標(biāo)題: Titlebook: Critical Information Infrastructures Security; 8th International Wo Eric Luiijf,Pieter Hartel Conference proceedings 2013 Springer Internat [打印本頁(yè)] 作者: Braggart 時(shí)間: 2025-3-21 19:11
書(shū)目名稱(chēng)Critical Information Infrastructures Security影響因子(影響力)
書(shū)目名稱(chēng)Critical Information Infrastructures Security影響因子(影響力)學(xué)科排名
書(shū)目名稱(chēng)Critical Information Infrastructures Security網(wǎng)絡(luò)公開(kāi)度
書(shū)目名稱(chēng)Critical Information Infrastructures Security網(wǎng)絡(luò)公開(kāi)度學(xué)科排名
書(shū)目名稱(chēng)Critical Information Infrastructures Security被引頻次
書(shū)目名稱(chēng)Critical Information Infrastructures Security被引頻次學(xué)科排名
書(shū)目名稱(chēng)Critical Information Infrastructures Security年度引用
書(shū)目名稱(chēng)Critical Information Infrastructures Security年度引用學(xué)科排名
書(shū)目名稱(chēng)Critical Information Infrastructures Security讀者反饋
書(shū)目名稱(chēng)Critical Information Infrastructures Security讀者反饋學(xué)科排名
作者: 先鋒派 時(shí)間: 2025-3-21 21:10
Optimization Models in a Smart Tool for the Railway Infrastructure Protection optimal covering integer programming models to be used in designing the security system for a Railway Infrastructure. Two models are presented and tested on a railway station scheme. The results highlight the role that the optimization models can fulfill in the design of an effective security system.作者: glacial 時(shí)間: 2025-3-22 00:58 作者: nautical 時(shí)間: 2025-3-22 06:22
Eric Luiijf,Pieter HartelState-of-the-art research.Up-to-date results.Unique visibility作者: 儲(chǔ)備 時(shí)間: 2025-3-22 11:52 作者: 安定 時(shí)間: 2025-3-22 16:30
Critical Information Infrastructures Security978-3-319-03964-0Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: 安定 時(shí)間: 2025-3-22 18:21
yze the most significant threats posed by solar wind in terms of impact due to both direct consequences on satellite and critical infrastructure so as the subsequent domino effects. To this end we provide a model based on the CISIA platform with a case study related to the area of Rome, Italy.作者: AMITY 時(shí)間: 2025-3-22 21:24
,Drehstromz?hler für Dreileiter-Anlagen, optimal covering integer programming models to be used in designing the security system for a Railway Infrastructure. Two models are presented and tested on a railway station scheme. The results highlight the role that the optimization models can fulfill in the design of an effective security system.作者: 跳脫衣舞的人 時(shí)間: 2025-3-23 03:36
https://doi.org/10.1007/978-3-319-03964-0industrial control systems; jamming attacks; privacy; risk analysis; smart cities作者: commute 時(shí)間: 2025-3-23 07:14 作者: CHECK 時(shí)間: 2025-3-23 09:42 作者: 是限制 時(shí)間: 2025-3-23 17:17 作者: Conducive 時(shí)間: 2025-3-23 18:27
tabase systems. Security aspects of such systems have been well-studied, but they have mostly concentrated on privacy and access control issues. In this paper, we take a closer look at the availability problems caused by the network failures, Denial-of-Service attacks, etc. We take the X-Road infras作者: 彈藥 時(shí)間: 2025-3-24 00:32 作者: 不成比例 時(shí)間: 2025-3-24 02:31 作者: hurricane 時(shí)間: 2025-3-24 10:28
yze the most significant threats posed by solar wind in terms of impact due to both direct consequences on satellite and critical infrastructure so as the subsequent domino effects. To this end we provide a model based on the CISIA platform with a case study related to the area of Rome, Italy.作者: 排出 時(shí)間: 2025-3-24 13:24
,Der Alkohol und seine Bek?mpfung,tric frequency declines from its nominal value. This is a highly unwanted situation that limits machine and other power system auxiliaries life time. Contemporary power systems employ conventional load shedding practices as a last resort, in order to achieve frequency stability. However, these pract作者: hemorrhage 時(shí)間: 2025-3-24 18:04
