Limit search to available items
Book Cover
E-book

Title Handbook on securing cyber-physical critical infrastructure : foundation and challenges / Sajal Das, Krishna Kant, Nan Zhang (editors)
Published Waltham, MA : Morgan Kaufmann, ©2012

Copies

Description 1 online resource (xxx, 816 pages) : illustrations
Contents Securing cyber-physical infrastructure : perspectives and overview of the handbook -- Security and vulnerability of cyber-physical infrastructure networks : a control-theoretic approach / Mengran Xue [and others] -- Game theory for infrastructure security : the power of intent-based adversary models / Xin Jin [and others] -- An analytical framework for cyber-physical networks / Nageswara S.V. Rao [and others] -- Evolution of widely spreading worms and countermeasures : epidemic theory and application / Wei Yu [and others] -- Mobile wireless network security / Michel Barbeau -- Robust wireless infrastructure against jamming attacks / Guevara Noubir -- Security for mobile ad hoc networks / Raja Datta, Ningrinla Marchang -- Defending against identity-based attacks in wireless networks / Yingying Chen, Jie Yang -- Efficient and distributed access control for sensor networks / Donggang Liu -- Defending against physical attacks in wireless sensor networks / Jin Teng, Wenjun Gu, Dong Xuan -- Node compromise detection in wireless sensor networks / Jun-Won Ho, Sajal K. Das -- Hardware and security : vulnerabilities and solutions / Gedare Bloom [and others] -- Languages and security : safer software through language and compiler techniques / Rahul Simha, Scotty Smith -- Protecting ata in outsourcing scenarios / Sabrina De Capitani di Vimercate, Sara Foresti, Pierangela Samarati -- Data security in cloud computing / Shucheng Yu, Wenjing Lou, Kui Ren -- Secure mobile cloud computing / Mayank Raj, Mario Di Francesco, Sajal K. Das -- Relation privacy preservation in publishing online social networks / Na Li, Nan Zhang, Sajal K. Das -- Distributed network and system monitoring for securing cyber-physical infrastructure / Yang Liu, Yong Guan -- Discovering and tracking patterns of interest in security sensor streams / Parisa Rashidi, Narayanan Krishnan, Diane J. Cook -- Pervasive sensing and monitoring for situational awareness / Sharad Mehrotra [and others] -- Sense and response systems for crisis management / J.J. Bunn [and others] -- Managing and securing critical infrastructure -- a semantic policy- and trust-driven approach / Wenjia Li [and others] -- Policies, access control, and formal methods / Elisa Bertino -- Formal analysis of policy-based security configurations in enterprise networks / S.K. Ghosh, Ehab Al-Shaer, P. Bera -- Security and privacy in the smart grid / Alvaro A. Cárdenas, Reihaneh Safavi-Naini -- Cyber-physical security of automotive information technology / Richard R. Brooks, Seok Bae Yun, Juan Deng -- Security and privacy for mobile health-care (m-Health) systems / Jinyuan Sun [and others] -- Security and robustness in the internet infrastructure / Krishna Kant, Casey Deccio -- Emergency vehicular networks / Mario Gerla [and others] -- Security issues in VoIP telecommunication networks / Xiaohui Yang, Ram Dantu, Duminda Wijesekera
Summary The worldwide reach of the Internet allows malicious cyber criminals to coordinate and launch attacks on both cyber and cyber-physical infrastructure from anywhere in the world. This purpose of this handbook is to introduce the theoretical foundations and practical solution techniques for securing critical cyber and physical infrastructures as well as their underlying computing and communication architectures and systems. Examples of such infrastructures include utility networks (e.g., electrical power grids), ground transportation systems (automotives, roads, bridges and tunnels), airports and air traffic control systems, wired and wireless communication and sensor networks, systems for storing and distributing water and food supplies, medical and healthcare delivery systems, as well as financial, banking and commercial transaction assets. The handbook focus mostly on the scientific foundations and engineering techniques - while also addressing the proper integration of policies and access control mechanisms, for example, how human-developed policies can be properly enforced by an automated system. @*Addresses the technical challenges facing design of secure infrastructures by providing examples of problems and solutions from a wide variety of internal and external attack scenarios @*Includes contributions from leading researchers and practitioners in relevant application areas such as smart power grid, intelligent transportation systems, healthcare industry and so on. @*Loaded with examples of real world problems and pathways to solutions utilizing specific tools and techniques described in detail throughout
Bibliography Includes bibliographical references and index
Notes Print version record
Subject Computer networks -- Security measures -- Handbooks, manuals, etc
Computer security -- Handbooks, manuals, etc
Computer networks -- Security measures
Computer security
Genre/Form Handbooks and manuals
Form Electronic book
Author Das, Sajal K.
Kant, Krishna.
Zhang, Nan, 1982-
Xue, Mengran
Xin, Jin
Rao, Nageswara S. V
Yu, Wei, 1981-
Barbeau, Michel (Computer scientist)
Noubir, Guevara
Datta, Raja
Marchang, Ningrinla
Chen, Yingying
Yang, Jie
Liu, Donggang.
Teng, Jin
Gu, Wenjun
Xuan, Dong
Ho, Jun-Won
Bloom, Gedare
Simha, Rahul.
Smith, Scotty
De Capitani di Vimercate, Sabrina
Foresti, Sara.
Samarati, Pierangela.
Yu, Shucheng
Lou, Wenjing.
Ren, Kui
Raj, Mayank
Di Francesco, Mario
Li, Na
Zhang, Nan
Liu, Yang
Guan, Yong
Rashidi, Parisa
Krishnan, Narayanan
Cook, Diane J., 1963-
Mehrotra, Sharad
Bunn, J. J
Li, Wenjia
Bertino, Elisa.
Ghosh, S. K
Al-Shaer, Ehab
Bera, P
Cárdenas, Alvaro A
Safavi-Naini, Reihanah.
Brooks, R. R. (Richard R.)
Yun, Seok Bae
Deng, Juan
Sun, Jinyuan
Deccio, Casey
Gerla, Mario
Yang, Xiaohui
Dantu, Ram
Wijesekera, Duminda.
LC no. 2011038620
ISBN 9780124159105
0124159109
0124158153
9780124158153
1283434245
9781283434249