Critical information infrastructures security : 12th International Conference, CRITIS 2017, Lucca, Italy, October 8-13, 2017, Revised selected papers /: 12th International Conference, CRITIS 2017, Lucca, Italy, October 8-13, 2017, Revised selected papers. (2018)
- Record Type:
- Book
- Title:
- Critical information infrastructures security : 12th International Conference, CRITIS 2017, Lucca, Italy, October 8-13, 2017, Revised selected papers /: 12th International Conference, CRITIS 2017, Lucca, Italy, October 8-13, 2017, Revised selected papers. (2018)
- Main Title:
- Critical information infrastructures security : 12th International Conference, CRITIS 2017, Lucca, Italy, October 8-13, 2017, Revised selected papers
- Other Titles:
- CRITIS 2017
- Further Information:
- Note: Gregorio D'Agostino, Antonio Scala (eds.).
- Editors:
- D'Agostino, Gregorio
Scala, Antonio, 1968- - Other Names:
- CRITIS (Workshop), 12th
- Contents:
- Resilience of Electrical Distribution Systems with Critical Load Prioritization.- Public tolerance levels of transportation resilience: a focus on the Oresund region within the IMPROVER Project.- Towards a Common Vocabulary for Crisis Management Scenarios.- Analysis and Classification of Adaptation Tools for Transport Sector Adaptation Planning.- Timing-based Anomaly Detection in SCADA Networks.- Operational Resilience metrics for a complex electrical networks.- The Influence of Load Characteristics on Early Warning Signs in Power Systems.- DMA optimal layout for protection of water distribution networks from malicious attack.- Role of urban interactions and damage in seismic resilience of historical centers.- Towards Blockchain-Based Collaborative Intrusion Detection Systems.- Analysis of cybersecurity threats in Industry 4.0: the case of intrusion detection.- De-Synchronisation Attack Modelling in Real-Time Protocols Using Queue Networks: Attacking the ISO/IEC 61850 Substation Automation Protocol.- Assessing Urban Rail Transit Systems Vulnerability: Metrics vs. Interdiction Models.- Automatically Generating Security Models from System Models to Aid in the Evaluation of AMI Deployment Options.- A Gamified Approach to Participatory Modelling of Water System Risks.- Managing gas and electric power network dependencies to secure energy supply: application to the UK system.- What the Stack? On Memory Exploitation and Protection in Resource Constrained Automotive Systems.-Resilience of Electrical Distribution Systems with Critical Load Prioritization.- Public tolerance levels of transportation resilience: a focus on the Oresund region within the IMPROVER Project.- Towards a Common Vocabulary for Crisis Management Scenarios.- Analysis and Classification of Adaptation Tools for Transport Sector Adaptation Planning.- Timing-based Anomaly Detection in SCADA Networks.- Operational Resilience metrics for a complex electrical networks.- The Influence of Load Characteristics on Early Warning Signs in Power Systems.- DMA optimal layout for protection of water distribution networks from malicious attack.- Role of urban interactions and damage in seismic resilience of historical centers.- Towards Blockchain-Based Collaborative Intrusion Detection Systems.- Analysis of cybersecurity threats in Industry 4.0: the case of intrusion detection.- De-Synchronisation Attack Modelling in Real-Time Protocols Using Queue Networks: Attacking the ISO/IEC 61850 Substation Automation Protocol.- Assessing Urban Rail Transit Systems Vulnerability: Metrics vs. Interdiction Models.- Automatically Generating Security Models from System Models to Aid in the Evaluation of AMI Deployment Options.- A Gamified Approach to Participatory Modelling of Water System Risks.- Managing gas and electric power network dependencies to secure energy supply: application to the UK system.- What the Stack? On Memory Exploitation and Protection in Resource Constrained Automotive Systems.- Dealing with Functional Safety Requirements for Automotive Systems: A Cyber-Physical-Social Approach.- Side-channel based intrusion detection for industrial control systems.- Security Evaluation of Cyber-Physical Systems using Automatically Generated Attack Trees.- Faulty or Malicious Anchor Detection Criteria for Distance-Based Localization.- One step more : Automatic ICS Protocol Field Analysis.- Motion magnification for urban buildings.- Reputation Systems to Mitigate DoS Attack in Vehicular Network.-On the security of aircraft communication networks. … (more)
- Publisher Details:
- Cham, Switzerland : Springer
- Publication Date:
- 2018
- Extent:
- 1 online resource (xi, 272 pages), illustrations
- Subjects:
- 005.8
Computer science
Computer security -- Congresses
Computer networks -- Security measures -- Congresses
Data encryption (Computer science) -- Congresses
Computers -- Hardware -- Network Hardware
Computers -- Social Aspects -- General
Law -- Science & Technology
Computers -- Intelligence (AI) & Semantics
Computers -- Security -- General
Network hardware
Ethical & social aspects of IT
Legal aspects of IT
Artificial intelligence
Data encryption
Data protection
Computer Communication Networks
Computers_xLaw and legislation
Artificial intelligence
Data encryption (Computer scienc)
Computer security
Electronic books - Languages:
- English
- ISBNs:
- 9783319998435
3319998439 - Related ISBNs:
- 9783319998428
- Notes:
- Note: Online resource; title from PDF title page (SpringerLink, viewed September 17, 2018).
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.328356
- Ingest File:
- 01_269.xml