000 05646nam a22006495i 4500
001 978-3-642-03552-4
003 DE-He213
005 20240730201941.0
007 cr nn 008mamaa
008 100301s2009 gw | s |||| 0|eng d
020 _a9783642035524
_9978-3-642-03552-4
024 7 _a10.1007/978-3-642-03552-4
_2doi
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aUTN
_2bicssc
072 7 _aCOM053000
_2bisacsh
072 7 _aUR
_2thema
072 7 _aUTN
_2thema
082 0 4 _a005.8
_223
245 1 0 _aCritical Information Infrastructure Security
_h[electronic resource] :
_bThird International Workshop, CRITIS 2008, Rome, Italy, October 13-15, 2008 /
_cedited by Roberto Setola, Stefan Geretshuber.
250 _a1st ed. 2009.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg :
_bImprint: Springer,
_c2009.
300 _aXIV, 396 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSecurity and Cryptology,
_x2946-1863 ;
_v5508
505 0 _aBlackouts in Power Transmission Networks Due to Spatially Localized Load Anomalies -- Stability of a Distributed Generation Network Using the Kuramoto Models -- Enabling System of Systems Analysis of Critical Infrastructure Behaviors -- Information Modelling and Simulation in Large Interdependent Critical Infrastructures in IRRIIS -- Multi-level Dependability Modeling of Interdependencies between the Electricity and Information Infrastructures -- Interdependency Analysis in Electric Power Systems -- Modeling and Simulation of Complex Interdependent Systems: A Federated Agent-Based Approach -- Self-healing and Resilient Critical Infrastructures -- Critical Infrastructures Security Modeling, Enforcement and Runtime Checking -- INcreasing Security and Protection through Infrastructure REsilience: The INSPIRE Project -- Increase of Power System Survivability with the Decision Support Tool CRIPS Based on Network Planning and Simulation Program PSS®SINCAL -- Information Modelling and Simulation in Large Dependent Critical Infrastructures - An Overview on the European Integrated Project IRRIIS -- Assessment of Structural Vulnerability for Power Grids by Network Performance Based on Complex Networks -- Using Centrality Measures to Rank the Importance of the Components of a Complex Network Infrastructure -- RadialNet: An Interactive Network Topology Visualization Tool with Visual Auditing Support -- Quantitative Security Risk Assessment and Management for Railway Transportation Infrastructures -- Assessing and Improving SCADA Security in the Dutch Drinking Water Sector -- Analysis of Malicious Traffic in Modbus/TCP Communications -- Scada Malware, a Proof of Concept -- Testbeds for Assessing Critical Scenarios in Power Control Systems -- A Structured Approach to Incident Response Management inthe Oil and Gas Industry -- Security Strategy Analysis for Critical Information Infrastructures -- Emerging Information Infrastructures: Cooperation in Disasters -- Service Modeling Language Applied to Critical Infrastructure -- Graded Security Expert System -- Protection of Mobile Agents Execution Using a Modified Self-Validating Branch-Based Software Watermarking with External Sentinel -- Adaptation of Modelling Paradigms to the CIs Interdependencies Problem -- Empirical Findings on Critical Infrastructure Dependencies in Europe -- Dependent Automata for the Modelling of Dependencies -- Application of IPK (Information, Preferences, Knowledge) Paradigm for the Modelling of Precautionary Principle Based Decision-Making -- Disaster Propagation in Heterogeneous Media via Markovian Agents -- A Study on Multiformalism Modeling of Critical Infrastructures -- Simulation of Critical ICT Infrastructure for Municipal Crisis Management -- An Ontology-Based Approach to Blind Spot Revelation in Critical Infrastructure Protection Planning -- Security of Water Infrastructure Systems -- Critical Infrastructures as Complex Systems: A Multi-level Protection Architecture -- Challenges Concerning the Energy-Dependency of the Telecom Infrastructure -- An Effective Approach for Cascading Effects Prevision in Critical Infrastructures.
650 0 _aData protection.
_97245
650 0 _aComputer networks .
_931572
650 0 _aSecurity systems.
_931879
650 0 _aEngineering mathematics.
_93254
650 0 _aEngineering
_xData processing.
_99340
650 0 _aElectronic data processing
_xManagement.
_9169432
650 0 _aAlgorithms.
_93390
650 1 4 _aData and Information Security.
_931990
650 2 4 _aComputer Communication Networks.
_9169433
650 2 4 _aSecurity Science and Technology.
_931884
650 2 4 _aMathematical and Computational Engineering Applications.
_931559
650 2 4 _aIT Operations.
_931703
650 2 4 _aAlgorithms.
_93390
700 1 _aSetola, Roberto.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9169434
700 1 _aGeretshuber, Stefan.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9169435
710 2 _aSpringerLink (Online service)
_9169436
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783642035517
776 0 8 _iPrinted edition:
_z9783642035531
830 0 _aSecurity and Cryptology,
_x2946-1863 ;
_v5508
_9169437
856 4 0 _uhttps://doi.org/10.1007/978-3-642-03552-4
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cELN
999 _c96795
_d96795