000 | 04651nam a22006375i 4500 | ||
---|---|---|---|
001 | 978-3-030-37670-3 | ||
003 | DE-He213 | ||
005 | 20240730173507.0 | ||
007 | cr nn 008mamaa | ||
008 | 191219s2020 sz | s |||| 0|eng d | ||
020 |
_a9783030376703 _9978-3-030-37670-3 |
||
024 | 7 |
_a10.1007/978-3-030-37670-3 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aCritical Information Infrastructures Security _h[electronic resource] : _b14th International Conference, CRITIS 2019, Linköping, Sweden, September 23-25, 2019, Revised Selected Papers / _cedited by Simin Nadjm-Tehrani. |
250 | _a1st ed. 2020. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2020. |
|
300 |
_aXI, 210 p. 14 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v11777 |
|
505 | 0 | _aInvited Papers -- Everything is Awesome! Or is it? Cyber Security Risks in Critical Infrastructure -- Challenges In Quantifying An Adversary's Cyber Access to Critical Infrastructures -- Risk Management -- Exploring how Component Factors and their Uncertainty Affect Judgements of Risk in Cyber-Security -- Estimating Cascading Effects in Cyber-Physical Critical Infrastructures -- Aggregating Centrality Rankings: A Novel Approach to Detect Critical Infrastructure Vulnerabilities -- Vulnerability Assessment -- Cyber-Physical Systems Security Based on A Cross-Linked and Correlated Vulnerability Database -- Climate Change Impact and Vulnerability Analysis in the City of Bratislava: Application and Lessons Learned -- Resilience and Mitigation -- Intrusion Resilience for PV Inverters in a Distribution Grid Use-Case Featuring Dynamic Voltage Control -- Mitigating escalation of cascading effects of a payment disruption across other critical infrastructures: lessonslearned in 15 simulation-games -- Using Datasets from Industrial Control Systems for Cyber Security Research and Education -- Transport and Finance -- Securing Software Updates for Trains -- A comparison between SWIFT and Blockchain from a cyber resiliency perspective -- Short Papers -- On the Importance of Agility, Transparency, and Positive Reinforcement in Cyber Incident Crisis Communication -- SealedGRID: A Secure Interconnection of Technologies for Smart Grid Applications -- A Dynamic Risk Assessment (DRA) Methodology for High Impact Low Probability (HILP) Security Risks -- On Actuator Security Indices -- Testbed Evaluation of DoS Attacks on PID-controllers -- Industry and Practical Experience Reports -- White Paper on Industry Experiences in Critical Information Infrastructure Security: A Special Session at CRITIS 2019. | |
520 | _aThis book constitutes the revised selected papers of the 14th International Conference on Critical Information Infrastructures Security, CRITIS 2019, held in Linköping, Sweden, in September 2019. The 10 full papers and 5 short papers presented were carefully reviewed and selected from 30 submissions. They are grouped in the following topical sections: Invited Papers, Risk Management, Vulnerability Assessment, Resilience and Mitigation Short Papers, and Industry and Practical Experience Reports. | ||
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 0 |
_aComputer engineering. _910164 |
|
650 | 0 |
_aSoftware engineering. _94138 |
|
650 | 0 |
_aComputers. _98172 |
|
650 | 0 |
_aComputer crimes. _910774 |
|
650 | 1 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_aComputer Communication Networks. _9108497 |
650 | 2 | 4 |
_aComputer Engineering and Networks. _9108498 |
650 | 2 | 4 |
_aSoftware Engineering. _94138 |
650 | 2 | 4 |
_aComputing Milieux. _955441 |
650 | 2 | 4 |
_aComputer Crime. _986411 |
700 | 1 |
_aNadjm-Tehrani, Simin. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9108499 |
|
710 | 2 |
_aSpringerLink (Online service) _9108500 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783030376697 |
776 | 0 | 8 |
_iPrinted edition: _z9783030376710 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v11777 _9108501 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-030-37670-3 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c88948 _d88948 |