Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Critical infrastructure protection X...
~
IFIP Working Group 11.10 International Conference on Critical Infrastructure Protection (2024 :)
Linked to FindBook
Google Book
Amazon
博客來
Critical infrastructure protection XVIII = 18th IFIP WG 11.10 International Conference, ICCIP 2024, Arlington, VA, USA, March 18-19, 2024 : proceedings /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Critical infrastructure protection XVIII/ edited by Jason Staggs, Sujeet Shenoi.
Reminder of title:
18th IFIP WG 11.10 International Conference, ICCIP 2024, Arlington, VA, USA, March 18-19, 2024 : proceedings /
remainder title:
Critical infrastructure protection 18
other author:
Staggs, Jason.
corporate name:
IFIP Working Group 11.10 International Conference on Critical Infrastructure Protection
Published:
Cham :Springer Nature Switzerland : : 2025.,
Description:
xii, 191 p. :ill., digital ;24 cm.
[NT 15003449]:
Infrastructure Security: Evaluating Cyber Security Risks and Mitigation Strategies for Smart Grids Based on Business Case Scenarios -- On the Security of Electronic Voting Systems. Advanced Manufacturing Security: Detecting Control Injection Attacks Using Energy Data Anomalies in Computer Numerical Control Machining -- Security Assessment of an LBP16-Protocol-Based Computer Numerical Control Machine -- An End-to-End Framework for Verifying and Validating Manufacturing Design Integrity. Industrial Control System Security: Multiple-Bayesian-Network-Based Risk Assessment Methodology for Industrial Control Systems -- Automated Programmable Logic Controller Memory Forensics Using RGB Image Analysis and Deep Learning. Infrastructure Modeling: A Fail-Safe Challenge-Response Mechanism for User Equipment to Detect Rogue IMSI/SUPI Catchers -- Improved Distribution Network Topology Generation with Hierarchical Information Overlay.
Contained By:
Springer Nature eBook
Subject:
Computer networks - Security measures -
Online resource:
https://doi.org/10.1007/978-3-031-81888-2
ISBN:
9783031818882
Critical infrastructure protection XVIII = 18th IFIP WG 11.10 International Conference, ICCIP 2024, Arlington, VA, USA, March 18-19, 2024 : proceedings /
Critical infrastructure protection XVIII
18th IFIP WG 11.10 International Conference, ICCIP 2024, Arlington, VA, USA, March 18-19, 2024 : proceedings /[electronic resource] :Critical infrastructure protection 18edited by Jason Staggs, Sujeet Shenoi. - Cham :Springer Nature Switzerland :2025. - xii, 191 p. :ill., digital ;24 cm. - IFIP advances in information and communication technology,7251868-422X ;. - IFIP advances in information and communication technology ;725..
Infrastructure Security: Evaluating Cyber Security Risks and Mitigation Strategies for Smart Grids Based on Business Case Scenarios -- On the Security of Electronic Voting Systems. Advanced Manufacturing Security: Detecting Control Injection Attacks Using Energy Data Anomalies in Computer Numerical Control Machining -- Security Assessment of an LBP16-Protocol-Based Computer Numerical Control Machine -- An End-to-End Framework for Verifying and Validating Manufacturing Design Integrity. Industrial Control System Security: Multiple-Bayesian-Network-Based Risk Assessment Methodology for Industrial Control Systems -- Automated Programmable Logic Controller Memory Forensics Using RGB Image Analysis and Deep Learning. Infrastructure Modeling: A Fail-Safe Challenge-Response Mechanism for User Equipment to Detect Rogue IMSI/SUPI Catchers -- Improved Distribution Network Topology Generation with Hierarchical Information Overlay.
The cyber infrastructure - comprising computers, embedded devices, networks and software systems - is vital to operations in every sector: chemicals, commercial facilities, communications, critical manufacturing, dams, defense industrial base, emergency services, energy, financial services, food and agriculture, government facilities, healthcare and public health, information technology, nuclear reactors, materials and waste, transportation systems, and water and wastewater systems. Global business and industry, governments, indeed society itself, cannot function if major components of the critical infrastructure are degraded, disabled or destroyed. Critical Infrastructure Protection XVIII describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving together science, technology and policy to craft sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. Areas of coverage include: Infrastructure Security Advanced Manufacturing Security Industrial Control System Security Infrastructure Modeling This book is the eighteenth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of nine edited papers from the Eighteenth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, which was held at SRI International, Arlington, Virginia, USA in the spring of 2024. Critical Infrastructure Protection XVIII is an important resource for researchers, faculty members and graduate students, as well as for policy makers, practitioners and other individuals with interests in homeland security.
