Description |
1 online resource (xiv, 219 pages) : illustrations |
Series |
Lecture Notes in Computer Science, 0302-9743 ; 8328 |
|
LNCS sublibrary. SL 4, Security and cryptology |
|
Lecture notes in computer science ; 8328. 0302-9743
|
|
LNCS sublibrary. SL 4, Security and cryptology.
|
Contents |
New Challenges. Security Challenges for Cooperative and Interconnected Mobility Systems / Tjerk Bijlsma, Sander de Kievit, Jacco van de Sluis, Ellen van Nunen, Igor Passchier [and others] -- Study of In-Data Centre Backup Offices for Banks / Yasutake Sayanagi -- Protecting a Federated Database Infrastructure against Denial-of-Service Attacks / Arne Ansper, Ahto Buldas, Margus Freudenthal, Jan Willemson -- Minimizing the Impact of In-band Jamming Attacks in WDM Optical Networks / Konstantinos Manousakis, Georgios Ellinas -- Natural Disasters. The Role of Critical Infrastructures' Interdependencies on the Impacts Caused by Natural Disasters / Ana Laugé, Josune Hernantes, Jose Mari Sarriegi -- Analysis of Severe Space Weather on Critical Infrastructures / Francesco Gaetano, Gabriele Oliva, Stefano Panzieri, Claudio Romani, Roberto Setola -- Smart Grids. A Plug and Play, Approximation-Based, Selective Load Shedding Mechanism for the Future Electrical Grid / Yiannis Tofis, Yiasoumis Yiasemi, Elias Kyriakides -- A Framework for Risk Analysis in Smart Grid / Rani Yesudas, Roger Clarke -- Physical Attestation of Cyber Processes in the Smart Grid / Thomas Roth, Bruce McMillin -- Threats and Risk. QSec: Supporting Security Decisions on an IT Infrastructure / Fabrizio Baiardi, Federico Tonelli, Fabio Corò, Luca Guidi -- Structural Controllability of Networks for Non-interactive Adversarial Vertex Removal / Cristina Alcaraz, Estefanía Etchevés Miciolino, Stephen Wolthusen -- Real Time Threat Prediction, Identification and Mitigation for Critical Infrastructure Protection Using Semantics, Event Processing and Sequential Analysis / Dimitris Kostopoulos, Vasilis Tsoulkas, George Leventakis, Prokopios Drogkaris [and others] -- Determining Risks from Advanced Multi-step Attacks to Critical Information Infrastructures / Zhendong Ma, Paul Smith -- SCADA/ICS and Sensors -- On the Feasibility of Device Fingerprinting in Industrial Control Systems / Marco Caselli, Dina Hadžiosmanović, Emmanuele Zambon, Frank Kargl -- Bridging Dolev-Yao Adversaries and Control Systems with Time-Sensitive Channels / Bogdan Groza, Marius Minea -- An Indoor Contaminant Sensor Placement Toolbox for Critical Infrastructure Buildings / Demetrios G. Eliades, Michalis P. Michaelides, Marinos Christodoulou, Marios Kyriakou [and others] -- Short Papers. Optimization Models in a Smart Tool for the Railway Infrastructure Protection / Antonio Sforza, Claudio Sterle, Pasquale D'amore, Annarita Tedesco, Francesca De Cillis [and others] -- Towards Automatic Critical Infrastructure Protection through Machine Learning / Lorena Cazorla, Cristina Alcaraz, Javier Lopez -- Using NATO Labelling to Support Controlled Information Sharing between Partners / Sander Oudkerk, Konrad Wrona -- A Framework for Privacy Protection and Usage Control of Personal Data in a Smart City Scenario / Gianmarco Baldini, Ioannis Kounelis, Igor Nai Fovino, Ricardo Neisse |
Summary |
This book constitutes the thoroughly refereed post-proceedings of the 8th International Workshop on Critical Information Infrastructures Security, CRITIS 2013, held in Amsterdam, The Netherlands, in September 2013. The 16 revised full papers and 4 short papers were thoroughly reviewed and selected from 57 submissions. The papers are structured in the following topical sections: new challenges, natural disasters, smart grids, threats and risk, and SCADA/ICS and sensors |
Notes |
Includes author index |
Bibliography |
Includes bibliographical references and index |
Notes |
Print version record |
In |
Springer eBooks |
Subject |
Computer security -- Congresses
|
|
Computer networks -- Security measures -- Congresses
|
|
Data encryption (Computer science) -- Congresses
|
|
Computer security.
|
|
Computer Security
|
|
Electronic Data Processing
|
|
Computer networks -- Security measures
|
|
Computer security
|
|
Data encryption (Computer science)
|
Genre/Form |
Conference papers and proceedings
|
Form |
Electronic book
|
Author |
Luiijf, Eric, editor
|
|
Hartel, Pieter H., editor
|
ISBN |
9783319039640 |
|
3319039644 |
|