Critical Information Infrastructure Security [[electronic resource] ] : 5th International Workshop, CRITIS 2010, Athens, Greece, September 2010, Revised Papers / / edited by Christos Xenakis, Stephen Wolthusen
| Critical Information Infrastructure Security [[electronic resource] ] : 5th International Workshop, CRITIS 2010, Athens, Greece, September 2010, Revised Papers / / edited by Christos Xenakis, Stephen Wolthusen |
| Edizione | [1st ed. 2011.] |
| Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011 |
| Descrizione fisica | 1 online resource (X, 161 p. 54 illus., 33 illus. in color.) |
| Disciplina | 005.8 |
| Collana | Security and Cryptology |
| Soggetto topico |
Management information systems
Computer science Data encryption (Computer science) Computer software—Reusability Computer communication systems Special purpose computers Computer system failures Management of Computing and Information Systems Cryptology Performance and Reliability Computer Communication Networks Special Purpose and Application-Based Systems System Performance and Evaluation |
| ISBN | 3-642-21694-3 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Intro -- Title page -- Preface -- Organization -- Table of Contents -- Inter-dependency Assessment in the ICT-PS Network: The MIA Project Results -- Introduction -- The MIA Framework -- Inter-dependency Models -- Topological Model -- Analytical Model -- Simulation Model -- Interdependency Metrics -- Topological Robustness -- Module and Phase of Frequency Response and the Poles Placement -- Ratio of Inter-dependency -- Temporal Scale of Inter-dependency -- Scale of Criticality -- Metrics Evaluation -- Main Project Findings -- Conclusions and Outlook -- References -- A Quantitative Risk Analysis Approach for Deliberate Threats -- Introduction -- Motivation -- Proposed Approach -- Conceptual Foundation -- The Modeling Tools -- Mathematical Foundation -- Risk Analysis Approach: Step-by-Step -- A Simple Example -- Conclusions and Future Work -- References -- The EU FP6 Integrated Project IRRIIS on Dependent Critical Infrastructures Summary and Conclusions -- Introduction -- Analysis and Modeling -- The IRRIIS Information Model -- Preliminary Interdependency Analysis (PIA) -- Detailed Technical Federated Simulations -- User Interactions -- Scenarios and Experiments -- Middleware Technology (MIT) -- Use Cases -- Conclusions and Lessons Learnt -- Modeling and Simulation -- User Interaction Capabilities -- Scenarios -- Other Critical Infrastructure Domains -- Middleware Improved Technology -- References -- Towards Understanding Recurring Large Scale Power Outages: An Endogenous View of Inter-organizational Effects -- Introduction -- Problem -- Hypothesis -- Analysis -- Policy and Implementation -- Conclusion -- References -- Early Warning System for Cascading Effect Control in Energy Control Systems -- Introduction -- SCADA System and Control Technologies -- SCADA Network Architecture -- WSN, An Alternative for the Control.
