Critical information infrastructures security : second international workshop, CRITIS 2007, Málaga, Spain, October 3-5, 2007 : revised papers / / Javier Lopez, Bernhard M. Hämmerli (eds.) |
Edizione | [1st ed. 2008.] |
Pubbl/distr/stampa | Berlin, Germany ; ; New York, New York : , : Springer, , [2008] |
Descrizione fisica | 1 online resource (XI, 362 p.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computers - Access control
Computer security |
ISBN |
1-283-43791-0
9786613437914 3-540-89173-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Session 1: R&D Agenda -- Towards a European Research Agenda for CIIP: Results from the CI2RCO Project -- ICT Vulnerabilities of the Power Grid: Towards a Road Map for Future Research -- Session 2: Communication Risk and Assurance I -- An Analysis of Cyclical Interdependencies in Critical Infrastructures -- A Framework for 3D Geospatial Buffering of Events of Interest in Critical Infrastructures -- Designing Information System Risk Management Framework Based on the Past Major Failures in the Japanese Financial Industry -- Advanced Reaction Using Risk Assessment in Intrusion Detection Systems -- Session 3: Communication Risk and Assurance II -- Managing Critical Infrastructures through Virtual Network Communities -- The Structure of the Sense of Security, Anshin -- Securing Agents against Malicious Host in an Intrusion Detection System -- Session 4: Code of Practice and Metrics -- UML Diagrams Supporting Domain Specification Inside the CRUTIAL Project -- Expert System CRIPS: Support of Situation Assessment and Decision Making -- Using Dependent CORAS Diagrams to Analyse Mutual Dependency -- A Methodology to Estimate Input-Output Inoperability Model Parameters -- Session 5: Information Sharing and Exchange -- Efficient Access Control for Secure XML Query Processing in Data Streams -- An Approach to Trust Management Challenges for Critical Infrastructures -- Session 6: Continuity of Services and Resiliency -- Detecting DNS Amplification Attacks -- LoRDAS: A Low-Rate DoS Attack against Application Servers -- Intra Autonomous System Overlay Dedicated to Communication Resilience -- A Proposal for the Definition of Operational Plans to Provide Dependability and Security -- Session 7: SCADA and Embedded Security -- Application of Kohonen Maps to Improve Security Tests on Automation Devices -- Ideal Based Cyber Security Technical Metrics for Control Systems -- Designing Critical Infrastructure Cyber Security Segmentation Architecture by Balancing Security with Reliability and Availability -- Session 8: Threats and Attacks Modeling -- A General Model and Guidelines for Attack Manifestation Generation -- A Survey on Detection Techniques to Prevent Cross-Site Scripting Attacks on Current Web Applications -- Attack Modeling of SIP-Oriented SPIT -- A Malware Detector Placement Game for Intrusion Detection -- Session 9: Information Exchange and Modelling -- Modeling and Simulating Information Security Management -- Design of a Platform for Information Exchange on Protection of Critical Infrastructures -- Towards a Standardised Cross-Sector Information Exchange on Present Risk Factors. |
Record Nr. | UNINA-9910483114703321 |
Berlin, Germany ; ; New York, New York : , : Springer, , [2008] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Critical information infrastructures security : second international workshop, CRITIS 2007, Málaga, Spain, October 3-5, 2007 : revised papers / / Javier Lopez, Bernhard M. Hämmerli (eds.) |
Edizione | [1st ed. 2008.] |
Pubbl/distr/stampa | Berlin, Germany ; ; New York, New York : , : Springer, , [2008] |
Descrizione fisica | 1 online resource (XI, 362 p.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computers - Access control
Computer security |
ISBN |
1-283-43791-0
9786613437914 3-540-89173-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Session 1: R&D Agenda -- Towards a European Research Agenda for CIIP: Results from the CI2RCO Project -- ICT Vulnerabilities of the Power Grid: Towards a Road Map for Future Research -- Session 2: Communication Risk and Assurance I -- An Analysis of Cyclical Interdependencies in Critical Infrastructures -- A Framework for 3D Geospatial Buffering of Events of Interest in Critical Infrastructures -- Designing Information System Risk Management Framework Based on the Past Major Failures in the Japanese Financial Industry -- Advanced Reaction Using Risk Assessment in Intrusion Detection Systems -- Session 3: Communication Risk and Assurance II -- Managing Critical Infrastructures through Virtual Network Communities -- The Structure of the Sense of Security, Anshin -- Securing Agents against Malicious Host in an Intrusion Detection System -- Session 4: Code of Practice and Metrics -- UML Diagrams Supporting Domain Specification Inside the CRUTIAL Project -- Expert System CRIPS: Support of Situation Assessment and Decision Making -- Using Dependent CORAS Diagrams to Analyse Mutual Dependency -- A Methodology to Estimate Input-Output