000 03933nam a22006015i 4500
001 978-3-642-14379-3
003 DE-He213
005 20140220084542.0
007 cr nn 008mamaa
008 100706s2010 gw | s |||| 0|eng d
020 _a9783642143793
_9978-3-642-14379-3
024 7 _a10.1007/978-3-642-14379-3
_2doi
050 4 _aQA76.76.R44
050 4 _aTK5105.5956
072 7 _aUYD
_2bicssc
072 7 _aUKR
_2bicssc
072 7 _aCOM067000
_2bisacsh
082 0 4 _a004.24
_223
100 1 _aRome, Erich.
_eeditor.
245 1 0 _aCritical Information Infrastructures Security
_h[electronic resource] :
_b4th International Workshop, CRITIS 2009, Bonn, Germany, September 30 - October 2, 2009. Revised Papers /
_cedited by Erich Rome, Robin Bloomfield.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg,
_c2010.
300 _aXII, 213p. 70 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v6027
505 0 _aOn Modelling of Inter-dependent Network Infrastructures by Extended Leontief Models -- Critical Infrastructure Protection in Brazil - Threat Identification and Analysis -- Development of Information Security-Focused Incident Prevention Measures for Critical Information Infrastructure in Japan -- Design of a Mobile Agent-Based Adaptive Communication Middleware for Federations of Critical Infrastructure Simulations -- An Alternate Topology Generator for Joint Study of Power Grids and Communication Networks -- Trouble Brewing: Using Observations of Invariant Behavior to Detect Malicious Agency in Distributed Control Systems -- Optimisation of Critical Infrastructure Protection: The SiVe Project on Airport Security -- Cyber-Critical Infrastructure Protection Using Real-Time Payload-Based Anomaly Detection -- Decision Aid Tool and Ontology-Based Reasoning for Critical Infrastructure Vulnerabilities and Threats Analysis -- Application Filters for TCP/IP Industrial Automation Protocols -- Web Browser Security Update Effectiveness -- State-Based Network Intrusion Detection Systems for SCADA Protocols: A Proof of Concept -- Towards Early Warning Systems – Challenges, Technologies and Architecture -- CII Protection - Lessons for Developing Countries: South Africa as a Case Study -- Energy Theft in the Advanced Metering Infrastructure -- Current Capabilities, Requirements and a Proposed Strategy for Interdependency Analysis in the UK -- Stochastic Modelling of the Effects of Interdependencies between Critical Infrastructure.
520 _aThis book constitutes the proceedings of the 4th International Workshop on Critical Information Infrastructures Security, CRITIS 2009, held in Bonn, Germany, during September 30 to October 2, 2009.
650 0 _aComputer science.
650 0 _aOperating systems (Computers).
650 0 _aComputer Communication Networks.
650 0 _aSoftware engineering.
650 0 _aComputer system performance.
650 0 _aData encryption (Computer science).
650 0 _aInformation Systems.
650 1 4 _aComputer Science.
650 2 4 _aPerformance and Reliability.
650 2 4 _aComputer Communication Networks.
650 2 4 _aManagement of Computing and Information Systems.
650 2 4 _aData Encryption.
650 2 4 _aSpecial Purpose and Application-Based Systems.
650 2 4 _aSystem Performance and Evaluation.
700 1 _aBloomfield, Robin.
_eeditor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9783642143786
830 0 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v6027
856 4 0 _uhttp://dx.doi.org/10.1007/978-3-642-14379-3
912 _aZDB-2-SCS
912 _aZDB-2-LNC
999 _c112462
_d112462