top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Critical Information Infrastructure Security [[electronic resource] ] : 5th International Workshop, CRITIS 2010, Athens, Greece, September 2010, Revised Papers / / edited by Christos Xenakis, Stephen Wolthusen
Critical Information Infrastructure Security [[electronic resource] ] : 5th International Workshop, CRITIS 2010, Athens, Greece, September 2010, Revised Papers / / edited by Christos Xenakis, Stephen Wolthusen
Edizione [1st ed. 2011.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011
Descrizione fisica 1 online resource (X, 161 p. 54 illus., 33 illus. in color.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Management information systems
Computer science
Data encryption (Computer science)
Computer software—Reusability
Computer communication systems
Special purpose computers
Computer system failures
Management of Computing and Information Systems
Cryptology
Performance and Reliability
Computer Communication Networks
Special Purpose and Application-Based Systems
System Performance and Evaluation
ISBN 3-642-21694-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Title page -- Preface -- Organization -- Table of Contents -- Inter-dependency Assessment in the ICT-PS Network: The MIA Project Results -- Introduction -- The MIA Framework -- Inter-dependency Models -- Topological Model -- Analytical Model -- Simulation Model -- Interdependency Metrics -- Topological Robustness -- Module and Phase of Frequency Response and the Poles Placement -- Ratio of Inter-dependency -- Temporal Scale of Inter-dependency -- Scale of Criticality -- Metrics Evaluation -- Main Project Findings -- Conclusions and Outlook -- References -- A Quantitative Risk Analysis Approach for Deliberate Threats -- Introduction -- Motivation -- Proposed Approach -- Conceptual Foundation -- The Modeling Tools -- Mathematical Foundation -- Risk Analysis Approach: Step-by-Step -- A Simple Example -- Conclusions and Future Work -- References -- The EU FP6 Integrated Project IRRIIS on Dependent Critical Infrastructures Summary and Conclusions -- Introduction -- Analysis and Modeling -- The IRRIIS Information Model -- Preliminary Interdependency Analysis (PIA) -- Detailed Technical Federated Simulations -- User Interactions -- Scenarios and Experiments -- Middleware Technology (MIT) -- Use Cases -- Conclusions and Lessons Learnt -- Modeling and Simulation -- User Interaction Capabilities -- Scenarios -- Other Critical Infrastructure Domains -- Middleware Improved Technology -- References -- Towards Understanding Recurring Large Scale Power Outages: An Endogenous View of Inter-organizational Effects -- Introduction -- Problem -- Hypothesis -- Analysis -- Policy and Implementation -- Conclusion -- References -- Early Warning System for Cascading Effect Control in Energy Control Systems -- Introduction -- SCADA System and Control Technologies -- SCADA Network Architecture -- WSN, An Alternative for the Control.
Early Warning Systems on the Critical System Protection -- Preventing and Controlling a Cascading Effect -- Early Warning System Based on Forensic Techniques -- Use Case and Discussion -- Conclusions and Future Work -- References -- Emergency Response with Proactive Crowd-Sourcing Reverse-111 -- Introduction -- Reverse 111 - Proactive Crowd Sourcing -- System Overview -- System Architecture -- Resource Schedulers -- Greedy Scheduler -- Lottery Scheduler -- Round-Robin Scheduler -- Visualization Interface -- Evaluation -- Evaluation of Proactive Crowd-Sourcing -- Related Work -- Conclusions and Future Work -- References -- Anonymity and Privacy in Distributed Early Warning Systems -- Introduction -- Related Work -- International Activities -- Collaborative Centralised Approaches -- Distributed and Collaborative Approaches -- A Distributed Collaborative Privacy-Preserving Approach -- Design Goals -- Component Technologies -- Integration and Use Cases -- Discussion and Future Work -- Reputation Tracking -- Role of a Trusted Third Party -- Data Analysis -- Practical Implementation of the Concept -- Conclusion -- References -- A Formal Adversary Capability Model for SCADA Environments -- Introduction -- π-Calculus Variant -- Model of a SCADA Network -- Agent-Based Adversary Capabilities -- Adversary Communication with SCADA Processes -- Agent Recruitment -- Covert Communication -- Message Interception and Manipulation -- Denial of Service -- Model Utility: Discussion and Example -- Related Work -- Conclusion and Future Work -- References -- A Cloud Provider-Agnostic Secure Storage Protocol -- Introduction -- Related Work -- A Confidentiality and Integrity Ensuring Model -- File Splitting -- Hybrid Encryption -- Chunks Message Authentication Code -- Index File -- Data Management -- Evaluation of Our Model -- Conclusions and Future Work -- References.
