Applied Cryptography and Network Security [[electronic resource] ] : 9th International Conference, ACNS 2011, Nerja, Spain, June 7-10, 2011, Proceedings / / edited by Javier López, Gene Tsudik |
Edizione | [1st ed. 2011.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011 |
Descrizione fisica | 1 online resource (XIII, 552 p.) |
Disciplina | 005.82 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer science—Mathematics Computer communication systems Management information systems Computer science Algorithms Computer security Cryptology Discrete Mathematics in Computer Science Computer Communication Networks Management of Computing and Information Systems Algorithm Analysis and Problem Complexity Systems and Data Security |
ISBN | 3-642-21554-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996465404903316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Critical Information Infrastructures Security [[electronic resource] ] : 7th International Workshop, CRITIS 2012, Lillehammer, Norway, September 17-18, 2012. Revised Selected Papers / / edited by Bernhard Hämmerli, Nils Kalstad Svendsen, Javier Lopez |
Edizione | [1st ed. 2013.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 |
Descrizione fisica | 1 online resource (XIV, 277 p. 103 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Computers and civilization Computer communication systems Systems and Data Security Computers and Society Computer Communication Networks |
ISBN | 3-642-41485-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Intrusion management -- Smart metering and grid -- Analysis and modeling -- SCADA -- Cyber issues -- CI analysis -- CIP sectors -- CI assessment.- Threat modeling. |
Record Nr. | UNISA-996465495003316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Critical Information Infrastructures Security : 7th International Workshop, CRITIS 2012, Lillehammer, Norway, September 17-18, 2012. Revised Selected Papers / / edited by Bernhard Hämmerli, Nils Kalstad Svendsen, Javier Lopez |
Edizione | [1st ed. 2013.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 |
Descrizione fisica | 1 online resource (XIV, 277 p. 103 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Computers and civilization Computer networks Systems and Data Security Computers and Society Computer Communication Networks |
ISBN | 3-642-41485-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Intrusion management -- Smart metering and grid -- Analysis and modeling -- SCADA -- Cyber issues -- CI analysis -- CIP sectors -- CI assessment.- Threat modeling. |
Record Nr. | UNINA-9910483894803321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Critical information infrastructures security : second international workshop, CRITIS 2007, Málaga, Spain, October 3-5, 2007 : revised papers / / Javier Lopez, Bernhard M. Hämmerli (eds.) |
Edizione | [1st ed. 2008.] |
Pubbl/distr/stampa | Berlin, Germany ; ; New York, New York : , : Springer, , [2008] |
Descrizione fisica | 1 online resource (XI, 362 p.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computers - Access control
Computer security |
ISBN |
1-283-43791-0
9786613437914 3-540-89173-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Session 1: R&D Agenda -- Towards a European Research Agenda for CIIP: Results from the CI2RCO Project -- ICT Vulnerabilities of the Power Grid: Towards a Road Map for Future Research -- Session 2: Communication Risk and Assurance I -- An Analysis of Cyclical Interdependencies in Critical Infrastructures -- A Framework for 3D Geospatial Buffering of Events of Interest in Critical Infrastructures -- Designing Information System Risk Management Framework Based on the Past Major Failures in the Japanese Financial Industry -- Advanced Reaction Using Risk Assessment in Intrusion Detection Systems -- Session 3: Communication Risk and Assurance II -- Managing Critical Infrastructures through Virtual Network Communities -- The Structure of the Sense of Security, Anshin -- Securing Agents against Malicious Host in an Intrusion Detection System -- Session 4: Code of Practice and Metrics -- UML Diagrams Supporting Domain Specification Inside the CRUTIAL Project -- Expert System CRIPS: Support of Situation Assessment and Decision Making -- Using Dependent CORAS Diagrams to Analyse Mutual Dependency -- A Methodology to Estimate Input-Output Inoperability Model Parameters -- Session 5: Information Sharing and Exchange -- Efficient Access Control for Secure XML Query Processing in Data Streams -- An Approach to Trust Management Challenges for Critical Infrastructures -- Session 6: Continuity of Services and Resiliency -- Detecting DNS