000 04119nam a22005775i 4500
001 978-3-642-41476-3
003 DE-He213
005 20200420221258.0
007 cr nn 008mamaa
008 130923s2013 gw | s |||| 0|eng d
020 _a9783642414763
_9978-3-642-41476-3
024 7 _a10.1007/978-3-642-41476-3
_2doi
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aUTN
_2bicssc
072 7 _aCOM053000
_2bisacsh
082 0 4 _a005.8
_223
245 1 0 _aCritical Information Infrastructure Security
_h[electronic resource] :
_b6th International Workshop, CRITIS 2011, Lucerne, Switzerland, September 8-9, 2011, Revised Selected Papers /
_cedited by Sandro Bologna, Bernhard H�ammerli, Dimitris Gritzalis, Stephen Wolthusen.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg :
_bImprint: Springer,
_c2013.
300 _aXII, 227 p. 56 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v6983
505 0 _aTen National Cyber Security Strategies: A Comparison -- Analysis of Dependencies in Critical Infrastructures -- Assurance and Trust Indicators to Evaluate Accuracy of On-line Risk in Critical Infrastructures -- An Innovative Approach to Emergency Management in Large Infrastructures -- Dynamic Evacuation Guidance as Safety Critical Application in Building Automation -- Defeating Node Based Attacks on SCADA Systems Using Probabilistic Packet Observation -- Sub-optimal Topological Protection Strategy from Advanced Malware -- The Insider Threat in Cloud Computing -- Interdependencies between Critical Infrastructures: Analyzing the Risk of Cascading Effects -- How to Perform Verification and Validation of Critical Infrastructure Modeling Tools -- Petri Net Modelling of Physical Vulnerability -- Investigating the Effect of Network Parameters on Coordinated Cyber Attacks Against a Simulated Power Plant -- The Role of the DNS in the Secure and Resilient Operation of CIs, the Energy System Example -- The Development of Warning, Advice and Reporting Points (WARPs) in UK National Infrastructure -- The Contribution of NEISAS to EP3R -- Policies to Improve Resilience against Major Industrial Accidents -- Fuzzy Input-Output Inoperability Model -- Dependencies Discovery and Analysis in Distributed Systems -- Protecting Critical Infrastructures from Stealth Attacks: A Closed-Loop Approach Involving Detection and Remediation -- Risk Assessment in Critical Infrastructure Security Modelling Based on Dependency Analysis -- Countermeasures Selection via Evidence Theory -- The Robustness of Assortativity.
520 _aThis book constitutes revised selected papers from the 6th International Workshop on Critical Information Infrastructure Security, CRITIS 2011, held in Lucerne, Switzerland, in September 2011. The 16 full papers and 6 short papers presented in this volume were carefully reviewed and selected from 38 submissions. They deal with all areas of critical infrastructure protection research.
650 0 _aComputer science.
650 0 _aComputer communication systems.
650 0 _aComputer security.
650 0 _aData encryption (Computer science).
650 0 _aComputers and civilization.
650 1 4 _aComputer Science.
650 2 4 _aSystems and Data Security.
650 2 4 _aComputer Communication Networks.
650 2 4 _aComputers and Society.
650 2 4 _aData Encryption.
700 1 _aBologna, Sandro.
_eeditor.
700 1 _aH�ammerli, Bernhard.
_eeditor.
700 1 _aGritzalis, Dimitris.
_eeditor.
700 1 _aWolthusen, Stephen.
_eeditor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9783642414756
830 0 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v6983
856 4 0 _uhttp://dx.doi.org/10.1007/978-3-642-41476-3
912 _aZDB-2-SCS
912 _aZDB-2-LNC
942 _cEBK
999 _c53048
_d53048