State-Based Firewall for Industrial Protocols with Critical-State Prediction Monitor -- Introduction -- Related Works -- State Analysis Filtering -- Rules Languages -- Packet Language -- Critical State Language -- Critical State Distance -- Distance Evaluation -- Experimental Tests -- Distance Performance -- Conclusions -- References -- A Formally Verified Mechanism for Countering SPIT -- Introduction -- Methodology -- Policy Description -- Policy Integration in a VoIP Environment -- Experiments -- Formal Verification -- Assumptions and Property Specification -- SIP-aSPM Model Description -- Verification Results -- Related Work -- Conclusions -- References -- Trust and Reputation for Information Exchange in Critical Infrastructures -- Introduction -- Related Work -- Application Scenario -- Trust and Reputation Service -- TRS Agents -- TRS Discovery Tool -- Validation -- Conclusions -- References -- A Modelling Approach for Interdependency in Digital Systems-of-Systems Security - Extended Abstract -- References -- Risk Ontology and Service Quality Descriptor Shared among Interdependent Critical Infrastructures -- Introduction -- Risk Description -- How to Describe Risk? -- Service Quality Descriptor -- Value Assignment to SQD -- Simplified Method of SQD Assessment -- Assumptions -- SQD Parameters Computation -- References -- Author Index.
Record Nr. UNISA-996465911503316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information and Communications Security : 26th International Conference, ICICS 2024, Mytilene, Greece, August 26–28, 2024, Proceedings, Part I / / edited by Sokratis Katsikas, Christos Xenakis, Christos Kalloniatis, Costas Lambrinoudakis
Information and Communications Security : 26th International Conference, ICICS 2024, Mytilene, Greece, August 26–28, 2024, Proceedings, Part I / / edited by Sokratis Katsikas, Christos Xenakis, Christos Kalloniatis, Costas Lambrinoudakis
Autore Katsikas Sokratis
Edizione [1st ed. 2025.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2025
Descrizione fisica 1 online resource (342 pages)
Disciplina 005.73
003.54
Altri autori (Persone) XenakisChristos
KalloniatisChristos
LambrinoudakisCostas
Collana Lecture Notes in Computer Science
Soggetto topico Data structures (Computer science)
Information theory
Database management
Data mining
Application software
Image processing - Digital techniques
Computer vision
Cryptography
Data encryption (Computer science)
Data Structures and Information Theory
Database Management
Data Mining and Knowledge Discovery
Computer and Information Systems Applications
Computer Imaging, Vision, Pattern Recognition and Graphics
Cryptology
ISBN 9789819787982
981978798X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto -- Attacks. -- How to Design Honey Vault Schemes. -- New Result for Breaking NTRU Encryption with Multiple Keys in Polynomial Time. -- Improving Differential-Neural Cryptanalysis for Large-State SPECK. -- Evasion attempt for the malicious PowerShell detector considering feature weights. -- A Fast Framework for Efficiently Constructing Valuable Cubes. -- A Survey on Acoustic Side Channel Attacks on Keyboards. -- Trust. -- Enhancing TrUStAPIS Methodology in the Web of Things with LLM-generated IoT Trust Semantics. -- DMA: Mutual Attestation Framework for Distributed Enclaves. -- Cabin: Confining Untrusted Programs within Confidential VM. -- Anomaly detection. -- UARC:Unsupervised Anomalous Traffic Detection with Improved U-shaped Autoencoder and RetNet based Multi-Clustering. -- An Investigation into the Performance of Non-Contrastive Self-Supervised Learning Methods for Network Intrusion Detection. -- Impact of Recurrent Neural Networks and Deep Learning Frameworks on Adaptive Real-time Lightweight Time Series Anomaly Detection. -- Privacy. -- Secure and Robust Privacy-Preserving Federated Learning For Heterogeneous Resource. -- Privacy-preserving Logistic Regression Model Training Scheme by Homomorphic Encryption. -- Privacy preserving and verifiable outsourcing of AI processing for cyber-physical systems. -- Investigating the Privacy Risk of using Robot Vacuum Cleaners in Smart Environments.
