Cargando…

Handbook on securing cyber-physical critical infrastructure : foundation and challenges /

The worldwide reach of the Internet allows malicious cyber criminals to coordinate and launch attacks on both cyber and cyber-physical infrastructure from anywhere in the world. This purpose of this handbook is to introduce the theoretical foundations and practical solution techniques for securing c...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Das, Sajal K., Kant, Krishna, Zhang, Nan, 1982-, Xue, Mengran, Xin, Jin, Rao, Nageswara S. V., Yu, Wei, 1981-, Barbeau, Michel (Computer scientist), Noubir, Guevara, Datta, Raja, Marchang, Ningrinla, Chen, Yingying, Yang, Jie, Liu, Donggang, Teng, Jin, Gu, Wenjun, Xuan, Dong, Ho, Jun-Won, Bloom, Gedare, Simha, Rahul, Smith, Scotty, De Capitani di Vimercate, Sabrina, Foresti, Sara, Samarati, Pierangela, Yu, Shucheng, Lou, Wenjing, Ren, Kui, Raj, Mayank, Di Francesco, Mario, Li, Na, Zhang, Nan, Liu, Yang, Guan, Yong, Rashidi, Parisa, Krishnan, Narayanan, Cook, Diane J., 1963-, Mehrotra, Sharad, Bunn, J. J., Li, Wenjia, Bertino, Elisa, Ghosh, S. K., Al-Shaer, Ehab, Bera, P., Cárdenas, Alvaro A., Safavi-Naini, Reihanah, Brooks, R. R. (Richard R.), Yun, Seok Bae, Deng, Juan, Sun, Jinyuan, Deccio, Casey, Gerla, Mario, Yang, Xiaohui, Dantu, Ram, Wijesekera, Duminda
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Waltham, MA : Morgan Kaufmann, ©2012.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)
Tabla de Contenidos:
  • Securing cyber-physical infrastructure : perspectives and overview of the handbook
  • Security and vulnerability of cyber-physical infrastructure networks : a control-theoretic approach / Mengran Xue [and others]
  • Game theory for infrastructure security : the power of intent-based adversary models / Xin Jin [and others]
  • An analytical framework for cyber-physical networks / Nageswara S.V. Rao [and others]
  • Evolution of widely spreading worms and countermeasures : epidemic theory and application / Wei Yu [and others]
  • Mobile wireless network security / Michel Barbeau
  • Robust wireless infrastructure against jamming attacks / Guevara Noubir
  • Security for mobile ad hoc networks / Raja Datta, Ningrinla Marchang
  • Defending against identity-based attacks in wireless networks / Yingying Chen, Jie Yang
  • Efficient and distributed access control for sensor networks / Donggang Liu
  • Defending against physical attacks in wireless sensor networks / Jin Teng, Wenjun Gu, Dong Xuan
  • Node compromise detection in wireless sensor networks / Jun-Won Ho, Sajal K. Das
  • Hardware and security : vulnerabilities and solutions / Gedare Bloom [and others]
  • Languages and security : safer software through language and compiler techniques / Rahul Simha, Scotty Smith
  • Protecting ata in outsourcing scenarios / Sabrina De Capitani di Vimercate, Sara Foresti, Pierangela Samarati
  • Data security in cloud computing / Shucheng Yu, Wenjing Lou, Kui Ren
  • Secure mobile cloud computing / Mayank Raj, Mario Di Francesco, Sajal K. Das
  • Relation privacy preservation in publishing online social networks / Na Li, Nan Zhang, Sajal K. Das
  • Distributed network and system monitoring for securing cyber-physical infrastructure / Yang Liu, Yong Guan
  • Discovering and tracking patterns of interest in security sensor streams / Parisa Rashidi, Narayanan Krishnan, Diane J. Cook
  • Pervasive sensing and monitoring for situational awareness / Sharad Mehrotra [and others]
  • Sense and response systems for crisis management / J.J. Bunn [and others]
  • Managing and securing critical infrastructure
  • a semantic policy- and trust-driven approach / Wenjia Li [and others]
  • Policies, access control, and formal methods / Elisa Bertino
  • Formal analysis of policy-based security configurations in enterprise networks / S.K. Ghosh, Ehab Al-Shaer, P. Bera
  • Security and privacy in the smart grid / Alvaro A. Cárdenas, Reihaneh Safavi-Naini
  • Cyber-physical security of automotive information technology / Richard R. Brooks, Seok Bae Yun, Juan Deng
  • Security and privacy for mobile health-care (m-Health) systems / Jinyuan Sun [and others]
  • Security and robustness in the internet infrastructure / Krishna Kant, Casey Deccio
  • Emergency vehicular networks / Mario Gerla [and others]
  • Security issues in VoIP telecommunication networks / Xiaohui Yang, Ram Dantu, Duminda Wijesekera.