標(biāo)題: Titlebook: Critical Information Infrastructures Security; 12th International C Gregorio D‘Agostino,Antonio Scala Conference proceedings 2018 Springer [打印本頁] 作者: Julienne 時(shí)間: 2025-3-21 17:23
書目名稱Critical Information Infrastructures Security影響因子(影響力)
書目名稱Critical Information Infrastructures Security影響因子(影響力)學(xué)科排名
書目名稱Critical Information Infrastructures Security網(wǎng)絡(luò)公開度
書目名稱Critical Information Infrastructures Security網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Critical Information Infrastructures Security被引頻次
書目名稱Critical Information Infrastructures Security被引頻次學(xué)科排名
書目名稱Critical Information Infrastructures Security年度引用
書目名稱Critical Information Infrastructures Security年度引用學(xué)科排名
書目名稱Critical Information Infrastructures Security讀者反饋
書目名稱Critical Information Infrastructures Security讀者反饋學(xué)科排名
作者: 擁擠前 時(shí)間: 2025-3-21 23:26 作者: enhance 時(shí)間: 2025-3-22 04:28
Towards a Common Vocabulary for Crisis Management Scenarios,ften have limited time to react on unexpected events. Hence, sufficient training during the preparedness phase of crisis management plays a vital role for correct behaviours under time pressure. Significant efforts in the research community have been invested to develop innovative IT-based crisis ma作者: 五行打油詩 時(shí)間: 2025-3-22 05:49 作者: 勛章 時(shí)間: 2025-3-22 11:59
Timing-Based Anomaly Detection in SCADA Networks,use of request-response communication in polling, SCADA traffic exhibits stable and predictable communication patterns. This paper provides a timing-based anomaly detection system that uses the statistical attributes of the communication patterns. This system is validated with three datasets, one ge作者: 星星 時(shí)間: 2025-3-22 16:18
Operational Resilience Metrics for a Complex Electrical Network,chieved as it allows the network to withstand all types of perturbations affecting its functions and allowing to provide its service with continuity. Resilience comes out from a combination of a number of specific properties related to both intrinsic network technologies and to operator’s management作者: 星星 時(shí)間: 2025-3-22 18:50 作者: 范例 時(shí)間: 2025-3-22 22:25 作者: entice 時(shí)間: 2025-3-23 04:36
Role of Urban Interactions and Damage in Seismic Resilience of Historical Centers,e the presence of many historical assets makes these places highly vulnerable and exposed..Accordingly, historical centers need to be managed in order to guarantee proper resilience levels. This is paramount in light of the increasing rate of occurrence of adverse natural and man-made events, above 作者: 朝圣者 時(shí)間: 2025-3-23 06:18
Towards Blockchain-Based Collaborative Intrusion Detection Systems,hanisms. Collaborative IDSs (CIDSs) are such an approach; they combine the knowledge of a plethora of monitors to generate a holistic picture of the monitored network. Despite the research done in this field, CIDSs still face a number of fundamental challenges, especially regarding maintaining trust作者: 取之不竭 時(shí)間: 2025-3-23 11:25 作者: nocturnal 時(shí)間: 2025-3-23 14:33
De-Synchronisation Attack Modelling in Real-Time Protocols Using Queue Networks: Attacking the ISO/ hard real-time constraints to ensure the safety of the systems they are deployed on. These systems are highly sensitive to Quality of Service (QoS) violations, but it is not always clear whether a compliant implementation will satisfy the stated QoS of the standard. This paper proposes a framework 作者: maudtin 時(shí)間: 2025-3-23 21:44
Assessing Urban Rail Transit Systems Vulnerability: Metrics vs. Interdiction Models,ucial role that railway infrastructures play in economic development, productivity and social well-being of communities, evaluating their vulnerability and identifying their most critical components is of paramount importance. Two main approaches can be deployed to assess transport infrastructure vu作者: 抱怨 時(shí)間: 2025-3-24 02:02
Automatically Generating Security Models from System Models to Aid in the Evaluation of AMI Deploym often difficult for those who do not possess a security modeling background to construct such models. To overcome this challenge we present a case study that demonstrates a novel approach that uses an ontology-assisted model generator to automatically create ADVISE security models from intuitive ha作者: forestry 時(shí)間: 2025-3-24 05:40
