000 | 05527nam a22006015i 4500 | ||
---|---|---|---|
001 | 978-3-031-49585-4 | ||
003 | DE-He213 | ||
005 | 20240730170831.0 | ||
007 | cr nn 008mamaa | ||
008 | 231228s2024 sz | s |||| 0|eng d | ||
020 |
_a9783031495854 _9978-3-031-49585-4 |
||
024 | 7 |
_a10.1007/978-3-031-49585-4 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aCritical Infrastructure Protection XVII _h[electronic resource] : _b17th IFIP WG 11.10 International Conference, ICCIP 2023, Arlington, VA, USA, March 13-14, 2023, Revised Selected Papers / _cedited by Jason Staggs, Sujeet Shenoi. |
250 | _a1st ed. 2024. | ||
264 | 1 |
_aCham : _bSpringer Nature Switzerland : _bImprint: Springer, _c2024. |
|
300 |
_aX, 253 p. 84 illus., 7 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aIFIP Advances in Information and Communication Technology, _x1868-422X ; _v686 |
|
505 | 0 | _aThemes and Issues -- Redefining Homeland Security -- Smart Grid Risks and Impacts -- Smart-Grid-Enabled Business Cases and the Consequences of Cyber Attacks -- Consequence Verification During Risk Assessments of Smart Grids -- Measuring the Impacts of Power Outages on Internet Hosts in the United States -- Network and Telecommunications Systems Security -- Analyzing Discrepancies in Whole-Network Provenance -- A Contextual Integrity Property to Impede Privacy Violations in 5G Networks -- Infrastructure Security -- Modeling and Assessing the Impacts of Cyber Threats on Interdependent Critical Infrastructures -- Security-Enhanced Orchestration Platform for Building Management Systems -- Practical Deep Neural Network Protection for Unmodified Applications in Intel Software Guard Extension Environments -- Automobile Security -- A Cyber Security Analysis Methodology for Evaluating Automobile Risk Exposures -- Real-Time Attack Detection in Modern Automobile Controller Area Networks. | |
520 | _aThe information infrastructure - comprising computers, embedded devices, networks and software systems - is vital to operations in every sector: chemicals, commercial facilities, communications, critical manufacturing, dams, defense industrial base, emergency services, energy, financial services, food and agriculture, government facilities, healthcare and public health, information technology, nuclear reactors, materials and waste, transportation systems, and water and wastewater systems. Global business and industry, governments, indeed society itself, cannot function if major components of the critical information infrastructure are degraded, disabled or destroyed. Critical Infrastructure Protection XVII describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. Areas of coverage include: Themes and Issues Smart Grid Risks and Impacts Network and Telecommunications Systems Security Infrastructure Security Automobile Security This book is the seventeenth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of eleven edited papers from the Seventeenth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, which was held at SRI International, Arlington, Virginia, USA in the spring of 2023. Critical Infrastructure Protection XVII is an important resource for researchers, faculty members and graduate students, as well as for as well as for policy makers, practitioners and other individuals with interests in homeland security. | ||
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aComputer engineering. _910164 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 0 |
_aComputers _xLaw and legislation. _975151 |
|
650 | 0 |
_aInformation technology _xLaw and legislation. _982531 |
|
650 | 1 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_aComputer Engineering and Networks. _995680 |
650 | 2 | 4 |
_aLegal Aspects of Computing. _953952 |
700 | 1 |
_aStaggs, Jason. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _995682 |
|
700 | 1 |
_aShenoi, Sujeet. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _995684 |
|
710 | 2 |
_aSpringerLink (Online service) _995685 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783031495847 |
776 | 0 | 8 |
_iPrinted edition: _z9783031495861 |
776 | 0 | 8 |
_iPrinted edition: _z9783031495878 |
830 | 0 |
_aIFIP Advances in Information and Communication Technology, _x1868-422X ; _v686 _995686 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-031-49585-4 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
942 | _cEBK | ||
999 |
_c87208 _d87208 |