ISBN: 9783031818882
Standard No.: 10.1007/978-3-031-81888-2doiSubjects--Topical Terms:
582085
Computer networks
--Security measures
LC Class. No.: QA76.9.A25 / I45 2024
Dewey Class. No.: 005.8
Critical infrastructure protection XVIII = 18th IFIP WG 11.10 International Conference, ICCIP 2024, Arlington, VA, USA, March 18-19, 2024 : proceedings /
LDR
:04325nmm a2200385 a 4500
001
2408568
003
DE-He213
005
20250228115239.0
006
m d
007
cr nn 008maaau
008
260204s2025 sz s 0 eng d
020
$a
9783031818882
$q
(electronic bk.)
020
$a
9783031818875
$q
(paper)
024
7
$a
10.1007/978-3-031-81888-2
$2
doi
035
$a
978-3-031-81888-2
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
I45 2024
072
7
$a
UR
$2
bicssc
072
7
$a
UTN
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
I23 2024
111
2
$a
IFIP Working Group 11.10 International Conference on Critical Infrastructure Protection
$n
(18th :
$d
2024 :
$c
Arlington, Va.)
$3
3781146
245
1 0
$a
Critical infrastructure protection XVIII
$h
[electronic resource] :
$b
18th IFIP WG 11.10 International Conference, ICCIP 2024, Arlington, VA, USA, March 18-19, 2024 : proceedings /
$c
edited by Jason Staggs, Sujeet Shenoi.
246
3
$a
Critical infrastructure protection 18
246
3
$a
ICCIP 2024
260
$a
Cham :
$b
Springer Nature Switzerland :
$b
Imprint: Springer,
$c
2025.
300
$a
xii, 191 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
IFIP advances in information and communication technology,
$x
1868-422X ;
$v
725
505
0
$a
Infrastructure Security: Evaluating Cyber Security Risks and Mitigation Strategies for Smart Grids Based on Business Case Scenarios -- On the Security of Electronic Voting Systems. Advanced Manufacturing Security: Detecting Control Injection Attacks Using Energy Data Anomalies in Computer Numerical Control Machining -- Security Assessment of an LBP16-Protocol-Based Computer Numerical Control Machine -- An End-to-End Framework for Verifying and Validating Manufacturing Design Integrity. Industrial Control System Security: Multiple-Bayesian-Network-Based Risk Assessment Methodology for Industrial Control Systems -- Automated Programmable Logic Controller Memory Forensics Using RGB Image Analysis and Deep Learning. Infrastructure Modeling: A Fail-Safe Challenge-Response Mechanism for User Equipment to Detect Rogue IMSI/SUPI Catchers -- Improved Distribution Network Topology Generation with Hierarchical Information Overlay.
520
$a
The cyber infrastructure - comprising computers, embedded devices, networks and software systems - is vital to operations in every sector: chemicals, commercial facilities, communications, critical manufacturing, dams, defense industrial base, emergency services, energy, financial services, food and agriculture, government facilities, healthcare and public health, information technology, nuclear reactors, materials and waste, transportation systems, and water and wastewater systems. Global business and industry, governments, indeed society itself, cannot function if major components of the critical infrastructure are degraded, disabled or destroyed. Critical Infrastructure Protection XVIII describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving together science, technology and policy to craft sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. Areas of coverage include: Infrastructure Security Advanced Manufacturing Security Industrial Control System Security Infrastructure Modeling This book is the eighteenth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of nine edited papers from the Eighteenth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, which was held at SRI International, Arlington, Virginia, USA in the spring of 2024. Critical Infrastructure Protection XVIII is an important resource for researchers, faculty members and graduate students, as well as for policy makers, practitioners and other individuals with interests in homeland security.
650
0
$a
Computer networks
$x
Security measures
$x
Congresses.
$3
582085
650
1 4
$a
Data and Information Security.
$3
3538510
650
2 4
$a
Computer Communication Networks.
$3
775497
650
2 4
$a
Legal Aspects of Computing.
$3
892641
700
1
$a
Staggs, Jason.
$3
3528627
700
1
$a
Shenoi, Sujeet.
$3
737947
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
IFIP advances in information and communication technology ;
$v
725.
$3
3781147
856
4 0
$u
https://doi.org/10.1007/978-3-031-81888-2
950
$a
Computer Science (SpringerNature-11645)
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9514066
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25 I45 2024
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login