Critical Infrastructure Protection VIII [[electronic resource] ] : 8th IFIP WG 11.10 International Conference, ICCIP 2014, Arlington, VA, USA, March 17-19, 2014, Revised Selected Papers / / edited by Jonathan Butts, Sujeet Shenoi |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (XVIII, 276 p. 86 illus.) |
Disciplina | 005.8 |
Collana | IFIP Advances in Information and Communication Technology |
Soggetto topico |
Computer security
Management information systems Computer science Computers Law and legislation Computers and civilization Systems and Data Security Management of Computing and Information Systems Legal Aspects of Computing Computers and Society |
ISBN | 3-662-45355-X |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Detecting Integrity Attacks on Industrial Control Systems -- Detecting Malicious Software Execution in Programmable Logic Controllers Using Power Fingerprinting -- Timing of Cyber-Physical Attacks on Process Control Systems -- Recovery of Structural Controllability for Control Systems -- Industrial Control System Traffic Data Sets for Intrusion Detection Research -- An Industrial Control System Testbed Based on Emulation, Physical Devices and Simulation -- Evidence Theory for Cyber-Physical Systems -- An Automated Dialog System for Conducting Security Interviews for Access Control -- A Survey of Critical Infrastructure Security -- A System Dynamics Framework for Modeling Critical Infrastructure Resilience -- Reinforcement Learning Using Monte Carlo Policy Estimation for Disaster Mitigation -- Accuracy of Service Area Estimation Methods Used for Critical Infrastructure Recovery -- A Decision Support Tool for a Unified Homeland Security Strategy -- Assessing the Impact of Cyber Attacks on Wireless Sensor Nodes That Monitor Interdependent Physical Systems -- Assessing Potential Casualties in Critical Events -- Evaluation of Format-Preserving Encryption Algorithms for Critical Infrastructure Protection -- Asynchronous Binary Byzantine Consensus over Graphs with Power-Law Degree Sequence. |
Record Nr. | UNINA-9910298968203321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Critical Infrastructure Protection X : 10th IFIP WG 11.10 International Conference, ICCIP 2016, Arlington, VA, USA, March 14-16, 2016, Revised Selected Papers / / edited by Mason Rice, Sujeet Shenoi |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
Descrizione fisica | 1 online resource (XIV, 255 p. 62 illus.) |
Disciplina | 658.478 |
Collana | IFIP Advances in Information and Communication Technology |
Soggetto topico |
Data protection
Electronic data processing - Management Computers - Law and legislation Information technology - Law and legislation Computers and civilization Computer simulation Data and Information Security IT Operations Legal Aspects of Computing Computers and Society Computer Modelling |
ISBN | 3-319-48737-X |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910255004403321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Critical Infrastructure Protection XII : 12th IFIP WG 11.10 International Conference, ICCIP 2018, Arlington, VA, USA, March 12-14, 2018, Revised Selected Papers / / edited by Jason Staggs, Sujeet Shenoi |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
Descrizione fisica | 1 online resource (XVI, 306 p. 1 illus.) |
Disciplina | 005.8 |
Collana | IFIP Advances in Information and Communication Technology |
Soggetto topico |
Data protection
Computers - Law and legislation Information technology - Law and legislation Computers and civilization Data mining Data and Information Security Legal Aspects of Computing Computers and Society Data Mining and Knowledge Discovery |
ISBN | 3-030-04537-4 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910303450703321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Critical Infrastructure Protection XIII : 13th IFIP WG 11.10 International Conference, ICCIP 2019, Arlington, VA, USA, March 11–12, 2019, Revised Selected Papers / / edited by Jason Staggs, Sujeet Shenoi |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (XVI, 328 p. 1 illus.) |
Disciplina | 005.8 |
Collana | IFIP Advances in Information and Communication Technology |
Soggetto topico |
Data protection
Computers - Law and legislation Information technology - Law and legislation Computer networks Software engineering Application software Data and Information Security Legal Aspects of Computing Computer Communication Networks Software Engineering Computer and Information Systems Applications |
ISBN | 3-030-34647-1 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910357849303321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Critical Infrastructure Protection XIV : 14th IFIP WG 11.10 International Conference, ICCIP 2020, Arlington, VA, USA, March 16–17, 2020, Revised Selected Papers / / edited by Jason Staggs, Sujeet Shenoi |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (XVI, 331 p. 112 illus.) |