,Der Alkohol und seine Bek?mpfung,ant new risk to the energy sector that were not present in the power grids that operated in isolation. The data that is generated in the smart metering systems can possibly harm its stakeholders. Hence it is important to protect all the stakeholders by providing effective controls to the vulnerable 作者: Aphorism 時(shí)間: 2025-3-24 22:35
,Der Alkohol und seine Bek?mpfung,n lie about its physical behavior and remain undetected by its peers. To avoid this scenario, physical attestation is introduced as a distributed mechanism to validate the behavior of a cyber process using physical measurements. A physical attestation protocol is developed for the smart grid, and th作者: 放逐 時(shí)間: 2025-3-25 01:09
,Der Alkohol und seine Bek?mpfung, privileges that each attack requires as a result of the previous attacks in the sequence. This paper presents QSec, a tool to support decision on the infrastructure security that queries a database with information on global vulnerabilities and the corresponding attack sequences. QSec can return in作者: Legend 時(shí)間: 2025-3-25 05:21 作者: 一美元 時(shí)間: 2025-3-25 11:03
,Aquae aromaticae — aromatische W?sser,obal scale. Due to their population impact, attacks against their interconnected components can create serious damages and performance degradation which eventually can result in a societal crisis. Therefore it is crucial to effectively and timely protect these high performance - critical systems aga作者: cogitate 時(shí)間: 2025-3-25 14:09
,Aquae aromaticae — aromatische W?sser,regarded as Critical Infrastructures (CIs). Due to the increasing use of Commercial-Off-The-Shelf (COTS) IT products and connectivity offerings, CIs have become an attractive target for cyber-attacks. A successful attack could have significant consequences. An important step in securing Critical Inf作者: 不能仁慈 時(shí)間: 2025-3-25 19:15 作者: Mnemonics 時(shí)間: 2025-3-25 22:23 作者: Insensate 時(shí)間: 2025-3-26 00:49
,Drehstromz?hler für Dreileiter-Anlagen, optimal covering integer programming models to be used in designing the security system for a Railway Infrastructure. Two models are presented and tested on a railway station scheme. The results highlight the role that the optimization models can fulfill in the design of an effective security syste作者: 無(wú)瑕疵 時(shí)間: 2025-3-26 07:15
tion to face every day’s threats. In order to make such protection holistic, covering all the needs of the systems from the point of view of security, prevention aspects and situational awareness should be considered. Researchers and Institutions stress the need of providing intelligent and automati作者: 新陳代謝 時(shí)間: 2025-3-26 11:31 作者: thalamus 時(shí)間: 2025-3-26 14:14
Security Challenges for Cooperative and Interconnected Mobility Systemsl connections, to the internet and Vehicular Ad hoc NETworks (VANETs). These trends form a combined security and safety threat, because recent research has demonstrated a large number of security gaps for in-vehicle systems and their external connections..This overview paper presents attacker incent作者: 燈絲 時(shí)間: 2025-3-26 19:23
Study of In-Data Centre Backup Offices for Banksn Japan) on 11. March 2011, a couple of thousand Automated Teller Machines (ATMs) were out of service for more than a week. Most banks’ critical operations were impacted due to the shortage of electrical power supply. The purpose of this study is to review those incidents from a banking operational 作者: 邊緣 時(shí)間: 2025-3-26 21:47 作者: Countermand 時(shí)間: 2025-3-27 05:05
Minimizing the Impact of In-band Jamming Attacks in WDM Optical Networksayer attacks. Since the signals in transparent WDM networks are transmitted all-optical, these networks are vulnerable against high-power jamming attacks. Due to crosstalk induced interactions among different connections, malicious high-power signals are spread in the network. To this end, it is nec作者: 銀版照相 時(shí)間: 2025-3-27 07:32 作者: 苦笑 時(shí)間: 2025-3-27 09:36
