Critical Infrastructure Protection VIII 8th IFIP WG 11.10 International Conference, ICCIP 2014, Arlington, VA, USA, March 17-19, 2014, Revised Selected Papers /

The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital to day-to-day operations in every sector: information and telecommunications, banking and finance, energy, chemicals and hazardous materials, agriculture, food, water, public health, eme...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Butts, Jonathan (Επιμελητής έκδοσης), Shenoi, Sujeet (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2014.
Σειρά:IFIP Advances in Information and Communication Technology, 441
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Detecting Integrity Attacks on Industrial Control Systems
  • Detecting Malicious Software Execution in Programmable Logic Controllers Using Power Fingerprinting
  • Timing of Cyber-Physical Attacks on Process Control Systems
  • Recovery of Structural Controllability for Control Systems
  • Industrial Control System Traffic Data Sets for Intrusion Detection Research
  • An Industrial Control System Testbed Based on Emulation, Physical Devices and Simulation
  • Evidence Theory for Cyber-Physical Systems
  • An Automated Dialog System for Conducting Security Interviews for Access Control
  • A Survey of Critical Infrastructure Security
  • A System Dynamics Framework for Modeling Critical Infrastructure Resilience
  • Reinforcement Learning Using Monte Carlo Policy Estimation for Disaster Mitigation
  • Accuracy of Service Area Estimation Methods Used for Critical Infrastructure Recovery
  • A Decision Support Tool for a Unified Homeland Security Strategy
  • Assessing the Impact of Cyber Attacks on Wireless Sensor Nodes That Monitor Interdependent Physical Systems
  • Assessing Potential Casualties in Critical Events
  • Evaluation of Format-Preserving Encryption Algorithms for Critical Infrastructure Protection
  • Asynchronous Binary Byzantine Consensus over Graphs with Power-Law Degree Sequence.