Disciplina | 005.8 |
Collana | IFIP Advances in Information and Communication Technology |
Soggetto topico |
Data protection
Application software Computer networks Computers - Law and legislation Information technology - Law and legislation Data and Information Security Computer and Information Systems Applications Computer Communication Networks Legal Aspects of Computing |
ISBN | 3-030-62840-X |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Aviation Infrastructure Security -- Cyber-Physical Security of Air Traffic Surveillance Systems -- Simulation-Based Logic Bomb Identification and Verification for Unmanned Aerial Vehicles -- Assessing the Cyber Risk of Small Unmanned Aerial Vehicles -- Cyber State Requirements for Design and Validation of Trust in the Critical Transportation Infrastructure -- Vehicle Infrastructure Security -- An Efficient Blockchain Authentication Scheme for Vehicular Ad-Hoc Networks -- Engaging Empirical Dynamic Modeling to Detect Intrusions in Cyber-Physical Systems -- Telecommunications Systems Security -- Multi-Channel Security Through Data Fragmentation -- Securing an InfiniBand Network and its Effect on Performance -- Industrial Control Systems Security -- Cyber-Resilient SCADA Systems via Secure State Restoration -- Vulnerability Assessments of Building Management Systems -- Forensic Investigation of a Hacked Industrial Robot -- Cyber-Physical Systems Security -- Distributed Bias Detection in Cyber-Physical Systems -- Comparison of Design-Centric and Data-Centric Methods for Distributed Attack Detection in Cyber-Physical Systems -- Infrastructure Modeling and Simulation -- A Model-Based Safety-Security Risk Analysis Framework for Interconnected Critical Infrastructures -- Creating a Cross-Domain Simulation Framework for Risk Analyses of Cities -- Modeling Telecommunications Infrastructures Using the CISIApro 2.0 Simulator. |
Record Nr. | UNINA-9910447243003321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Critical Infrastructure Protection XVI : 16th IFIP WG 11.10 International Conference, ICCIP 2022, Virtual Event, March 14–15, 2022, Revised Selected Papers / / edited by Jason Staggs, Sujeet Shenoi |
Edizione | [1st ed. 2022.] |
Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2022 |
Descrizione fisica | 1 online resource (303 pages) |
Disciplina | 005.8 |
Collana | IFIP Advances in Information and Communication Technology |
Soggetto topico |
Data protection
Computer engineering Computer networks Computers - Law and legislation Information technology - Law and legislation Data and Information Security Computer Engineering and Networks Legal Aspects of Computing |
ISBN | 3-031-20137-X |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Contents -- Contributing Authors -- Preface -- I THEMES AND ISSUES -- Chapter 1 NATIONAL CYBER RESILIENCE AND ROLES FOR PUBLIC AND PRIVATE SECTOR STAKEHOLDERS -- 1. Introduction -- 2. Related Work -- 2.1 Cyber Infrastructure Threats -- 2.2 Cyber Infrastructure Resilience -- 3. Cyber Infrastructure and Threats -- 3.1 Cyber Infrastructure Model -- 3.2 Cyber Infrastructure Threats -- 4. National-Scale Resilience Model -- 4.1 Cyber Infrastructure and Resilience -- 4.2 Basic Resilience Model -- 4.3 Applying Resilience to Cyber Infrastructure -- 4.4 Measuring Practices in Cyber Infrastructure -- 5. Implementing the Resilience Model -- 5.1 Phase 1: Prepare -- 5.2 Phase 2: Implement -- 5.3 Phase 3: Test -- 5.4 Phase 4: Evaluate -- 6. Stakeholders and Roles -- 6.1 Cyber Resilience Government Stakeholders -- 6.2 Building Cyber Infrastructure Resilience -- 7. Conclusions -- References -- Chapter 2 ARE EUROPEAN SECURITY POLICIES READY FOR ADVANCED METERING SYSTEMS WITH CLOUD BACK-ENDS? -- 1. Introduction -- 2. Background -- 2.1 Advanced Metering System Evolution -- 2.2 European Union Cyber Security Legislation -- 3. Research Methodology Overview -- 4. Reference Model -- 5. Framework to Legislation Mapping -- 6. Cloud-Secure AMS Policy Framework -- 7. Conclusions -- Acknowledgements -- References -- II INDUSTRIAL CONTROL SYSTEMS SECURITY -- Chapter 3 IMPORTANCE OF CYBER SECURITY ANALYSIS IN THE OPERATIONAL TECHNOLOGY SYSTEM LIFECYCLE -- 1. Introduction -- 2. Project Background and Overview -- 3. Assessment Methodology -- 4. Research Findings -- 4.1 Device Command Processing -- 4.2 IMS/AMS Operator Workstations -- 4.3 Safety Instrumented SystemCommunications -- 4.4 Security Control Performance -- 4.5 Assessment Questions and Findings -- 4.6 Architecture Comparison -- 5. Recommendations -- 6. Discussion -- 7. Conclusions -- Acknowledgements.
