語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Critical infrastructure protection X...
~
IFIP Working Group 11.10 International Conference on Critical Infrastructure Protection (2024 :)
FindBook
Google Book
Amazon
博客來
Critical infrastructure protection XVIII = 18th IFIP WG 11.10 International Conference, ICCIP 2024, Arlington, VA, USA, March 18-19, 2024 : proceedings /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Critical infrastructure protection XVIII/ edited by Jason Staggs, Sujeet Shenoi.
其他題名:
18th IFIP WG 11.10 International Conference, ICCIP 2024, Arlington, VA, USA, March 18-19, 2024 : proceedings /
其他題名:
Critical infrastructure protection 18
其他作者:
Staggs, Jason.
團體作者:
IFIP Working Group 11.10 International Conference on Critical Infrastructure Protection
出版者:
Cham :Springer Nature Switzerland : : 2025.,
面頁冊數:
xii, 191 p. :ill., digital ;24 cm.
內容註:
Infrastructure Security: Evaluating Cyber Security Risks and Mitigation Strategies for Smart Grids Based on Business Case Scenarios -- On the Security of Electronic Voting Systems. Advanced Manufacturing Security: Detecting Control Injection Attacks Using Energy Data Anomalies in Computer Numerical Control Machining -- Security Assessment of an LBP16-Protocol-Based Computer Numerical Control Machine -- An End-to-End Framework for Verifying and Validating Manufacturing Design Integrity. Industrial Control System Security: Multiple-Bayesian-Network-Based Risk Assessment Methodology for Industrial Control Systems -- Automated Programmable Logic Controller Memory Forensics Using RGB Image Analysis and Deep Learning. Infrastructure Modeling: A Fail-Safe Challenge-Response Mechanism for User Equipment to Detect Rogue IMSI/SUPI Catchers -- Improved Distribution Network Topology Generation with Hierarchical Information Overlay.
Contained By:
Springer Nature eBook
標題:
Computer networks - Security measures -
電子資源:
https://doi.org/10.1007/978-3-031-81888-2
ISBN:
9783031818882
Critical infrastructure protection XVIII = 18th IFIP WG 11.10 International Conference, ICCIP 2024, Arlington, VA, USA, March 18-19, 2024 : proceedings /
Critical infrastructure protection XVIII
18th IFIP WG 11.10 International Conference, ICCIP 2024, Arlington, VA, USA, March 18-19, 2024 : proceedings /[electronic resource] :Critical infrastructure protection 18edited by Jason Staggs, Sujeet Shenoi. - Cham :Springer Nature Switzerland :2025. - xii, 191 p. :ill., digital ;24 cm. - IFIP advances in information and communication technology,7251868-422X ;. - IFIP advances in information and communication technology ;725..
Infrastructure Security: Evaluating Cyber Security Risks and Mitigation Strategies for Smart Grids Based on Business Case Scenarios -- On the Security of Electronic Voting Systems. Advanced Manufacturing Security: Detecting Control Injection Attacks Using Energy Data Anomalies in Computer Numerical Control Machining -- Security Assessment of an LBP16-Protocol-Based Computer Numerical Control Machine -- An End-to-End Framework for Verifying and Validating Manufacturing Design Integrity. Industrial Control System Security: Multiple-Bayesian-Network-Based Risk Assessment Methodology for Industrial Control Systems -- Automated Programmable Logic Controller Memory Forensics Using RGB Image Analysis and Deep Learning. Infrastructure Modeling: A Fail-Safe Challenge-Response Mechanism for User Equipment to Detect Rogue IMSI/SUPI Catchers -- Improved Distribution Network Topology Generation with Hierarchical Information Overlay.
The cyber infrastructure - comprising computers, embedded devices, networks and software systems - is vital to operations in every sector: chemicals, commercial facilities, communications, critical manufacturing, dams, defense industrial base, emergency services, energy, financial services, food and agriculture, government facilities, healthcare and public health, information technology, nuclear reactors, materials and waste, transportation systems, and water and wastewater systems. Global business and industry, governments, indeed society itself, cannot function if major components of the critical infrastructure are degraded, disabled or destroyed. Critical Infrastructure Protection XVIII describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving together science, technology and policy to craft sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. Areas of coverage include: Infrastructure Security Advanced Manufacturing Security Industrial Control System Security Infrastructure Modeling This book is the eighteenth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of nine edited papers from the Eighteenth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, which was held at SRI International, Arlington, Virginia, USA in the spring of 2024. Critical Infrastructure Protection XVIII is an important resource for researchers, faculty members and graduate students, as well as for policy makers, practitioners and other individuals with interests in homeland security.