Record Nr. UNISA-996636771803316
Katsikas Sokratis  
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2025
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information and Communications Security : 26th International Conference, ICICS 2024, Mytilene, Greece, August 26–28, 2024, Proceedings, Part II / / edited by Sokratis Katsikas, Christos Xenakis, Christos Kalloniatis, Costas Lambrinoudakis
Information and Communications Security : 26th International Conference, ICICS 2024, Mytilene, Greece, August 26–28, 2024, Proceedings, Part II / / edited by Sokratis Katsikas, Christos Xenakis, Christos Kalloniatis, Costas Lambrinoudakis
Autore Katsikas Sokratis
Edizione [1st ed. 2025.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2025
Descrizione fisica 1 online resource (344 pages)
Disciplina 005.73
003.54
Altri autori (Persone) XenakisChristos
KalloniatisChristos
LambrinoudakisCostas
Collana Lecture Notes in Computer Science
Soggetto topico Data structures (Computer science)
Information theory
Database management
Data mining
Application software
Image processing - Digital techniques
Computer vision
Cryptography
Data encryption (Computer science)
Data Structures and Information Theory
Database Management
Data Mining and Knowledge Discovery
Computer and Information Systems Applications
Computer Imaging, Vision, Pattern Recognition and Graphics
Cryptology
ISBN 9789819788019
9819788013
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto -- Crypto & Applied crypto. -- TorHunter: A Lightweight Method for Efficient Identification of Obfuscated Tor Traffic through Unsupervised Pre-training. -- Two-round Post-quantum Private Equality Test and OT from RLWE-encryption. -- Point Intervention: Improving ACVP Test Vector Generation Through Human Assisted Fuzzing. -- FAMC: Fair and Publicly Auditable Multi-Party Computation with Cheater Detection. -- Homomorphic encryption. -- X-Cipher: Achieving Data Resiliency in Homomorphic Ciphertexts. -- Amortized Functional Bootstrapping for Homomorphic Evaluation of Encrypted Functions. - Tightly Secure Linearly Homomorphic Signature Schemes for Subspace Under DL Assumption in AGM. -- Key agreement protocols and digital signature schemes. -- CoDPoC IP:A Configurable Data Protection Circuit to Support Multiple Key Agreement Scheme. -- Formal analysis of Julia Key Agreement Protocol. -- New Construction of Code-Based Signature Schemes. -- Identity-Based Signature from Lattices without Trapdoors. -- Defences. -- The Emperor is Now Clothed: A Secure Web Governance Framework for User Authentication Between Password Managers and Web Apps. -- HoneyLLM: A Large Language Model-Powered Medium-interaction Honeypot. -- TSR-jack: An In-Browser Crypto-jacking Detection Method Based on Time Series Representation Learning. -- Don’t Abandon the Primary Key: A High-Synchronization and Robust Virtual Primary Key Scheme for Watermarking Relational Databases. -- FirmPorter: Porting RTOSes at the Binary Level for Firmware Re-hosting.
Record Nr. UNISA-996636771503316
Katsikas Sokratis  
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2025
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui