Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Critical information infrastructures...
~
CRITIS (Conference) (2024 :)
Linked to FindBook
Google Book
Amazon
博客來
Critical information infrastructures security = 19th International Conference, CRITIS 2024, Rome, Italy, September 18-20, 2024 : revised selected papers /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Critical information infrastructures security/ edited by Gabriele Oliva ... [et al.].
Reminder of title:
19th International Conference, CRITIS 2024, Rome, Italy, September 18-20, 2024 : revised selected papers /
remainder title:
CRITIS 2024
other author:
Oliva, Gabriele.
corporate name:
CRITIS (Conference)
Published:
Cham :Springer Nature Switzerland : : 2025.,
Description:
xi, 436 p. :ill. (chiefly color), digital ;24 cm.
[NT 15003449]:
Resilience of Critical Infrastructures and Climate Change. -- Questioning the Myth: Investigating ICS Traffic Homogeneity from an Anomaly Detection Perspective. -- Enhancing Long term Storage Security in Critical Infrastructures under NIS2 Directive: Addressing Post Quantum Cryptography Challenges. -- Exploratory Trend Analysis of Supply Chain Cybersecurity Management. -- A Cooperative Feature Removal Mechanism for Cell Outage Detection in Wireless Telecommunication Networks. -- "Paying the Rent" A Formal Methods Riposte to "Living off the Land" Attacks. -- Lyapunov based performance oriented switching strategies for linear systems. -- A Re Transmission Algorithm for Phasor Data Concentrators for Resilience Enhancement of State Estimation. -- Locally Optimal Information Pathways in the Presence of Static Adversaries for a Hierarchical Smart Distribution Grid Model. -- Inoperability Propagation in Networks with Coupled Logistic Dynamics. -- Resilience Analysis of Naval Vessels with i2SIM. -- Gender Gap in the Critical Infrastructure Research Community. -- Centrality based Security Allocation in Networked Control Systems. -- Using tabletop exercises to raise cybersecurity awareness of decision makers. -- Penetrating the Power Grid: Realistic Adversarial Attacks on Smart Grid Intrusion Detection Systems. -- Cyber Resilience Using ASFA: DORA Compliant Threat Led Penetration Testing. -- AdaLightLog: Enhancing Application Logs Anomaly Detection via Adaptive Federating Learning. -- A Cost Sensitive Approach for Managing Intrusion Alerts in OT Environments. -- Multicriteria GIS spatial analysis for multi hazard assessment of infrastructures in case of natural events. -- Machine Learning Techniques for Anomaly Detection in the Hydra Testbed: A Data Driven Defense Strategy. -- Improving Impact Assessment using Fuzzy Sets in CISIApro 2.0 Model. -- A Decision Support System for the Damage and Urban Resilience Assessment of Natural Events. -- Urban Data Governance: an interoperability based approach for monitoring natural threats at different geographic scales through Smart City Platforms. -- Uncertain Analytic Hierarchy Process for Risk Assessment in Cyber Physical Systems.
Contained By:
Springer Nature eBook
Subject:
Computer security - Congresses. -
Online resource:
https://doi.org/10.1007/978-3-031-84260-3
ISBN:
9783031842603
Critical information infrastructures security = 19th International Conference, CRITIS 2024, Rome, Italy, September 18-20, 2024 : revised selected papers /
Critical information infrastructures security
19th International Conference, CRITIS 2024, Rome, Italy, September 18-20, 2024 : revised selected papers /[electronic resource] :CRITIS 2024edited by Gabriele Oliva ... [et al.]. - Cham :Springer Nature Switzerland :2025. - xi, 436 p. :ill. (chiefly color), digital ;24 cm. - Lecture notes in computer science,155491611-3349 ;. - Lecture notes in computer science ;15549..
Resilience of Critical Infrastructures and Climate Change. -- Questioning the Myth: Investigating ICS Traffic Homogeneity from an Anomaly Detection Perspective. -- Enhancing Long term Storage Security in Critical Infrastructures under NIS2 Directive: Addressing Post Quantum Cryptography Challenges. -- Exploratory Trend Analysis of Supply Chain Cybersecurity Management. -- A Cooperative Feature Removal Mechanism for Cell Outage Detection in Wireless Telecommunication Networks. -- "Paying the Rent" A Formal Methods Riposte to "Living off the Land" Attacks. -- Lyapunov based performance oriented switching strategies for linear systems. -- A Re Transmission Algorithm for Phasor Data Concentrators for Resilience Enhancement of State Estimation. -- Locally Optimal Information Pathways in the Presence of Static Adversaries for a Hierarchical Smart Distribution Grid Model. -- Inoperability Propagation in Networks with Coupled Logistic Dynamics. -- Resilience Analysis of Naval Vessels with i2SIM. -- Gender Gap in the Critical Infrastructure Research Community. -- Centrality based Security Allocation in Networked Control Systems. -- Using tabletop exercises to raise cybersecurity awareness of decision makers. -- Penetrating the Power Grid: Realistic Adversarial Attacks on Smart Grid Intrusion Detection Systems. -- Cyber Resilience Using ASFA: DORA Compliant Threat Led Penetration Testing. -- AdaLightLog: Enhancing Application Logs Anomaly Detection via Adaptive Federating Learning. -- A Cost Sensitive Approach for Managing Intrusion Alerts in OT Environments. -- Multicriteria GIS spatial analysis for multi hazard assessment of infrastructures in case of natural events. -- Machine Learning Techniques for Anomaly Detection in the Hydra Testbed: A Data Driven Defense Strategy. -- Improving Impact Assessment using Fuzzy Sets in CISIApro 2.0 Model. -- A Decision Support System for the Damage and Urban Resilience Assessment of Natural Events. -- Urban Data Governance: an interoperability based approach for monitoring natural threats at different geographic scales through Smart City Platforms. -- Uncertain Analytic Hierarchy Process for Risk Assessment in Cyber Physical Systems.
This book constitutes the refereed proceedings of the 19th International Conference on Critical Information Infrastructures Security, CRITIS 2024, held in Rome, Italy, during September 18-20, 2024. The 24 full papers were included in this volume were carefully reviewed and selected from 32 submissions. The presentations mainly revolved around cyber security, cyber-physical systems, climate change and natural threats.
ISBN: 9783031842603
Standard No.: 10.1007/978-3-031-84260-3doiSubjects--Topical Terms:
622818
Computer security
--Congresses.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Critical information infrastructures security = 19th International Conference, CRITIS 2024, Rome, Italy, September 18-20, 2024 : revised selected papers /
LDR
:03873nmm a2200373 a 4500
001
2408758
003
DE-He213
005
20250304115233.0
006
m d
007
cr nn 008maaau
008
260204s2025 sz s 0 eng d
020
$a
9783031842603
$q
(electronic bk.)
020
$a
9783031842597
$q
(paper)
024
7
$a
10.1007/978-3-031-84260-3
$2
doi
035
$a
978-3-031-84260-3
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
UTN
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
C934 2024
111
2
$a
CRITIS (Conference)
$n
(19th :
$d
2024 :
$c
Rome, Italy)
$3
3781541
245
1 0
$a
Critical information infrastructures security
$h
[electronic resource] :
$b
19th International Conference, CRITIS 2024, Rome, Italy, September 18-20, 2024 : revised selected papers /
$c
edited by Gabriele Oliva ... [et al.].
246
3
$a
CRITIS 2024
260
$a
Cham :
$b
Springer Nature Switzerland :
$b
Imprint: Springer,
$c
2025.
300
$a
xi, 436 p. :
$b
ill. (chiefly color), digital ;
$c
24 cm.
490
1
$a
Lecture notes in computer science,
$x
1611-3349 ;
$v
15549
505
0
$a
Resilience of Critical Infrastructures and Climate Change. -- Questioning the Myth: Investigating ICS Traffic Homogeneity from an Anomaly Detection Perspective. -- Enhancing Long term Storage Security in Critical Infrastructures under NIS2 Directive: Addressing Post Quantum Cryptography Challenges. -- Exploratory Trend Analysis of Supply Chain Cybersecurity Management. -- A Cooperative Feature Removal Mechanism for Cell Outage Detection in Wireless Telecommunication Networks. -- "Paying the Rent" A Formal Methods Riposte to "Living off the Land" Attacks. -- Lyapunov based performance oriented switching strategies for linear systems. -- A Re Transmission Algorithm for Phasor Data Concentrators for Resilience Enhancement of State Estimation. -- Locally Optimal Information Pathways in the Presence of Static Adversaries for a Hierarchical Smart Distribution Grid Model. -- Inoperability Propagation in Networks with Coupled Logistic Dynamics. -- Resilience Analysis of Naval Vessels with i2SIM. -- Gender Gap in the Critical Infrastructure Research Community. -- Centrality based Security Allocation in Networked Control Systems. -- Using tabletop exercises to raise cybersecurity awareness of decision makers. -- Penetrating the Power Grid: Realistic Adversarial Attacks on Smart Grid Intrusion Detection Systems. -- Cyber Resilience Using ASFA: DORA Compliant Threat Led Penetration Testing. -- AdaLightLog: Enhancing Application Logs Anomaly Detection via Adaptive Federating Learning. -- A Cost Sensitive Approach for Managing Intrusion Alerts in OT Environments. -- Multicriteria GIS spatial analysis for multi hazard assessment of infrastructures in case of natural events. -- Machine Learning Techniques for Anomaly Detection in the Hydra Testbed: A Data Driven Defense Strategy. -- Improving Impact Assessment using Fuzzy Sets in CISIApro 2.0 Model. -- A Decision Support System for the Damage and Urban Resilience Assessment of Natural Events. -- Urban Data Governance: an interoperability based approach for monitoring natural threats at different geographic scales through Smart City Platforms. -- Uncertain Analytic Hierarchy Process for Risk Assessment in Cyber Physical Systems.
520
$a
This book constitutes the refereed proceedings of the 19th International Conference on Critical Information Infrastructures Security, CRITIS 2024, held in Rome, Italy, during September 18-20, 2024. The 24 full papers were included in this volume were carefully reviewed and selected from 32 submissions. The presentations mainly revolved around cyber security, cyber-physical systems, climate change and natural threats.
650
0
$a
Computer security
$v
Congresses.
$3
622818
650
0
$a
Computers
$x
Access control
$v
Congresses.
$3
737949
650
0
$a
Information superhighway
$x
Security measures
$v
Congresses.
$3
3661596
650
1 4
$a
Data and Information Security.
$3
3538510
650
2 4
$a
Mobile and Network Security.
$3
3382377
650
2 4
$a
Software Engineering.
$3
890874
650
2 4
$a
Computer Engineering and Networks.
$3
3538504
700
1
$a
Oliva, Gabriele.
$3
3781542
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
Lecture notes in computer science ;
$v
15549.
$3
3781543
856
4 0
$u
https://doi.org/10.1007/978-3-031-84260-3
950
$a
Computer Science (SpringerNature-11645)
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9514256
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login