Inoperability Model Parameters -- Session 5: Information Sharing and Exchange -- Efficient Access Control for Secure XML Query Processing in Data Streams -- An Approach to Trust Management Challenges for Critical Infrastructures -- Session 6: Continuity of Services and Resiliency -- Detecting DNS Amplification Attacks -- LoRDAS: A Low-Rate DoS Attack against Application Servers -- Intra Autonomous System Overlay Dedicated to Communication Resilience -- A Proposal for the Definition of Operational Plans to Provide Dependability and Security -- Session 7: SCADA and Embedded Security -- Application of Kohonen Maps to Improve Security Tests on Automation Devices -- Ideal Based Cyber Security Technical Metrics for Control Systems -- Designing Critical Infrastructure Cyber Security Segmentation Architecture by Balancing Security with Reliability and Availability -- Session 8: Threats and Attacks Modeling -- A General Model and Guidelines for Attack Manifestation Generation -- A Survey on Detection Techniques to Prevent Cross-Site Scripting Attacks on Current Web Applications -- Attack Modeling of SIP-Oriented SPIT -- A Malware Detector Placement Game for Intrusion Detection -- Session 9: Information Exchange and Modelling -- Modeling and Simulating Information Security Management -- Design of a Platform for Information Exchange on Protection of Critical Infrastructures -- Towards a Standardised Cross-Sector Information Exchange on Present Risk Factors. |
Record Nr. | UNISA-996465898503316 |
Berlin, Germany ; ; New York, New York : , : Springer, , [2008] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Detection of intrusions and malware, and vulnerability assessment : 4th International Conference, DIMVA 2007, Lucerne, Switzerland, July 12-13, 2007 ; proceedings / / Bernhard M. Hämmerli, Robin Sommer (editors) |
Edizione | [1st ed. 2007.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer-Verlag, , [2007] |
Descrizione fisica | 1 online resource (X, 254 p.) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Computers - Access control
Computers - Access control - Evaluation Computer networks - Security measures |
ISBN | 3-540-73614-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Web Security -- Extensible Web Browser Security -- On the Effectiveness of Techniques to Detect Phishing Sites -- Protecting the Intranet Against “JavaScript Malware” and Related Attacks -- Intrusion Detection -- On the Effects of Learning Set Corruption in Anomaly-Based Detection of Web Defacements -- Intrusion Detection as Passive Testing: Linguistic Support with TTCN-3 (Extended Abstract) -- Characterizing Bots’ Remote Control Behavior -- Traffic Analysis -- Measurement and Analysis of Autonomous Spreading Malware in a University Environment -- Passive Monitoring of DNS Anomalies -- Characterizing Dark DNS Behavior -- Network Security -- Distributed Evasive Scan Techniques and Countermeasures -- On the Adaptive Real-Time Detection of Fast-Propagating Network Worms -- Host Security -- Targeting Physically Addressable Memory -- Static Analysis on x86 Executables for Preventing Automatic Mimicry Attacks -- A Study of Malcode-Bearing Documents. |
Record Nr. | UNINA-9910484973703321 |
Berlin, Heidelberg : , : Springer-Verlag, , [2007] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Detection of intrusions and malware, and vulnerability assessment : 4th International Conference, DIMVA 2007, Lucerne, Switzerland, July 12-13, 2007 ; proceedings / / Bernhard M. Hämmerli, Robin Sommer (editors) |
Edizione | [1st ed. 2007.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer-Verlag, , [2007] |
Descrizione fisica | 1 online resource (X, 254 p.) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Computers - Access control
Computers - Access control - Evaluation Computer networks - Security measures |
ISBN | 3-540-73614-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Web Security -- Extensible Web Browser Security -- On the Effectiveness of Techniques to Detect Phishing Sites -- Protecting the Intranet Against “JavaScript Malware” and Related Attacks -- Intrusion Detection -- On the Effects of Learning Set Corruption in Anomaly-Based Detection of Web Defacements -- Intrusion Detection as Passive Testing: Linguistic Support with TTCN-3 (Extended Abstract) -- Characterizing Bots’ Remote Control Behavior -- Traffic Analysis -- Measurement and Analysis of Autonomous Spreading Malware in a University Environment -- Passive Monitoring of DNS Anomalies -- Characterizing Dark DNS Behavior -- Network Security -- Distributed Evasive Scan Techniques and Countermeasures -- On the Adaptive Real-Time Detection of Fast-Propagating Network Worms -- Host Security -- Targeting Physically Addressable Memory -- Static Analysis on x86 Executables for Preventing Automatic Mimicry Attacks -- A Study of Malcode-Bearing Documents. |
Record Nr. | UNISA-996466117903316 |
Berlin, Heidelberg : , : Springer-Verlag, , [2007] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|