References -- Chapter 4 TRUSTED VIRTUALIZATION-BASED PROGRAMMABLE LOGIC CONTROLLER RESILIENCE USING A BACKFIT APPROACH -- 1. Introduction -- 2. Related Work -- 3. Virtualization for Trust and Resilience -- 3.1 PLC Virtualization -- 3.2 Remote TPM-Based Attestation -- 4. Experiments and Results -- 4.1 Experimental Environment -- 4.2 Resilience Experiments and Results -- 5. Conclusions -- References -- III ADDITIVE MANUFACTURING SYSTEMS -- Chapter 5 ATTACK-DEFENSE MODELING OF MATERIAL EXTRUSION ADDITIVE MANUFACTURING SYSTEMS -- 1. Introduction -- 2. Additive Manufacturing Workflow -- 3. Additive Manufacturing Threats -- 3.1 Threats Leveraging Additive Manufacturing -- 3.2 Threats Against Additive Manufacturing -- 4. Material Extrusion Additive Manufacturing -- 5. Attack-Defense Modeling -- 6. Material Extrusion Attack-Defense Model -- 6.1 Design Phase Attack-Defense Model -- 6.2 Slicing Phase Attack-Defense Model -- 6.3 Printing Phase Attack-Defense Model -- 7. Material Extrusion Case Studies -- 7.1 Printer Annamieke -- 7.2 Printer Beatrijs -- 7.3 Printer Cathelijne -- 8. Material Extrusion Attacks -- 8.1 Design Phase Attack -- 8.2 Slicing Phase Attacks -- 8.3 Printing Phase Attack -- 9. Discussion -- 10. Conclusions -- Acknowledgement -- References -- Chapter 6 MANIPULATION OF G-CODE TOOLPATH FILES IN 3D PRINTERS: ATTACKS AND MITIGATIONS -- 1. Introduction -- 2. Background and Related Work -- 2.1 Additive Manufacturing Process Chain -- 2.2 Process Chain Attacks -- 3. G-Code Toolpath File Attack Surface -- 4. G-Code Toolpath File Exploitation -- 4.1 Software Execution Vulnerability -- 4.2 Software Execution Attack -- 5. G-Code Toolpath File Attacks -- 5.1 Temperature Modification Attacks -- 5.2 Infill Exclusion Attacks -- 6. Attack Results and Mitigations -- 6.1 Attack Effectiveness Experiments -- 6.2 Temperature Modification Experiments. 6.3 Infill Exclusion Experiments -- 6.4 Discussion -- 7. Mitigations -- 8. Conclusions -- Acknowledgement -- References -- Chapter 7 DETECTING PART ANOMALIES INDUCED BY CYBER ATTACKS ON A POWDER BED FUSION ADDITIVE MANUFACTURING SYSTEM -- 1. Introduction -- 2. Related Work -- 3. Powder Bed Fusion -- 3.1 Powder Bed Fusion Process -- 3.2 Selective Laser Sintering Printer -- 4. Powder Bed Fusion Printer Anomalies -- 5. Anomaly Detection Method -- 5.1 Data Collection -- 5.2 Data Processing -- 5.3 Data Analysis -- 6. Anomaly Creation Attacks -- 7. Experimental Setup and Results -- 7.1 Experimental Setup -- 7.2 Anomaly Detection Results -- 8. Discussion -- 9. Conclusions -- Acknowledgement -- References -- Chapter 8 LOW-MAGNITUDE INFILL STRUCTURE MANIPULATION ATTACKS ON FUSED FILAMENT FABRICATION 3D PRINTERS -- 1. Introduction -- 2. Related Work -- 3. Low-Magnitude Infill Structure Attacks -- 3.1 Attack Success Criteria -- 3.2 Printing Accuracy -- 3.3 Attacking Infill Structures -- 4. Attack Implementation -- 4.1 Attack Overview -- 4.2 Attack Plan -- 5. Evaluation Results -- 5.1 Stealthiness Performance -- 5.2 Mechanical Strength Impacts -- 6. Analysis and Discussion -- 7. Attack Countermeasures -- 8. Conclusions -- Acknowledgement -- References -- IV INFRASTRUCTURE DEVICE SECURITY -- Chapter 9 LEVERAGING CONFIDENTIAL COMPUTING TO ENABLE SECURE INFORMATION SHARING -- 1. Introduction -- 2. Background and Related Work -- 2.1 Confidential Computing -- 2.2 RISC-V Instruction Set Architecture -- 2.3 Keystone Enclave -- 2.4 Related Work -- 3. Experimental Configuration -- 4. Proposed Development -- 5. Experimental Results and Analysis -- 6. Conclusions -- References -- Chapter 10 EVALUATING THE USE OF BOOT IMAGE ENCRYPTION ON THE TALOS II ARCHITECTURE -- 1. Introduction -- 2. Background -- 2.1 Talos II Architecture -- 2.2 PNOR Image Structure. 2.3 Initial Program Load -- 2.4 Ciphers -- 2.5 Secure Key Management -- 3. Related Work -- 3.1 Secure Firmware Updates Using AES -- 3.2 Image Encryption -- 4. Experimental Setup -- 4.1 Microcontroller Setup -- 5. Experimental Methodology -- 5.1 Experimental Factors -- 5.2 Data Collection -- 5.3 Application Scenarios -- 5.4 Assumptions -- 6. Experimental Results and Analysis -- 6.1 Boot Image Encryption Performance Impact -- 6.2 Comparison of Encryption Methods -- 6.3 Encryption Ratio -- 7. Conclusions -- References -- V TELECOMMUNICATIONS SYSTEMS SECURITY -- Chapter 11 SECURING INFINIBAND TRAFFIC WITH BLUEFIELD-2 DATA PROCESSING UNITS -- 1. Introduction -- 2. Background and Related Work -- 2.1 InfiniBand Network Overview -- 2.2 Convergent Technologies -- 2.3 Security Concepts -- 3. Testbed Design -- 4. Experimental Scenarios -- 5. Experimental Results -- 6. Conclusions -- References. |
