|
|
|||
|
||||
OverviewFull Product DetailsAuthor: Sandro Bologna , Bernhard Hämmerli , Dimitris Gritzalis , Stephen WolthusenPublisher: Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Imprint: Springer-Verlag Berlin and Heidelberg GmbH & Co. K Edition: 2013 ed. Volume: 6983 Dimensions: Width: 15.50cm , Height: 1.30cm , Length: 23.50cm Weight: 0.454kg ISBN: 9783642414756ISBN 10: 3642414753 Pages: 227 Publication Date: 01 October 2013 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: Manufactured on demand We will order this item for you from a manufactured on demand supplier. Table of ContentsTen National Cyber Security Strategies: A Comparison.- Analysis of Dependencies in Critical Infrastructures.- Assurance and Trust Indicators to Evaluate Accuracy of On-line Risk in Critical Infrastructures.- An Innovative Approach to Emergency Management in Large Infrastructures.- Dynamic Evacuation Guidance as Safety Critical Application in Building Automation.- Defeating Node Based Attacks on SCADA Systems Using Probabilistic Packet Observation.- Sub-optimal Topological Protection Strategy from Advanced Malware.- The Insider Threat in Cloud Computing.- Interdependencies between Critical Infrastructures: Analyzing the Risk of Cascading Effects.- How to Perform Verification and Validation of Critical Infrastructure Modeling Tools.- Petri Net Modelling of Physical Vulnerability.- Investigating the Effect of Network Parameters on Coordinated Cyber Attacks Against a Simulated Power Plant.- The Role of the DNS in the Secure and Resilient Operation of CIs, the Energy System Example.- The Development of Warning, Advice and Reporting Points (WARPs) in UK National Infrastructure.- The Contribution of NEISAS to EP3R.- Policies to Improve Resilience against Major Industrial Accidents.- Fuzzy Input-Output Inoperability Model.- Dependencies Discovery and Analysis in Distributed Systems.- Protecting Critical Infrastructures from Stealth Attacks: A Closed-Loop Approach Involving Detection and Remediation.- Risk Assessment in Critical Infrastructure Security Modelling Based on Dependency Analysis.- Countermeasures Selection via Evidence Theory.- The Robustness of Assortativity.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |