Critical Information Infrastructure Security 6th International Workshop, CRITIS 2011, Lucerne, Switzerland, September 8-9, 2011, Revised Selected Papers /
This book constitutes revised selected papers from the 6th International Workshop on Critical Information Infrastructure Security, CRITIS 2011, held in Lucerne, Switzerland, in September 2011. The 16 full papers and 6 short papers presented in this volume were carefully reviewed and selected from 38...
Published in: | Springer eBooks |
---|---|
Corporate Author: | |
Other Authors: | , , , |
Format: | eBook |
Language: | English |
Published: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2013.
|
Series: | Lecture Notes in Computer Science,
|
Subjects: | |
Online Access: | http://dx.doi.org/10.1007/978-3-642-41476-3 Перейти в каталог НБ ТГУ |
LEADER | 04367nam a22005775i 4500 | ||
---|---|---|---|
001 | vtls000485418 | ||
003 | RU-ToGU | ||
005 | 20210922065834.0 | ||
007 | cr nn 008mamaa | ||
008 | 140715s2013 gw | s |||| 0|eng d | ||
020 | |a 9783642414763 |9 978-3-642-41476-3 | ||
024 | 7 | |a 10.1007/978-3-642-41476-3 |2 doi | |
035 | |a to000485418 | ||
039 | 9 | |y 201407151956 |z Александр Эльверович Гилязов | |
040 | |a Springer |c Springer |d RU-ToGU | ||
050 | 4 | |a QA76.9.A25 | |
072 | 7 | |a UR |2 bicssc | |
072 | 7 | |a UTN |2 bicssc | |
072 | 7 | |a COM053000 |2 bisacsh | |
082 | 0 | 4 | |a 005.8 |2 23 |
100 | 1 | |a Bologna, Sandro. |e editor. |9 414828 | |
245 | 1 | 0 | |a Critical Information Infrastructure Security |h [electronic resource] : |b 6th International Workshop, CRITIS 2011, Lucerne, Switzerland, September 8-9, 2011, Revised Selected Papers / |c edited by Sandro Bologna, Bernhard Hämmerli, Dimitris Gritzalis, Stephen Wolthusen. |
260 | |a Berlin, Heidelberg : |b Springer Berlin Heidelberg : |b Imprint: Springer, |c 2013. |9 742158 | ||
300 | |a XII, 227 p. 56 illus. |b online resource. | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a Lecture Notes in Computer Science, |x 0302-9743 ; |v 6983 | |
505 | 0 | |a Ten National Cyber Security Strategies: A Comparison -- Analysis of Dependencies in Critical Infrastructures -- Assurance and Trust Indicators to Evaluate Accuracy of On-line Risk in Critical Infrastructures -- An Innovative Approach to Emergency Management in Large Infrastructures -- Dynamic Evacuation Guidance as Safety Critical Application in Building Automation -- Defeating Node Based Attacks on SCADA Systems Using Probabilistic Packet Observation -- Sub-optimal Topological Protection Strategy from Advanced Malware -- The Insider Threat in Cloud Computing -- Interdependencies between Critical Infrastructures: Analyzing the Risk of Cascading Effects -- How to Perform Verification and Validation of Critical Infrastructure Modeling Tools -- Petri Net Modelling of Physical Vulnerability -- Investigating the Effect of Network Parameters on Coordinated Cyber Attacks Against a Simulated Power Plant -- The Role of the DNS in the Secure and Resilient Operation of CIs, the Energy System Example -- The Development of Warning, Advice and Reporting Points (WARPs) in UK National Infrastructure -- The Contribution of NEISAS to EP3R -- Policies to Improve Resilience against Major Industrial Accidents -- Fuzzy Input-Output Inoperability Model -- Dependencies Discovery and Analysis in Distributed Systems -- Protecting Critical Infrastructures from Stealth Attacks: A Closed-Loop Approach Involving Detection and Remediation -- Risk Assessment in Critical Infrastructure Security Modelling Based on Dependency Analysis -- Countermeasures Selection via Evidence Theory -- The Robustness of Assortativity. | |
520 | |a This book constitutes revised selected papers from the 6th International Workshop on Critical Information Infrastructure Security, CRITIS 2011, held in Lucerne, Switzerland, in September 2011. The 16 full papers and 6 short papers presented in this volume were carefully reviewed and selected from 38 submissions. They deal with all areas of critical infrastructure protection research. | ||
650 | 0 | |a Computer Science. |9 155490 | |
650 | 0 | |a Computer Communication Networks. |9 566243 | |
650 | 0 | |a Data protection. |9 303937 | |
650 | 0 | |a Data encryption (Computer science). |9 566260 | |
650 | 1 | 4 | |a Computer Science. |9 155490 |
650 | 2 | 4 | |a Systems and Data Security. |9 303939 |
650 | 2 | 4 | |a Computer Communication Networks. |9 566243 |
650 | 2 | 4 | |a Computers and Society. |9 303251 |
650 | 2 | 4 | |a Data Encryption. |9 566261 |
700 | 1 | |a Hämmerli, Bernhard. |e editor. |9 414830 | |
700 | 1 | |a Gritzalis, Dimitris. |e editor. |9 414831 | |
700 | 1 | |a Wolthusen, Stephen. |e editor. |9 414832 | |
710 | 2 | |a SpringerLink (Online service) |9 143950 | |
773 | 0 | |t Springer eBooks | |
830 | 0 | |a Lecture Notes in Computer Science, |9 279505 | |
856 | 4 | 0 | |u http://dx.doi.org/10.1007/978-3-642-41476-3 |
856 | |y Перейти в каталог НБ ТГУ |u https://koha.lib.tsu.ru/cgi-bin/koha/opac-detail.pl?biblionumber=356939 | ||
912 | |a ZDB-2-SCS | ||
912 | |a ZDB-2-LNC | ||
950 | |a Computer Science (Springer-11645) | ||
999 | |c 356939 |d 356939 |