks -- 4.1 Case 1: Victim Strategy Downgrade -- 4.2 Case 2: Collusion Attack. 5 Sketch Countermeasures -- 6 Conclusions -- References -- Using Incentives to Foster Security Information Sharing and Cooperation: A General Theory and Application to Critical Infrastructure Protection -- 1 Introduction -- 2 Theoretical Framework and Propositions -- 2.1 Regulation Alone Cannot Solve the Free Rider Problem -- 2.2 Linking Incentives to Voluntary SIS -- 2.3 A Holistic and Multidisciplinary Approach -- 2.4 A Model Linking Incentives, Behavior, and SIS -- 2.5 Reciprocity Expectation -- 2.6 Value Expectation -- 2.7 Institutional Expectation -- 2.8 Reputation Expectation -- 2.9 The Moderating Role of Trust -- 3 Application of the Proposed Model to Critical Infrastructure Protection -- 3.1 The Swiss Reporting and Analysis Centre for Information Security -- 3.2 Reciprocity Expectation -- 3.3 Value Expectation -- 3.4 Institutional Expectation -- 3.5 Reputation Expectation -- 3.6 The Moderating Role of Trust -- 4 Discussion -- 5 Concluding Comments and Next Steps -- References -- Dynamic Risk Analyses and Dependency-Aware Root Cause Model for Critical Infrastructures -- 1 Introduction -- 2 Terminology -- 3 Risk Assessments Using the Dependency-Aware Root Cause (DARC) Model -- 4 Risk Taxonomy for Critical Infrastructures -- 4.1 Dependency Definition Language -- 4.2 Generating the Dependency Graph -- 5 The `Smart Grid Luxembourg' Use-Case -- 5.1 Compiling a Dependency-Aware Inventory -- 5.2 Threat Model -- 5.3 Generation of the Dependency Graph -- 5.4 Results -- 6 Conclusion and Future Work -- References -- Selecting Privacy Solutions to Prioritise Control in Smart Metering Systems -- 1 Introduction -- 2 Privacy and Automation Properties -- 3 Selecting Techniques: Analysis and Discussion -- 3.1 Analysis of Privacy Techniques -- 3.2 Discussion: Privacy vs. Control -- 4 Conclusions and Future Work -- References. A Six-Step Model for Safety and Security Analysis of Cyber-Physical Systems -- 1 Introduction -- 2 Preliminaries and Background -- 2.1 CPS Safety and Security -- 2.2 GTST-MLD and the 3-Step Model -- 2.3 The SWaT System -- 3 Complex System Safety and Security Modeling: SSM -- 4 Summary and Conclusion -- References -- Availability Study of the Italian Electricity SCADA System in the Cloud -- 1 Introduction -- 1.1 The Hierarchical SCADA System -- 1.2 Cloud Deployments for a Nationwide SCADA System -- 2 Availability Computation in a Hierarchical SCADA Network -- 2.1 Availability Model for an Optical Network -- 2.2 Availability Computation -- 3 Availability Assessment in the SCADA System Managing the Italian Electricity Grid -- 4 Conclusion -- References -- Railway System Failure Scenario Analysis -- 1 Introduction -- 2 Failure Scenario Analysis: From Power Grid to Railway -- 2.1 NESCOR Failure Scenarios for the Energy Sector -- 2.2 Toward Railway Transportation Failure Scenarios -- 3 Sample Railway System Failure Scenarios -- 3.1 Compromised HMI Sends Malicious Commands to Devices -- 3.2 SCADA Firewall Fails and Critical Traffic Cannot Reach Devices -- 4 Analyzing Scenarios for a Railway System -- 4.1 Failure Scenario Analysis Tool -- 4.2 Case Study: Deploying SCADA Firewalls -- 4.3 Discussion -- 5 Related Work -- 6 Conclusion -- References -- Tamper Resistant Secure Digital Silo for Log Storage in Critical Infrastructures -- 1 Introduction -- 1.1 Contribution -- 1.2 Organization -- 2 Motivation -- 3 Background -- 3.1 Intel Software Guard Extensions (SGX) -- 3.2 Trusted Platform Module (TPM) -- 3.3 Enterprise Cryptographic Filesystem (eCryptfs) -- 3.4 Secure Block Device (SBD) -- 4 Design -- 5 Implementation and Evaluation -- 6 Conclusions and Future Work -- References. Access Control and Availability Vulnerabilities in the ISO/IEC 61850 Substation Automation Protocol. |
Record Nr. | UNINA-9910484853903321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Critical Infrastructure Protection IX : 9th IFIP 11.10 International Conference, ICCIP 2015, Arlington, VA, USA, March 16-18, 2015, Revised Selected Papers / / edited by Mason Rice, Sujeet Shenoi |
Edizione | [1st ed. 2015.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 |
Descrizione fisica | 1 online resource (XVIII, 331 p. 95 illus. in color.) |
Disciplina | 005.8 |
Collana | IFIP Advances in Information and Communication Technology |
Soggetto topico |
Data protection
Electronic data processing - Management Computers - Law and legislation Information technology - Law and legislation Computers and civilization Data and Information Security IT Operations Legal Aspects of Computing Computers and Society |
ISBN | 3-319-26567-9 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910299258203321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Critical Infrastructure Protection VII : 7th IFIP WG 11.10 International Conference, ICCIP 2013, Washington, DC, USA, March 18-20, 2013, Revised Selected Papers / / edited by Jonathan Butts, Sujeet Shenoi |
Edizione | [1st ed. 2013.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 |
Descrizione fisica | 1 online resource (XVI, 227 p. 68 illus.) |
Disciplina | 005.8 |
Collana | IFIP Advances in Information and Communication Technology |
Soggetto topico |
Data protection
Electronic data processing - Management Computers - Law and legislation Information technology - Law and legislation Computers and civilization Data and Information Security IT Operations Legal Aspects of Computing Computers and Society |
ISBN | 3-642-45330-9 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Political and Economic Implications of Authoritarian Control of the Internet -- Data Handling in the Smart Grid: Do We Know Enough? -- Design and Implementation of Industrial Control System -- ZigBee Device Verification for Securing Industrial Control and Building Automation Systems -- Defensive Rekeying Strategies for Physical-Layer-Monitored Low-Rate Wireless Personal Area Networks -- A Distributed Real-Time Event Correlation Architecture for SCADA Security -- Protecting Infrastructure Assets from Real-Time and Run-Time Threats -- Anomaly Intrusion Detection in Liquid Pipelines Using Modeling, Co-Simulation and Dynamical Estimation -- Factors Impacting Attacker Decision-Making in Power Grid Cyber Attacks -- Timely Delivery of Messages in Positive Train Control -- Modeling Service Migration and Relocation in Mission-Critical Systems -- Cascading Effects of Common-Cause Failures in Critical Infrastructures -- A Platform for Disaster Response Planning with Interdependency Simulation Functionality -- Mission-Based Analysis for Assessing Cyber Risk in Critical Infrastructure Systems -- Assessing the Impact of Cyber Attacks on Interdependent Physical Systems. |
Record Nr. | UNINA-9910437595503321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|