Analysis of Severe Space Weather on Critical Infrastructuresyze the most significant threats posed by solar wind in terms of impact due to both direct consequences on satellite and critical infrastructure so as the subsequent domino effects. To this end we provide a model based on the CISIA platform with a case study related to the area of Rome, Italy.作者: Ondines-curse 時(shí)間: 2025-3-27 16:25
A Plug and Play, Approximation-Based, Selective Load Shedding Mechanism for the Future Electrical Grtric frequency declines from its nominal value. This is a highly unwanted situation that limits machine and other power system auxiliaries life time. Contemporary power systems employ conventional load shedding practices as a last resort, in order to achieve frequency stability. However, these pract作者: Brain-Imaging 時(shí)間: 2025-3-27 18:35
A Framework for Risk Analysis in Smart Gridant new risk to the energy sector that were not present in the power grids that operated in isolation. The data that is generated in the smart metering systems can possibly harm its stakeholders. Hence it is important to protect all the stakeholders by providing effective controls to the vulnerable 作者: Arrhythmia 時(shí)間: 2025-3-27 23:36 作者: Canvas 時(shí)間: 2025-3-28 05:06 作者: 顯而易見(jiàn) 時(shí)間: 2025-3-28 07:14
Structural Controllability of Networks for Non-interactive Adversarial Vertex Removal maintained continuously. Recent work by Liu et al.has renewed interest in the seminal work by Lin on structural controllability, providing a graph-theoretical interpretation. This allows the identification of . capable of forcing the system into a desired state, which implies an obvious target for 作者: Prognosis 時(shí)間: 2025-3-28 14:06 作者: 扔掉掐死你 時(shí)間: 2025-3-28 17:16 作者: oxidize 時(shí)間: 2025-3-28 20:16
On the Feasibility of Device Fingerprinting in Industrial Control Systemsommon security tools and methodologies to fit the industrial environment. Fingerprinting of industrial devices is still an unexplored research field. In this paper we provide an overview of standard device fingerprinting techniques and an assessment on the application feasibility in ICS infrastructu作者: Debate 時(shí)間: 2025-3-28 23:40 作者: occurrence 時(shí)間: 2025-3-29 04:40
Optimization Models in a Smart Tool for the Railway Infrastructure Protection optimal covering integer programming models to be used in designing the security system for a Railway Infrastructure. Two models are presented and tested on a railway station scheme. The results highlight the role that the optimization models can fulfill in the design of an effective security syste作者: 粗俗人 時(shí)間: 2025-3-29 10:46
Towards Automatic Critical Infrastructure Protection through Machine Learningtion to face every day’s threats. In order to make such protection holistic, covering all the needs of the systems from the point of view of security, prevention aspects and situational awareness should be considered. Researchers and Institutions stress the need of providing intelligent and automati作者: IRS 時(shí)間: 2025-3-29 14:25
Using NATO Labelling to Support Controlled Information Sharing between Partners The stakeholders are typically located in different information security domains or even different countries. We present a content labelling solution developed by NATO for the purpose of enabling information sharing between different communities of interest and coalition participants in NATO operat作者: 呼吸 時(shí)間: 2025-3-29 18:01
Security Challenges for Cooperative and Interconnected Mobility Systemshallenges, overarching cyber security dilemmas are addressed, such as stimulating the economy vs. improving security. We expect that the discussed risks will be a challenge for research, industry and authorities in the coming years.作者: 語(yǔ)源學(xué) 時(shí)間: 2025-3-29 22:02
A Plug and Play, Approximation-Based, Selective Load Shedding Mechanism for the Future Electrical Grg that the proposed scheme is compared with. Furthermore, the mechanism under consideration provides smooth and seamless load restoration, preventing oscillations between shedding and restoration. It is robust to functional approximation errors, measurement noise and sudden load disturbances.作者: 黃油沒(méi)有 時(shí)間: 2025-3-30 01:38 作者: Painstaking 時(shí)間: 2025-3-30 05:06