Early Warning Systems on the Critical System Protection -- Preventing and Controlling a Cascading Effect -- Early Warning System Based on Forensic Techniques -- Use Case and Discussion -- Conclusions and Future Work -- References -- Emergency Response with Proactive Crowd-Sourcing Reverse-111 -- Introduction -- Reverse 111 - Proactive Crowd Sourcing -- System Overview -- System Architecture -- Resource Schedulers -- Greedy Scheduler -- Lottery Scheduler -- Round-Robin Scheduler -- Visualization Interface -- Evaluation -- Evaluation of Proactive Crowd-Sourcing -- Related Work -- Conclusions and Future Work -- References -- Anonymity and Privacy in Distributed Early Warning Systems -- Introduction -- Related Work -- International Activities -- Collaborative Centralised Approaches -- Distributed and Collaborative Approaches -- A Distributed Collaborative Privacy-Preserving Approach -- Design Goals -- Component Technologies -- Integration and Use Cases -- Discussion and Future Work -- Reputation Tracking -- Role of a Trusted Third Party -- Data Analysis -- Practical Implementation of the Concept -- Conclusion -- References -- A Formal Adversary Capability Model for SCADA Environments -- Introduction -- π-Calculus Variant -- Model of a SCADA Network -- Agent-Based Adversary Capabilities -- Adversary Communication with SCADA Processes -- Agent Recruitment -- Covert Communication -- Message Interception and Manipulation -- Denial of Service -- Model Utility: Discussion and Example -- Related Work -- Conclusion and Future Work -- References -- A Cloud Provider-Agnostic Secure Storage Protocol -- Introduction -- Related Work -- A Confidentiality and Integrity Ensuring Model -- File Splitting -- Hybrid Encryption -- Chunks Message Authentication Code -- Index File -- Data Management -- Evaluation of Our Model -- Conclusions and Future Work -- References. State-Based Firewall for Industrial Protocols with Critical-State Prediction Monitor -- Introduction -- Related Works -- State Analysis Filtering -- Rules Languages -- Packet Language -- Critical State Language -- Critical State Distance -- Distance Evaluation -- Experimental Tests -- Distance Performance -- Conclusions -- References -- A Formally Verified Mechanism for Countering SPIT -- Introduction -- Methodology -- Policy Description -- Policy Integration in a VoIP Environment -- Experiments -- Formal Verification -- Assumptions and Property Specification -- SIP-aSPM Model Description -- Verification Results -- Related Work -- Conclusions -- References -- Trust and Reputation for Information Exchange in Critical Infrastructures -- Introduction -- Related Work -- Application Scenario -- Trust and Reputation Service -- TRS Agents -- TRS Discovery Tool -- Validation -- Conclusions -- References -- A Modelling Approach for Interdependency in Digital Systems-of-Systems Security - Extended Abstract -- References -- Risk Ontology and Service Quality Descriptor Shared among Interdependent Critical Infrastructures -- Introduction -- Risk Description -- How to Describe Risk? -- Service Quality Descriptor -- Value Assignment to SQD -- Simplified Method of SQD Assessment -- Assumptions -- SQD Parameters Computation -- References -- Author Index. |
| Record Nr. | UNISA-996465911503316 |
| Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Information and Communications Security : 26th International Conference, ICICS 2024, Mytilene, Greece, August 26–28, 2024, Proceedings, Part I / / edited by Sokratis Katsikas, Christos Xenakis, Christos Kalloniatis, Costas Lambrinoudakis
| Information and Communications Security : 26th International Conference, ICICS 2024, Mytilene, Greece, August 26–28, 2024, Proceedings, Part I / / edited by Sokratis Katsikas, Christos Xenakis, Christos Kalloniatis, Costas Lambrinoudakis |
| Autore | Katsikas Sokratis |
| Edizione | [1st ed. 2025.] |
| Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2025 |
| Descrizione fisica | 1 online resource (342 pages) |
| Disciplina |
005.73
003.54 |
| Altri autori (Persone) |
XenakisChristos
KalloniatisChristos LambrinoudakisCostas |
| Collana | Lecture Notes in Computer Science |
| Soggetto topico |
Data structures (Computer science)
Information theory Database management Data mining Application software Image processing - Digital techniques Computer vision Cryptography Data encryption (Computer science) Data Structures and Information Theory Database Management Data Mining and Knowledge Discovery Computer and Information Systems Applications Computer Imaging, Vision, Pattern Recognition and Graphics Cryptology |
| ISBN |
9789819787982
