000 04007nam a22006255i 4500
001 978-3-642-14379-3
003 DE-He213
005 20240730192342.0
007 cr nn 008mamaa
008 100706s2010 gw | s |||| 0|eng d
020 _a9783642143793
_9978-3-642-14379-3
024 7 _a10.1007/978-3-642-14379-3
_2doi
050 4 _aTK5105.5-5105.9
072 7 _aUKN
_2bicssc
072 7 _aCOM043000
_2bisacsh
072 7 _aUKN
_2thema
082 0 4 _a004.6
_223
245 1 0 _aCritical Information Infrastructures Security
_h[electronic resource] :
_b4th International Workshop, CRITIS 2009, Bonn, Germany, September 30 - October 2, 2009, Revised Papers /
_cedited by Erich Rome, Robin Bloomfield.
250 _a1st ed. 2010.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg :
_bImprint: Springer,
_c2010.
300 _aXII, 213 p. 70 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSecurity and Cryptology,
_x2946-1863 ;
_v6027
505 0 _aOn Modelling of Inter-dependent Network Infrastructures by Extended Leontief Models -- Critical Infrastructure Protection in Brazil - Threat Identification and Analysis -- Development of Information Security-Focused Incident Prevention Measures for Critical Information Infrastructure in Japan -- Design of a Mobile Agent-Based Adaptive Communication Middleware for Federations of Critical Infrastructure Simulations -- An Alternate Topology Generator for Joint Study of Power Grids and Communication Networks -- Trouble Brewing: Using Observations of Invariant Behavior to Detect Malicious Agency in Distributed Control Systems -- Optimisation of Critical Infrastructure Protection: The SiVe Project on Airport Security -- Cyber-Critical Infrastructure Protection Using Real-Time Payload-Based Anomaly Detection -- Decision Aid Tool and Ontology-Based Reasoning for Critical Infrastructure Vulnerabilities and Threats Analysis -- Application Filters for TCP/IP Industrial Automation Protocols -- Web Browser Security Update Effectiveness -- State-Based Network Intrusion Detection Systems for SCADA Protocols: A Proof of Concept -- Towards Early Warning Systems - Challenges, Technologies and Architecture -- CII Protection - Lessons for Developing Countries: South Africa as a Case Study -- Energy Theft in the Advanced Metering Infrastructure -- Current Capabilities, Requirements and a Proposed Strategy for Interdependency Analysis in the UK -- Stochastic Modelling of the Effects of Interdependencies between Critical Infrastructure.
650 0 _aComputer networks .
_931572
650 0 _aComputers.
_98172
650 0 _aComputer science.
_99832
650 0 _aElectronic data processing
_xManagement.
_9149644
650 0 _aCryptography.
_91973
650 0 _aData encryption (Computer science).
_99168
650 0 _aComputers, Special purpose.
_946653
650 1 4 _aComputer Communication Networks.
_9149645
650 2 4 _aHardware Performance and Reliability.
_932357
650 2 4 _aTheory of Computation.
_9149646
650 2 4 _aIT Operations.
_931703
650 2 4 _aCryptology.
_931769
650 2 4 _aSpecial Purpose and Application-Based Systems.
_946654
700 1 _aRome, Erich.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9149647
700 1 _aBloomfield, Robin.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9149648
710 2 _aSpringerLink (Online service)
_9149649
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783642143786
776 0 8 _iPrinted edition:
_z9783642143809
830 0 _aSecurity and Cryptology,
_x2946-1863 ;
_v6027
_9149650
856 4 0 _uhttps://doi.org/10.1007/978-3-642-14379-3
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cELN
999 _c94210
_d94210