Critical Information Infrastructures Security [electronic resource] : 4th International Workshop, CRITIS 2009, Bonn, Germany, September 30 - October 2, 2009. Revised Papers / edited by Erich Rome, Robin Bloomfield.
Material type:
TextSeries: Lecture Notes in Computer Science ; 6027Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2010Description: XII, 213p. 70 illus. online resourceContent type: - text
- computer
- online resource
- 9783642143793
- Computer science
- Operating systems (Computers)
- Computer Communication Networks
- Software engineering
- Computer system performance
- Data encryption (Computer science)
- Information Systems
- Computer Science
- Performance and Reliability
- Computer Communication Networks
- Management of Computing and Information Systems
- Data Encryption
- Special Purpose and Application-Based Systems
- System Performance and Evaluation
- 004.24 23
- QA76.76.R44
- TK5105.5956
E-BOOKS
| Home library | Call number | Materials specified | URL | Status | Date due | Barcode | |
|---|---|---|---|---|---|---|---|
| IMSc Library | Link to resource | Available | EBK9156 |
On Modelling of Inter-dependent Network Infrastructures by Extended Leontief Models -- Critical Infrastructure Protection in Brazil - Threat Identification and Analysis -- Development of Information Security-Focused Incident Prevention Measures for Critical Information Infrastructure in Japan -- Design of a Mobile Agent-Based Adaptive Communication Middleware for Federations of Critical Infrastructure Simulations -- An Alternate Topology Generator for Joint Study of Power Grids and Communication Networks -- Trouble Brewing: Using Observations of Invariant Behavior to Detect Malicious Agency in Distributed Control Systems -- Optimisation of Critical Infrastructure Protection: The SiVe Project on Airport Security -- Cyber-Critical Infrastructure Protection Using Real-Time Payload-Based Anomaly Detection -- Decision Aid Tool and Ontology-Based Reasoning for Critical Infrastructure Vulnerabilities and Threats Analysis -- Application Filters for TCP/IP Industrial Automation Protocols -- Web Browser Security Update Effectiveness -- State-Based Network Intrusion Detection Systems for SCADA Protocols: A Proof of Concept -- Towards Early Warning Systems – Challenges, Technologies and Architecture -- CII Protection - Lessons for Developing Countries: South Africa as a Case Study -- Energy Theft in the Advanced Metering Infrastructure -- Current Capabilities, Requirements and a Proposed Strategy for Interdependency Analysis in the UK -- Stochastic Modelling of the Effects of Interdependencies between Critical Infrastructure.
There are no comments on this title.