981978798X |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | -- Attacks. -- How to Design Honey Vault Schemes. -- New Result for Breaking NTRU Encryption with Multiple Keys in Polynomial Time. -- Improving Differential-Neural Cryptanalysis for Large-State SPECK. -- Evasion attempt for the malicious PowerShell detector considering feature weights. -- A Fast Framework for Efficiently Constructing Valuable Cubes. -- A Survey on Acoustic Side Channel Attacks on Keyboards. -- Trust. -- Enhancing TrUStAPIS Methodology in the Web of Things with LLM-generated IoT Trust Semantics. -- DMA: Mutual Attestation Framework for Distributed Enclaves. -- Cabin: Confining Untrusted Programs within Confidential VM. -- Anomaly detection. -- UARC:Unsupervised Anomalous Traffic Detection with Improved U-shaped Autoencoder and RetNet based Multi-Clustering. -- An Investigation into the Performance of Non-Contrastive Self-Supervised Learning Methods for Network Intrusion Detection. -- Impact of Recurrent Neural Networks and Deep Learning Frameworks on Adaptive Real-time Lightweight Time Series Anomaly Detection. -- Privacy. -- Secure and Robust Privacy-Preserving Federated Learning For Heterogeneous Resource. -- Privacy-preserving Logistic Regression Model Training Scheme by Homomorphic Encryption. -- Privacy preserving and verifiable outsourcing of AI processing for cyber-physical systems. -- Investigating the Privacy Risk of using Robot Vacuum Cleaners in Smart Environments. |
| Record Nr. | UNISA-996636771803316 |
Katsikas Sokratis
|
||
| Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2025 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Information and Communications Security : 26th International Conference, ICICS 2024, Mytilene, Greece, August 26–28, 2024, Proceedings, Part II / / edited by Sokratis Katsikas, Christos Xenakis, Christos Kalloniatis, Costas Lambrinoudakis
| Information and Communications Security : 26th International Conference, ICICS 2024, Mytilene, Greece, August 26–28, 2024, Proceedings, Part II / / edited by Sokratis Katsikas, Christos Xenakis, Christos Kalloniatis, Costas Lambrinoudakis |
| Autore | Katsikas Sokratis |
| Edizione | [1st ed. 2025.] |
| Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2025 |
| Descrizione fisica | 1 online resource (344 pages) |
| Disciplina |
005.73
003.54 |
| Altri autori (Persone) |
XenakisChristos
KalloniatisChristos LambrinoudakisCostas |
| Collana | Lecture Notes in Computer Science |
| Soggetto topico |
Data structures (Computer science)
Information theory Database management Data mining Application software Image processing - Digital techniques Computer vision Cryptography Data encryption (Computer science) Data Structures and Information Theory Database Management Data Mining and Knowledge Discovery Computer and Information Systems Applications Computer Imaging, Vision, Pattern Recognition and Graphics Cryptology |
| ISBN |
9789819788019
9819788013 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | -- Crypto & Applied crypto. -- TorHunter: A Lightweight Method for Efficient Identification of Obfuscated Tor Traffic through Unsupervised Pre-training. -- Two-round Post-quantum Private Equality Test and OT from RLWE-encryption. -- Point Intervention: Improving ACVP Test Vector Generation Through Human Assisted Fuzzing. -- FAMC: Fair and Publicly Auditable Multi-Party Computation with Cheater Detection. -- Homomorphic encryption. -- X-Cipher: Achieving Data Resiliency in Homomorphic Ciphertexts. -- Amortized Functional Bootstrapping for Homomorphic Evaluation of Encrypted Functions. - Tightly Secure Linearly Homomorphic Signature Schemes for Subspace Under DL Assumption in AGM. -- Key agreement protocols and digital signature schemes. -- CoDPoC IP:A Configurable Data Protection Circuit to Support Multiple Key Agreement Scheme. -- Formal analysis of Julia Key Agreement Protocol. -- New Construction of Code-Based Signature Schemes. -- Identity-Based Signature from Lattices without Trapdoors. -- Defences. -- The Emperor is Now Clothed: A Secure Web Governance Framework for User Authentication Between Password Managers and Web Apps. -- HoneyLLM: A Large Language Model-Powered Medium-interaction Honeypot. -- TSR-jack: An In-Browser Crypto-jacking Detection Method Based on Time Series Representation Learning. -- Don’t Abandon the Primary Key: A High-Synchronization and Robust Virtual Primary Key Scheme for Watermarking Relational Databases. -- FirmPorter: Porting RTOSes at the Binary Level for Firmware Re-hosting. |
| Record Nr. | UNISA-996636771503316 |
Katsikas Sokratis
|
||
| Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2025 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||