Handbook on securing cyber-physical critical infrastructure : foundation and challenges /
The worldwide reach of the Internet allows malicious cyber criminals to coordinate and launch attacks on both cyber and cyber-physical infrastructure from anywhere in the world. This purpose of this handbook is to introduce the theoretical foundations and practical solution techniques for securing c...
Clasificación: | Libro Electrónico |
---|---|
Otros Autores: | , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Waltham, MA :
Morgan Kaufmann,
©2012.
|
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Tabla de Contenidos:
- Securing cyber-physical infrastructure : perspectives and overview of the handbook
- Security and vulnerability of cyber-physical infrastructure networks : a control-theoretic approach / Mengran Xue [and others]
- Game theory for infrastructure security : the power of intent-based adversary models / Xin Jin [and others]
- An analytical framework for cyber-physical networks / Nageswara S.V. Rao [and others]
- Evolution of widely spreading worms and countermeasures : epidemic theory and application / Wei Yu [and others]
- Mobile wireless network security / Michel Barbeau
- Robust wireless infrastructure against jamming attacks / Guevara Noubir
- Security for mobile ad hoc networks / Raja Datta, Ningrinla Marchang
- Defending against identity-based attacks in wireless networks / Yingying Chen, Jie Yang
- Efficient and distributed access control for sensor networks / Donggang Liu
- Defending against physical attacks in wireless sensor networks / Jin Teng, Wenjun Gu, Dong Xuan
- Node compromise detection in wireless sensor networks / Jun-Won Ho, Sajal K. Das
- Hardware and security : vulnerabilities and solutions / Gedare Bloom [and others]
- Languages and security : safer software through language and compiler techniques / Rahul Simha, Scotty Smith
- Protecting ata in outsourcing scenarios / Sabrina De Capitani di Vimercate, Sara Foresti, Pierangela Samarati
- Data security in cloud computing / Shucheng Yu, Wenjing Lou, Kui Ren
- Secure mobile cloud computing / Mayank Raj, Mario Di Francesco, Sajal K. Das
- Relation privacy preservation in publishing online social networks / Na Li, Nan Zhang, Sajal K. Das
- Distributed network and system monitoring for securing cyber-physical infrastructure / Yang Liu, Yong Guan
- Discovering and tracking patterns of interest in security sensor streams / Parisa Rashidi, Narayanan Krishnan, Diane J. Cook
- Pervasive sensing and monitoring for situational awareness / Sharad Mehrotra [and others]
- Sense and response systems for crisis management / J.J. Bunn [and others]
- Managing and securing critical infrastructure
- a semantic policy- and trust-driven approach / Wenjia Li [and others]
- Policies, access control, and formal methods / Elisa Bertino
- Formal analysis of policy-based security configurations in enterprise networks / S.K. Ghosh, Ehab Al-Shaer, P. Bera
- Security and privacy in the smart grid / Alvaro A. Cárdenas, Reihaneh Safavi-Naini
- Cyber-physical security of automotive information technology / Richard R. Brooks, Seok Bae Yun, Juan Deng
- Security and privacy for mobile health-care (m-Health) systems / Jinyuan Sun [and others]
- Security and robustness in the internet infrastructure / Krishna Kant, Casey Deccio
- Emergency vehicular networks / Mario Gerla [and others]
- Security issues in VoIP telecommunication networks / Xiaohui Yang, Ram Dantu, Duminda Wijesekera.