A Gamified Approach to Participatory Modelling of Water System Risks,e often located in different places and have limited time to be involved in a strenuous knowledge elicitation project. In this context we propose a gamified and participatory modelling approach to boost engagement of people involved in risk assessment related to critical infrastructures. The approac作者: 開始發(fā)作 時(shí)間: 2025-3-24 09:35
What the Stack? On Memory Exploitation and Protection in Resource Constrained Automotive Systems,tion in recent years. One of the most dangerous kinds of security relevant software bugs are related to memory corruption, since their successful exploitation would grant the attacker a high degree of influence over the compromised system. Such vulnerabilities and the corresponding mitigation techni作者: fledged 時(shí)間: 2025-3-24 13:50 作者: 天氣 時(shí)間: 2025-3-24 15:08 作者: judiciousness 時(shí)間: 2025-3-24 22:57
Conference proceedings 2018present?innovative research and explore new challenges in the field of critical information infrastructures protection (C(I)IP) and deal with multi-disciplinary approaches to relevant C(I)IP problems.?.作者: Arteriography 時(shí)間: 2025-3-25 02:40 作者: 怎樣才咆哮 時(shí)間: 2025-3-25 06:23
https://doi.org/10.1007/978-3-662-35050-8 whose impact needs to be understood. As a result, this paper provides an analysis of the evolution of these cyber-security issues and the requirements that must be satisfied by intrusion detection defense mechanisms in this context.作者: 機(jī)警 時(shí)間: 2025-3-25 09:07 作者: 大范圍流行 時(shí)間: 2025-3-25 13:13
,Allgemeines über Wasserkraftmaschinen,h is supported by a risk management system based on the ICE-CREAM framework, including the CREAM (CREAtivity Machine) software for computational creativity and the ICE (Innovation through Collaborative Environment) mobile app developed for iOS. Insights on risk assessment of water systems are also discussed.作者: 階層 時(shí)間: 2025-3-25 19:54
https://doi.org/10.1007/978-3-662-35360-8te the feasibility of this method, we show it is possible to profile and distinguish between even small changes in programs on Siemens S7-317 PLCs, using methods from cryptographic side-channel analysis.作者: 懦夫 時(shí)間: 2025-3-25 20:22 作者: breadth 時(shí)間: 2025-3-26 01:15
Serotherapeutische Versuche bei Gasbrand,t of tools that can facilitate adaptation assessment and risk planning. Our goal is to present a multi-faceted taxonomy and analysis of available Climate Change Adaptation tools which can support transport sector for risk management policies.作者: fringe 時(shí)間: 2025-3-26 06:43 作者: 帶傷害 時(shí)間: 2025-3-26 08:52 作者: 騙子 時(shí)間: 2025-3-26 14:26
Analysis and Classification of Adaptation Tools for Transport Sector Adaptation Planning,t of tools that can facilitate adaptation assessment and risk planning. Our goal is to present a multi-faceted taxonomy and analysis of available Climate Change Adaptation tools which can support transport sector for risk management policies.作者: 言行自由 時(shí)間: 2025-3-26 17:29 作者: 逃避現(xiàn)實(shí) 時(shí)間: 2025-3-26 23:48
Serotherapeutische Versuche bei Gasbrand,e proposed approach, spanning tree search algorithms, load shedding schemes and optimization methods are applied to find optimal restoration strategies on a standard IEEE 30-node system and on a 70-node distribution system with critical loads.作者: PUT 時(shí)間: 2025-3-27 03:16
Weitere Untersuchungen über Gas?dem-Serumetwork of the city of Roma) which accounts for most of the parameters influencing the effective resilience of the network. Results confirm that the model can appropriately handle a real network and provide valuable insights to electrical operators.作者: 美色花錢 時(shí)間: 2025-3-27 07:03
,Allgemeines über Wasserkraftmaschinen,E) systems of vehicles with almost no emphasis on the driver itself. To this end, we propose a holistic approach based on the ISO 26262 standard that not only considers the E/E systems of the vehicle but also the driver’s behaviour. We illustrate the utility of the approach with an example from the automotive domain.作者: 轎車 時(shí)間: 2025-3-27 12:44
