Critical Information Infrastructure Security: 6th International Workshop, CRITIS 2011, Lucerne, Switzerland, September 8-9, 2011, Revised Selected Papers

Author:   Sandro Bologna ,  Bernhard Hämmerli ,  Dimitris Gritzalis ,  Stephen Wolthusen
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Edition:   2013 ed.
Volume:   6983
ISBN:  

9783642414756


Pages:   227
Publication Date:   01 October 2013
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $131.97 Quantity:  
Add to Cart

Share |

Critical Information Infrastructure Security: 6th International Workshop, CRITIS 2011, Lucerne, Switzerland, September 8-9, 2011, Revised Selected Papers


Add your own review!

Overview

Full Product Details

Author:   Sandro Bologna ,  Bernhard Hämmerli ,  Dimitris Gritzalis ,  Stephen Wolthusen
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Imprint:   Springer-Verlag Berlin and Heidelberg GmbH & Co. K
Edition:   2013 ed.
Volume:   6983
Dimensions:   Width: 15.50cm , Height: 1.30cm , Length: 23.50cm
Weight:   0.454kg
ISBN:  

9783642414756


ISBN 10:   3642414753
Pages:   227
Publication Date:   01 October 2013
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

Ten National Cyber Security Strategies: A Comparison.- Analysis of Dependencies in Critical Infrastructures.- Assurance and Trust Indicators to Evaluate Accuracy of On-line Risk in Critical Infrastructures.- An Innovative Approach to Emergency Management in Large Infrastructures.- Dynamic Evacuation Guidance as Safety Critical Application in Building Automation.- Defeating Node Based Attacks on SCADA Systems Using Probabilistic Packet Observation.- Sub-optimal Topological Protection Strategy from Advanced Malware.- The Insider Threat in Cloud Computing.- Interdependencies between Critical Infrastructures: Analyzing the Risk of Cascading Effects.- How to Perform Verification and Validation of Critical Infrastructure Modeling Tools.- Petri Net Modelling of Physical Vulnerability.- Investigating the Effect of Network Parameters on Coordinated Cyber Attacks Against a Simulated Power Plant.- The Role of the DNS in the Secure and Resilient Operation of CIs, the Energy System Example.- The Development of Warning, Advice and Reporting Points (WARPs) in UK National Infrastructure.- The Contribution of NEISAS to EP3R.- Policies to Improve Resilience against Major Industrial Accidents.- Fuzzy Input-Output Inoperability Model.- Dependencies Discovery and Analysis in Distributed Systems.- Protecting Critical Infrastructures from Stealth Attacks: A Closed-Loop Approach Involving Detection and Remediation.- Risk Assessment in Critical Infrastructure Security Modelling Based on Dependency Analysis.- Countermeasures Selection via Evidence Theory.- The Robustness of Assortativity.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

Aorrng

Shopping Cart
Your cart is empty
Shopping cart
Mailing List