Amplification Attacks -- LoRDAS: A Low-Rate DoS Attack against Application Servers -- Intra Autonomous System Overlay Dedicated to Communication Resilience -- A Proposal for the Definition of Operational Plans to Provide Dependability and Security -- Session 7: SCADA and Embedded Security -- Application of Kohonen Maps to Improve Security Tests on Automation Devices -- Ideal Based Cyber Security Technical Metrics for Control Systems -- Designing Critical Infrastructure Cyber Security Segmentation Architecture by Balancing Security with Reliability and Availability -- Session 8: Threats and Attacks Modeling -- A General Model and Guidelines for Attack Manifestation Generation -- A Survey on Detection Techniques to Prevent Cross-Site Scripting Attacks on Current Web Applications -- Attack Modeling of SIP-Oriented SPIT -- A Malware Detector Placement Game for Intrusion Detection -- Session 9: Information Exchange and Modelling -- Modeling and Simulating Information Security Management -- Design of a Platform for Information Exchange on Protection of Critical Infrastructures -- Towards a Standardised Cross-Sector Information Exchange on Present Risk Factors. |
Record Nr. | UNINA-9910483114703321 |
Berlin, Germany ; ; New York, New York : , : Springer, , [2008] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Critical information infrastructures security : second international workshop, CRITIS 2007, Málaga, Spain, October 3-5, 2007 : revised papers / / Javier Lopez, Bernhard M. Hämmerli (eds.) |
Edizione | [1st ed. 2008.] |
Pubbl/distr/stampa | Berlin, Germany ; ; New York, New York : , : Springer, , [2008] |
Descrizione fisica | 1 online resource (XI, 362 p.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computers - Access control
Computer security |
ISBN |
1-283-43791-0
9786613437914 3-540-89173-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Session 1: R&D Agenda -- Towards a European Research Agenda for CIIP: Results from the CI2RCO Project -- ICT Vulnerabilities of the Power Grid: Towards a Road Map for Future Research -- Session 2: Communication Risk and Assurance I -- An Analysis of Cyclical Interdependencies in Critical Infrastructures -- A Framework for 3D Geospatial Buffering of Events of Interest in Critical Infrastructures -- Designing Information System Risk Management Framework Based on the Past Major Failures in the Japanese Financial Industry -- Advanced Reaction Using Risk Assessment in Intrusion Detection Systems -- Session 3: Communication Risk and Assurance II -- Managing Critical Infrastructures through Virtual Network Communities -- The Structure of the Sense of Security, Anshin -- Securing Agents against Malicious Host in an Intrusion Detection System -- Session 4: Code of Practice and Metrics -- UML Diagrams Supporting Domain Specification Inside the CRUTIAL Project -- Expert System CRIPS: Support of Situation Assessment and Decision Making -- Using Dependent CORAS Diagrams to Analyse Mutual Dependency -- A Methodology to Estimate Input-Output Inoperability Model Parameters -- Session 5: Information Sharing and Exchange -- Efficient Access Control for Secure XML Query Processing in Data Streams -- An Approach to Trust Management Challenges for Critical Infrastructures -- Session 6: Continuity of Services and Resiliency -- Detecting DNS Amplification Attacks -- LoRDAS: A Low-Rate DoS Attack against Application Servers -- Intra Autonomous System Overlay Dedicated to Communication Resilience -- A Proposal for the Definition of Operational Plans to Provide Dependability and Security -- Session 7: SCADA and Embedded Security -- Application of Kohonen Maps to Improve Security Tests on Automation Devices -- Ideal Based Cyber Security Technical Metrics for Control Systems -- Designing Critical Infrastructure Cyber Security Segmentation Architecture by Balancing Security with Reliability and Availability -- Session 8: Threats and Attacks Modeling -- A General Model and Guidelines for Attack Manifestation Generation -- A Survey on Detection Techniques to Prevent Cross-Site Scripting Attacks on Current Web Applications -- Attack Modeling of SIP-Oriented SPIT -- A Malware Detector Placement Game for Intrusion Detection -- Session 9: Information Exchange and Modelling -- Modeling and Simulating Information Security Management -- Design of a Platform for Information Exchange on Protection of Critical Infrastructures -- Towards a Standardised Cross-Sector Information Exchange on Present Risk Factors. |
Record Nr. | UNISA-996465898503316 |
Berlin, Germany ; ; New York, New York : , : Springer, , [2008] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|