Resilience of Electrical Distribution Systems with Critical Load Prioritization,e proposed approach, spanning tree search algorithms, load shedding schemes and optimization methods are applied to find optimal restoration strategies on a standard IEEE 30-node system and on a 70-node distribution system with critical loads.作者: Landlocked 時(shí)間: 2025-3-27 14:25 作者: 高爾夫 時(shí)間: 2025-3-27 18:41 作者: 欄桿 時(shí)間: 2025-3-27 21:59
Conference proceedings 2018ld in Lucca, Italy, in October 2017.. .The 21 full papers and 4 short papers presented were carefully reviewed and selected from 63 submissions. They present?innovative research and explore new challenges in the field of critical information infrastructures protection (C(I)IP) and deal with multi-di作者: exclamation 時(shí)間: 2025-3-28 02:40
0302-9743 IS 201, held in Lucca, Italy, in October 2017.. .The 21 full papers and 4 short papers presented were carefully reviewed and selected from 63 submissions. They present?innovative research and explore new challenges in the field of critical information infrastructures protection (C(I)IP) and deal wit作者: 削減 時(shí)間: 2025-3-28 07:12 作者: 基因組 時(shí)間: 2025-3-28 14:25 作者: Vsd168 時(shí)間: 2025-3-28 16:32
A Gamified Approach to Participatory Modelling of Water System Risks,h is supported by a risk management system based on the ICE-CREAM framework, including the CREAM (CREAtivity Machine) software for computational creativity and the ICE (Innovation through Collaborative Environment) mobile app developed for iOS. Insights on risk assessment of water systems are also discussed.作者: pacific 時(shí)間: 2025-3-28 20:12 作者: 偶像 時(shí)間: 2025-3-29 02:45 作者: 遺棄 時(shí)間: 2025-3-29 03:31 作者: 夾死提手勢 時(shí)間: 2025-3-29 08:26
DMA Optimal Layout for Protection of Water Distribution Networks from Malicious Attack,en studied, simulating the introduction of potassium cyanide with a backflow attack into water system. As protection technique, the water network partitioning (WNP) has been adopted in order to improve the management and also to reduce the extent of damage showing a dual use-value. WNP reveals to be作者: 純樸 時(shí)間: 2025-3-29 14:07 作者: Pericarditis 時(shí)間: 2025-3-29 17:25 作者: 殺子女者 時(shí)間: 2025-3-29 23:20 作者: 緯線 時(shí)間: 2025-3-30 00:22 作者: 暫時(shí)過來 時(shí)間: 2025-3-30 05:57 作者: 公理 時(shí)間: 2025-3-30 08:18 作者: FLEET 時(shí)間: 2025-3-30 14:26 作者: RENAL 時(shí)間: 2025-3-30 20:26 作者: 阻撓 時(shí)間: 2025-3-31 00:27
,Wechselr?derberechnung für Drehb?nke,resilience indices..The real case study of the inner city Naples is proposed to show the methodology. Results are discussed with regards to seismic scenario analysis for different intensity levels. Hence, the trend of the resilience indices against the event magnitude is observed, in case different 作者: Decimate 時(shí)間: 2025-3-31 01:39
https://doi.org/10.1007/978-3-662-35050-8significant benefit for CIDSs; namely for the improvement of trust between monitors, and for providing accountability and consensus. For this, we study the related work and highlight the research gaps and challenges towards such a task. Finally, we propose a generic architecture for the incorporatio作者: Heterodoxy 時(shí)間: 2025-3-31 08:00
https://doi.org/10.1007/978-3-662-35050-8nchronisation attacks. The model is validated by a tool allowing automation of queue network analysis, and is used to demonstrate a possible breach of the QoS guarantees of the ISO/IEC 61850-7-2 substation automation standard with a de-synchronisation attack.作者: ethnology 時(shí)間: 2025-3-31 11:57 作者: mucous-membrane 時(shí)間: 2025-3-31 13:31
,Allgemeines über Wasserkraftmaschinen,imple and well-known measures like stack canaries, non-executable RAM, and to a limited extent memory layout randomization can also be deployed in this domain?to significantly raise the bar for successful exploitation.作者: 輕觸 時(shí)間: 2025-3-31 18:24 作者: arthroscopy 時(shí)間: 2025-3-31 23:48 作者: BALE 時(shí)間: 2025-4-1 03:52 作者: 脆弱帶來 時(shí)間: 2025-4-1 09:48
https://doi.org/10.1007/978-3-319-99843-5adaptive control systems; artificial intelligence; authentication; bayesian networks; computer architect作者: 安撫 時(shí)間: 2025-4-1 10:53 作者: 拾落穗 時(shí)間: 2025-4-1 16:13 作者: Noctambulant 時(shí)間: 2025-4-1 21:58