Description |
1 online resource (xvi, 338 pages) : illustrations |
Series |
IFIP advances in information and communication technology, 1868-4238 ; 512 |
|
IFIP advances in information and communication technology ; 512. 1868-4238
|
Contents |
Intro -- Contents -- Contributing Authors -- Preface -- I INFRASTRUCTURE PROTECTION -- PROTECTING THE TRANSPORTATION SECTOR FROM THE NEGATIVE IMPACTS OF CLIMATE CHANGE -- Abstract -- Keywords -- 1. Introduction -- 2. Transportation Sector -- 2.1 Climate Change Impacts on Transportation -- 3. Approaches for Climate Change Adaptation -- 3.1 Adaptation Assessment -- 3.2 Classification of Adaptation Options -- 3.3 Global Adaptation Initiatives -- 4. Adaptation in the Transportation Sector -- 4.1 Adaptation to Climate Change -- 4.2 Effective Governance for Adaptation |
|
4.3 Infrastructure Design and Planning -- 4.4 Redundancies in Transportation Modes -- 4.5 Operational Contingency -- 4.6 Early Warning Systems -- 4.7 Building Adaptive Capacity -- 4.8 Comprehensive Collaboration -- 5. Conclusions -- References -- EVALUATION OF ADDITIVE AND SUBTRACTIVE MANUFACTURING FROM THE SECURITY PERSPECTIVE -- Abstract -- Keywords -- 1. Introduction -- 2. Related Work -- 2.1 Cyber-Physical System Security -- 2.2 Additive Manufacturing Security -- 3. Manufacturing Workflows -- 3.1 Additive Manufacturing Workflow -- 3.2 Subtractive Manufacturing Workflow |
|
4. Attack Analysis Framework -- 4.1 Attacks -- 4.2 Security Threat Categories -- 5. Security Analysis -- 5.1 Attack Vectors -- 5.2 Compromised Elements -- 5.3 Manipulations -- 5.4 Effects -- 6. Conclusions -- References -- DETECTING DATA MANIPULATION ATTACKS ON T HE SUBSTATION INTERLOCKING FUNCTION USING DIRECT POWER FEEDBACK -- Abstract -- Keywords -- 1. Introduction -- 2. Related Work -- 3. Substation Interlocking -- 3.1 Substation Switching -- 3.2 Interlocking Function Operation -- 3.3 Substation Communication Protocols -- 4. Attack Description -- 5. Proposed Solution |
|
5.1 Switchgear Event Detection -- 5.2 Switchgear State Identification -- 5.3 Interlocking Function Security Controller -- 6. Implementation and Results -- 6.1 Implementation -- 6.2 Results -- 7. Conclusions -- References -- NETWORK FORENSIC ANALYSIS OF ELECTRICAL SUBSTATION AUTOMATION TRAFFIC -- Abstract -- Keywords -- 1. Introduction -- 2. Problem Statement -- 3. Graph Construction -- 3.1 Model Graph Construction -- 3.2 Concrete Graph Construction -- 4. Time Series Analysis -- 5. Experimental Evaluation -- 6. Conclusions -- Acknowledgement -- References |
|
II INFRASTRUCTURE MODELING AND SIMULATION -- MULTIPLE SECURITY DOMAIN MODEL OF A VEHICLE IN AN AUTOMATED PLATOON -- Abstract -- Keywords -- 1. Introduction -- 2. System Model -- 3. Related Work -- 3.1 Confidentiality -- 3.2 Integrity -- 3.3 Availability -- 3.4 Multiple Security Domain Nondeducibility -- 4. Problem Statement -- 4.1 Case 1 -- 4.2 Case 2 -- 4.3 Case 3 -- 4.4 Case 4 -- 4.5 Case 5 -- 5. Conclusions -- Acknowledgement -- References -- DISTRIBUTED DATA FUSION FOR SITUATIONAL AWARENESS IN CRITICAL INFRASTRUCTURES WITH LINK FAILURES -- Abstract -- Keywords -- 1. Introduction |
Summary |
The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital to operations in every sector: chemicals, commercial facilities, communications, critical manufacturing, dams, defense industrial base, emergency services, energy, financial services, food and agriculture, government facilities, healthcare and public health, information technology, nuclear reactors, materials and waste, transportation systems, and water and wastewater systems. Global business and industry, governments, indeed society itself, cannot function if major components of the critical information infrastructure are degraded, disabled or destroyed. Critical Infrastructure Protection XI describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. Areas of coverage include: Infrastructure Protection, Infrastructure Modeling and Simulation, Industrial Control System Security, and Internet of Things Security. This book is the eleventh volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of sixteen edited papers from the Eleventh Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, held at SRI International, Arlington, Virginia, USA in the spring of 2017. Critical Infrastructure Protection XI is an important resource for researchers, faculty members and graduate students, as well as for policy makers, practitioners and other individuals with interests in homeland security |
Notes |
Online resource; title from PDF title page (SpringerLink, viewed December 5, 2017) |
Subject |
Computer networks -- Security measures -- Congresses
|
|
Computer networks -- Security measures
|
Genre/Form |
proceedings (reports)
|
|
Conference papers and proceedings
|
|
Conference papers and proceedings.
|
|
Actes de congrès.
|
Form |
Electronic book
|
Author |
Rice, Mason, editor.
|
|
Shenoi, Sujeet, editor.
|
ISBN |
9783319703954 |
|
3319703951 |
|