Cargando…

Critical Infrastructure Protection VIII 8th IFIP WG 11.10 International Conference, ICCIP 2014, Arlington, VA, USA, March 17-19, 2014, Revised Selected Papers /

The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital to day-to-day operations in every sector: information and telecommunications, banking and finance, energy, chemicals and hazardous materials, agriculture, food, water, public health, eme...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Butts, Jonathan (Editor ), Shenoi, Sujeet (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2014.
Edición:1st ed. 2014.
Colección:IFIP Advances in Information and Communication Technology, 441
Temas:
Acceso en línea:Texto Completo
Tabla de Contenidos:
  • Detecting Integrity Attacks on Industrial Control Systems
  • Detecting Malicious Software Execution in Programmable Logic Controllers Using Power Fingerprinting
  • Timing of Cyber-Physical Attacks on Process Control Systems
  • Recovery of Structural Controllability for Control Systems
  • Industrial Control System Traffic Data Sets for Intrusion Detection Research
  • An Industrial Control System Testbed Based on Emulation, Physical Devices and Simulation
  • Evidence Theory for Cyber-Physical Systems
  • An Automated Dialog System for Conducting Security Interviews for Access Control
  • A Survey of Critical Infrastructure Security
  • A System Dynamics Framework for Modeling Critical Infrastructure Resilience
  • Reinforcement Learning Using Monte Carlo Policy Estimation for Disaster Mitigation
  • Accuracy of Service Area Estimation Methods Used for Critical Infrastructure Recovery
  • A Decision Support Tool for a Unified Homeland Security Strategy
  • Assessing the Impact of Cyber Attacks on Wireless Sensor Nodes That Monitor Interdependent Physical Systems
  • Assessing Potential Casualties in Critical Events
  • Evaluation of Format-Preserving Encryption Algorithms for Critical Infrastructure Protection
  • Asynchronous Binary Byzantine Consensus over Graphs with Power-Law Degree Sequence.