ISBN: 9783031818882
Standard No.: 10.1007/978-3-031-81888-2doiSubjects--Topical Terms:
582085
Computer networks
--Security measures
LC Class. No.: QA76.9.A25 / I45 2024
Dewey Class. No.: 005.8
Critical infrastructure protection XVIII = 18th IFIP WG 11.10 International Conference, ICCIP 2024, Arlington, VA, USA, March 18-19, 2024 : proceedings /
LDR
:04325nmm a2200385 a 4500
001
2408568
003
DE-He213
005
20250228115239.0
006
m d
007
cr nn 008maaau
008
260204s2025 sz s 0 eng d
020
$a
9783031818882
$q
(electronic bk.)
020
$a
9783031818875
$q
(paper)
024
7
$a
10.1007/978-3-031-81888-2
$2
doi
035
$a
978-3-031-81888-2
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
I45 2024
072
7
$a
UR
$2
bicssc
072
7
$a
UTN
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
I23 2024
111
2
$a
IFIP Working Group 11.10 International Conference on Critical Infrastructure Protection
$n
(18th :
$d
2024 :
$c
Arlington, Va.)
$3
3781146
245
1 0
$a
Critical infrastructure protection XVIII
$h
[electronic resource] :
$b
18th IFIP WG 11.10 International Conference, ICCIP 2024, Arlington, VA, USA, March 18-19, 2024 : proceedings /
$c
edited by Jason Staggs, Sujeet Shenoi.
246
3
$a
Critical infrastructure protection 18
246
3
$a
ICCIP 2024
260
$a
Cham :
$b
Springer Nature Switzerland :
$b
Imprint: Springer,
$c
2025.
300
$a
xii, 191 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
IFIP advances in information and communication technology,
$x
1868-422X ;
$v
725
505
0
$a
Infrastructure Security: Evaluating Cyber Security Risks and Mitigation Strategies for Smart Grids Based on Business Case Scenarios -- On the Security of Electronic Voting Systems. Advanced Manufacturing Security: Detecting Control Injection Attacks Using Energy Data Anomalies in Computer Numerical Control Machining -- Security Assessment of an LBP16-Protocol-Based Computer Numerical Control Machine -- An End-to-End Framework for Verifying and Validating Manufacturing Design Integrity. Industrial Control System Security: Multiple-Bayesian-Network-Based Risk Assessment Methodology for Industrial Control Systems -- Automated Programmable Logic Controller Memory Forensics Using RGB Image Analysis and Deep Learning. Infrastructure Modeling: A Fail-Safe Challenge-Response Mechanism for User Equipment to Detect Rogue IMSI/SUPI Catchers -- Improved Distribution Network Topology Generation with Hierarchical Information Overlay.
520
$a
The cyber infrastructure - comprising computers, embedded devices, networks and software systems - is vital to operations in every sector: chemicals, commercial facilities, communications, critical manufacturing, dams, defense industrial base, emergency services, energy, financial services, food and agriculture, government facilities, healthcare and public health, information technology, nuclear reactors, materials and waste, transportation systems, and water and wastewater systems. Global business and industry, governments, indeed society itself, cannot function if major components of the critical infrastructure are degraded, disabled or destroyed. Critical Infrastructure Protection XVIII describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving together science, technology and policy to craft sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. Areas of coverage include: Infrastructure Security Advanced Manufacturing Security Industrial Control System Security Infrastructure Modeling This book is the eighteenth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of nine edited papers from the Eighteenth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, which was held at SRI International, Arlington, Virginia, USA in the spring of 2024. Critical Infrastructure Protection XVIII is an important resource for researchers, faculty members and graduate students, as well as for policy makers, practitioners and other individuals with interests in homeland security.
650
0
$a
Computer networks
$x
Security measures
$x
Congresses.
$3
582085
650
1 4
$a
Data and Information Security.
$3
3538510
650
2 4
$a
Computer Communication Networks.
$3
775497
650
2 4
$a
Legal Aspects of Computing.
$3
892641
700
1
$a
Staggs, Jason.
$3
3528627
700
1
$a
Shenoi, Sujeet.
$3
737947
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
IFIP advances in information and communication technology ;
$v
725.
$3
3781147
856
4 0
$u
https://doi.org/10.1007/978-3-031-81888-2
950
$a
Computer Science (SpringerNature-11645)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9514066
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25 I45 2024
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入