My Account Log in

1 option

Critical Infrastructure Protection XIV : 14th IFIP WG 11.10 International Conference, ICCIP 2020, Arlington, VA, USA, March 16-17, 2020, Revised Selected Papers / edited by Jason Staggs, Sujeet Shenoi.

SpringerLink Books Computer Science (2011-2024) Available online

View online
Format:
Book
Contributor:
Staggs, Jason, Editor.
Shenoi, Sujeet, Editor.
SpringerLink (Online service)
Series:
IFIP advances in information and communication technology 1868-422X ; 596
IFIP Advances in Information and Communication Technology, 1868-422X ; 596
Language:
English
Subjects (All):
Data protection.
Application software.
Computer networks.
Computers-Law and legislation.
Information technology-Law and legislation.
Data and Information Security.
Computer and Information Systems Applications.
Computer Communication Networks.
Legal Aspects of Computing.
Local Subjects:
Data and Information Security.
Computer and Information Systems Applications.
Computer Communication Networks.
Legal Aspects of Computing.
Physical Description:
1 online resource (XVI, 348 pages) : 112 illustrations
Edition:
1st edition 2020.
Contained In:
Springer Nature eBook
Place of Publication:
Cham : Springer International Publishing : Imprint: Springer, 2020.
System Details:
text file PDF
Summary:
CRITICAL INFRASTRUCTURE PROTECTION XIV Edited by: Jason Staggs and Sujeet Shenoi The information infrastructure---comprising computers, embedded devices, networks and software systems---is vital to operations in every sector: chemicals, commercial facilities, communications, critical manufacturing, dams, defense industrial base, emergency services, energy, financial services, food and agriculture, government facilities, healthcare and public health, information technology, nuclear reactors, materials and waste, transportation systems, and water and wastewater systems. Global business and industry, governments, indeed society itself, cannot function if major components of the critical information infrastructure are degraded, disabled or destroyed. Critical Infrastructure Protection XIV describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. Areas of coverage include: Aviation Infrastructure Security Vehicle Infrastructure Security Telecommunications Systems Security Industrial Control Systems Security Cyber-Physical Systems Security Infrastructure Modeling and Simulation This book is the fourteenth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of sixteen edited papers from the Fourteenth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, held at SRI International, Arlington, Virginia, USA in the spring of 2020. Critical Infrastructure Protection XIV is an important resource for researchers, faculty members and graduate students, as well as for policy makers, practitioners and other individuals with interests in homeland security. Jason Staggs is an Adjunct Assistant Professor of Computer Science at the University of Tulsa, Tulsa, Oklahoma, USA. Sujeet Shenoi is the F.P. Walter Professor of Computer Science and a Professor of Chemical Engineering at the University of Tulsa, Tulsa, Oklahoma, USA.
Contents:
Aviation Infrastructure Security
Cyber-Physical Security of Air Traffic Surveillance Systems
Simulation-Based Logic Bomb Identification and Verification for Unmanned Aerial Vehicles
Assessing the Cyber Risk of Small Unmanned Aerial Vehicles
Cyber State Requirements for Design and Validation of Trust in the Critical Transportation Infrastructure
Vehicle Infrastructure Security
An Efficient Blockchain Authentication Scheme for Vehicular Ad-Hoc Networks
Engaging Empirical Dynamic Modeling to Detect Intrusions in Cyber-Physical Systems
Telecommunications Systems Security
Multi-Channel Security Through Data Fragmentation
Securing an InfiniBand Network and its Effect on Performance
Industrial Control Systems Security
Cyber-Resilient SCADA Systems via Secure State Restoration
Vulnerability Assessments of Building Management Systems
Forensic Investigation of a Hacked Industrial Robot
Cyber-Physical Systems Security
Distributed Bias Detection in Cyber-Physical Systems
Comparison of Design-Centric and Data-Centric Methods for Distributed Attack Detection in Cyber-Physical Systems
Infrastructure Modeling and Simulation
A Model-Based Safety-Security Risk Analysis Framework for Interconnected Critical Infrastructures
Creating a Cross-Domain Simulation Framework for Risk Analyses of Cities
Modeling Telecommunications Infrastructures Using the CISIApro 2.0 Simulator.
Other Format:
Printed edition:
ISBN:
9783030628406

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account