Record Nr. | UNINA-9910633936603321 |
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2022 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Critical Infrastructure Protection XVII [[electronic resource] ] : 17th IFIP WG 11.10 International Conference, ICCIP 2023, Arlington, VA, USA, March 13–14, 2023, Revised Selected Papers / / edited by Jason Staggs, Sujeet Shenoi |
Edizione | [1st ed. 2024.] |
Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024 |
Descrizione fisica | 1 online resource (X, 253 p. 84 illus., 7 illus. in color.) |
Disciplina | 005.8 |
Collana | IFIP Advances in Information and Communication Technology |
Soggetto topico |
Data protection
Computer engineering Computer networks Computers - Law and legislation Information technology - Law and legislation Data and Information Security Computer Engineering and Networks Legal Aspects of Computing |
ISBN | 3-031-49585-3 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Themes and Issues -- Redefining Homeland Security -- Smart Grid Risks and Impacts -- Smart-Grid-Enabled Business Cases and the Consequences of Cyber Attacks -- Consequence Verification During Risk Assessments of Smart Grids -- Measuring the Impacts of Power Outages on Internet Hosts in the United States -- Network and Telecommunications Systems Security -- Analyzing Discrepancies in Whole-Network Provenance -- A Contextual Integrity Property to Impede Privacy Violations in 5G Networks -- Infrastructure Security -- Modeling and Assessing the Impacts of Cyber Threats on Interdependent Critical Infrastructures -- Security-Enhanced Orchestration Platform for Building Management Systems -- Practical Deep Neural Network Protection for Unmodified Applications in Intel Software Guard Extension Environments -- Automobile Security -- A Cyber Security Analysis Methodology for Evaluating Automobile Risk Exposures -- Real-Time Attack Detection in Modern Automobile Controller Area Networks. |
Record Nr. | UNINA-9910799493803321 |
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyber Security Cryptography and Machine Learning [[electronic resource] ] : Third International Symposium, CSCML 2019, Beer-Sheva, Israel, June 27–28, 2019, Proceedings / / edited by Shlomi Dolev, Danny Hendler, Sachin Lodha, Moti Yung |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (XIII, 330 p. 141 illus., 76 illus. in color.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Computer communication systems Computer networks - Security measures Data encryption (Computer science) Computers Law and legislation Computers and civilization Systems and Data Security Computer Communication Networks Mobile and Network Security Cryptology Legal Aspects of Computing Computers and Society |
ISBN | 3-030-20951-2 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996466330703316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Cyber Security Cryptography and Machine Learning : Third International Symposium, CSCML 2019, Beer-Sheva, Israel, June 27–28, 2019, Proceedings / / edited by Shlomi Dolev, Danny Hendler, Sachin Lodha, Moti Yung |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (XIII, 330 p. 141 illus., 76 illus. in color.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Computer communication systems Computer networks - Security measures Data encryption (Computer science) Computers Law and legislation Computers and civilization Systems and Data Security Computer Communication Networks Mobile and Network Security Cryptology Legal Aspects of Computing Computers and Society |
ISBN | 3-030-20951-2 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910337850903321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Cybersecurity in France / / by Philippe Baumard |
Autore | Baumard Philippe |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
Descrizione fisica | 1 online resource (IX, 106 p. 12 illus.) |
Disciplina | 343.0999 |
Collana | SpringerBriefs in Cybersecurity |
Soggetto topico |
Computers
Law and legislation Legal Aspects of Computing |
ISBN | 3-319-54308-3 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Introduction -- A Brief History of Hacking and Cyberdefense -- The Determinants of a National Cyber-strategy -- National Cyberdoctrines: Forthcoming Strategic Shifts -- Conclusion. |
Record Nr. | UNINA-9910254822003321 |
Baumard Philippe
![]() |
||
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|