Security of Industrial Control Systems and Cyber-Physical Systems [electronic resource] : Second International Workshop, CyberICPS 2016, Heraklion, Crete, Greece, September 26-30, 2016, Revised Selected Papers / edited by Nora Cuppens-Boulahia, Costas Lambrinoudakis, Frédéric Cuppens, Sokratis Katsikas.
Contributor(s): Cuppens-Boulahia, Nora [editor.] | Lambrinoudakis, Costas [editor.] | Cuppens, Frédéric [editor.] | Katsikas, Sokratis [editor.] | SpringerLink (Online service).
Material type: BookSeries: Security and Cryptology: 10166Publisher: Cham : Springer International Publishing : Imprint: Springer, 2017Edition: 1st ed. 2017.Description: VII, 121 p. 19 illus. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783319614373.Subject(s): Computer science | Data protection | Cryptography | Data encryption (Computer science) | Computer engineering | Computer networks | Application software | Electronic data processing -- Management | Computer Science Logic and Foundations of Programming | Data and Information Security | Cryptology | Computer Engineering and Networks | Computer and Information Systems Applications | IT OperationsAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 004.0151 Online resources: Click here to access onlineManagement of cyber security in industrial control systems and cyber-physical systems -- Security monitoring -- Trust management -- Security policies and measures.
This book constitutes the refereed proceedings of the Second Conference on Security of Industrial Control Systems and Cyber-Physical Systems, CyberICPS 2016, held in Crete, Greece, in September 2016 in conjunction with ESORICS 2016, the 21st annual European Symposium on Research in Computer Security. The 5 revised full papers 2 invited papers presented were carefully reviewed and selected from 18 initial submissions. CyberICPS 2016 focuses on topics related to the management of cyber security in industrial control systems and cyber-physical systems, including security monitoring, trust management, security policies and measures.
There are no comments for this item.