Structural Controllability of Networks for Non-interactive Adversarial Vertex Removaltack strategies for multiple network models. As the construction of a PDS for a given graph is not unique, we further investigate different strategies for PDS construction, and provide a simulative evaluation.作者: Antigen 時(shí)間: 2025-3-30 12:18
Real Time Threat Prediction, Identification and Mitigation for Critical Infrastructure Protection Usl semantics based risk methodology that relies on real time behavioral analysis. The final prototype provides the CI operator with a decision tool (DST) that imprints the proposed approach and which is capable of alerting on new unknown threats, generate suggestions of the required counter-actions a作者: GOAD 時(shí)間: 2025-3-30 13:32 作者: 傳染 時(shí)間: 2025-3-30 18:44 作者: 成績(jī)上升 時(shí)間: 2025-3-31 00:32
The Foundations of International Lawhallenges, overarching cyber security dilemmas are addressed, such as stimulating the economy vs. improving security. We expect that the discussed risks will be a challenge for research, industry and authorities in the coming years.作者: restrain 時(shí)間: 2025-3-31 04:48
,Der Alkohol und seine Bek?mpfung,g that the proposed scheme is compared with. Furthermore, the mechanism under consideration provides smooth and seamless load restoration, preventing oscillations between shedding and restoration. It is robust to functional approximation errors, measurement noise and sudden load disturbances.作者: Orgasm 時(shí)間: 2025-3-31 06:11
,Der Alkohol und seine Bek?mpfung, public concerns. Consequently during risk analysis, different perspectives need to be considered. This article reports on an extensive analysis of risk management frameworks, which resulted in a framework specifically targeted at smart grid and smart metering systems. Perspective of risk analysis i作者: 孵卵器 時(shí)間: 2025-3-31 13:04 作者: Congeal 時(shí)間: 2025-3-31 15:00
,Aquae aromaticae — aromatische W?sser,l semantics based risk methodology that relies on real time behavioral analysis. The final prototype provides the CI operator with a decision tool (DST) that imprints the proposed approach and which is capable of alerting on new unknown threats, generate suggestions of the required counter-actions a作者: 不朽中國(guó) 時(shí)間: 2025-3-31 21:17
,Aquae aromaticae — aromatische W?sser,sks associated with advanced, multi-step cyber-attacks. In order to examine multi-step attacks that exploit chains of vulnerabilities, we map vulnerabilities into . and ., and use . for identifying advanced attacks and their path through a CII.作者: 性學(xué)院 時(shí)間: 2025-3-31 23:18
w situations and timely reacting in the face of threats and anomalies. To this end, we study the different levels of automation that the IDS can implement, and outline a methodology to endow critical scenarios with preventive automation. Finally, we analyze current solutions presented in the literat作者: Negotiate 時(shí)間: 2025-4-1 03:12 作者: recede 時(shí)間: 2025-4-1 07:16
Study of In-Data Centre Backup Offices for Bankstions were impacted due to the shortage of electrical power supply. The purpose of this study is to review those incidents from a banking operational point of view. The business continuity challenges have been analyzed and the resulting set of recommendations are discussed in this paper.作者: 變化無(wú)常 時(shí)間: 2025-4-1 10:55
Physical Attestation of Cyber Processes in the Smart Gridanism to validate the behavior of a cyber process using physical measurements. A physical attestation protocol is developed for the smart grid, and the protocol is proven to expose malicious cyber behavior. Through the use of physical attestation, the behavior of cyber processes in cyber-physical systems can be verified.