派博傳思國(guó)際中心

標(biāo)題: Titlebook: Critical Information Infrastructures Security; 11th International C Grigore Havarneanu,Roberto Setola,Stephen Wolthuse Conference proceedin [打印本頁]

作者: graphic    時(shí)間: 2025-3-21 19:59
書目名稱Critical Information Infrastructures Security影響因子(影響力)




書目名稱Critical Information Infrastructures Security影響因子(影響力)學(xué)科排名




書目名稱Critical Information Infrastructures Security網(wǎng)絡(luò)公開度




書目名稱Critical Information Infrastructures Security網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Critical Information Infrastructures Security被引頻次




書目名稱Critical Information Infrastructures Security被引頻次學(xué)科排名




書目名稱Critical Information Infrastructures Security年度引用




書目名稱Critical Information Infrastructures Security年度引用學(xué)科排名




書目名稱Critical Information Infrastructures Security讀者反饋




書目名稱Critical Information Infrastructures Security讀者反饋學(xué)科排名





作者: Accomplish    時(shí)間: 2025-3-21 23:58
Waldbauliche Forschungen und Betrachtungenate of their water management installations and processes. In this paper we present our benchmark approach to the security of ICS. Moreover, we discuss the major results of the benchmark as well as a cyber security simulator that was developed to raise awareness and develop further knowledge on the
作者: Between    時(shí)間: 2025-3-22 04:03
Developing a Cyber Incident Communication Management Exercise for CI Stakeholders, department, and management, respectively. In future, these structures can be used as the framework to build an ICS-Security Incident Response Team (ICS-SIRT), which would strengthen cooperation among CI stakeholders.
作者: Benzodiazepines    時(shí)間: 2025-3-22 06:04
Cyber Targets Water Management,ate of their water management installations and processes. In this paper we present our benchmark approach to the security of ICS. Moreover, we discuss the major results of the benchmark as well as a cyber security simulator that was developed to raise awareness and develop further knowledge on the
作者: 印第安人    時(shí)間: 2025-3-22 08:45
Stealth Low-Level Manipulation of Programmable Logic Controllers I/O by Pin Control Exploitation,yed in critical infrastructures, the I/O of PLCs has to be both reliable and secure. PLCs I/O like other embedded devices are controlled by a pin based approach. In this paper, we investigate the security implications of the PLC pin control system. In particular, we show how an attacker can tamper w
作者: 狂熱語言    時(shí)間: 2025-3-22 14:04

作者: 狂熱語言    時(shí)間: 2025-3-22 20:48

作者: Phonophobia    時(shí)間: 2025-3-22 21:40
Cyber Targets Water Management,ts are involved in water management by controlling the water level to protect the land from flooding and to allow inland shipping. Another important water management task is the purification of waste water and sewage. To fulfill these tasks, such organizations depend on information and communication
作者: 多產(chǎn)子    時(shí)間: 2025-3-23 04:21

作者: 通情達(dá)理    時(shí)間: 2025-3-23 08:59

作者: obviate    時(shí)間: 2025-3-23 11:47
A Synthesis of Optimization Approaches for Tackling Critical Information Infrastructure Survivabili paper focuses on a specific category of CI: Critical Information Infrastructures (CII), which are commonly deemed to include communication and information networks. The majority of all the other CI (e.g. electricity, fuel and water supply, transport systems, etc.) are crucially dependent on CII. Th
作者: 痛苦一下    時(shí)間: 2025-3-23 14:15

作者: 施加    時(shí)間: 2025-3-23 21:56

作者: Morbid    時(shí)間: 2025-3-23 23:12
A Methodology for Monitoring and Control Network Design,inter-connected “system of systems” perspective. This has brought significant economical and operational benefits, but it also provided new opportunities for malicious actors targeting critical ICS. In this work we adopt a Cyber Attack Impact Assessment (CAIA) technique to develop a systematic metho
作者: 脾氣暴躁的人    時(shí)間: 2025-3-24 06:21
Effective Defence Against Zero-Day Exploits Using Bayesian Networks,ainst ICS can cause destructive physical damage. Zero-day exploits (i.e. unknown exploits) have demonstrated their essential contributions to causing such damage by Stuxnet. In this work, we investigate the possibility of improving the tolerance of a system against zero-day attacks by defending agai
作者: bromide    時(shí)間: 2025-3-24 09:35

作者: 突襲    時(shí)間: 2025-3-24 12:37

作者: 卷發(fā)    時(shí)間: 2025-3-24 16:36
Dynamic Risk Analyses and Dependency-Aware Root Cause Model for Critical Infrastructures,s can have devastating consequences, while foreseeing the overall impact of a particular incident is not straight-forward at all and goes beyond performing a simple risk analysis. This work presents a graph-based approach for conducting dynamic risk analyses, which are programmatically generated fro
作者: Adenocarcinoma    時(shí)間: 2025-3-24 21:15
Selecting Privacy Solutions to Prioritise Control in Smart Metering Systems,s to have better control over energy usage. However, it also has some privacy issues with respect to the privacy of the customers when analysing their consumption data. In this paper we review the main privacy-preserving techniques that have been proposed and compare their efficiency, to accurately
作者: Intellectual    時(shí)間: 2025-3-25 01:49
A Six-Step Model for Safety and Security Analysis of Cyber-Physical Systems,archies) of a CPS, namely, functions, structure, failures, safety countermeasures, cyber-attacks, and security countermeasures. The inter-dependencies between these dimensions are defined using a set of relationship matrices. SSM enables comprehensive analysis of CPS safety and security, as it uses
作者: Iniquitous    時(shí)間: 2025-3-25 04:50
Availability Study of the Italian Electricity SCADA System in the Cloud,ading, while the utilities are still evaluating the cloud adoption. For electric utility companies, reasons for moving in the cloud can be traced to the need of storing, accessing and analyzing a huge amount of records collected from their new smart meters, and managing grid-connected small-scale de
作者: Ethics    時(shí)間: 2025-3-25 10:16

作者: bifurcate    時(shí)間: 2025-3-25 11:48
Tamper Resistant Secure Digital Silo for Log Storage in Critical Infrastructures,n incident, and subsequently allows investigators to analyze attack behaviour, impact of the incident, source of attacks, risk factors, and if necessary it should also offer the procurement of admissible proof at trial. Recent advancements in hardware based security allows us to build such storage m
作者: 騷動(dòng)    時(shí)間: 2025-3-25 15:52

作者: 使殘廢    時(shí)間: 2025-3-25 23:25
,Die Th?tigkeit des Wassers im Waldboden,d approach. In this paper, we investigate the security implications of the PLC pin control system. In particular, we show how an attacker can tamper with the integrity and availability of PLCs I/O by exploiting certain pin control operations and the lack of hardware interrupts associated to them.
作者: chemical-peel    時(shí)間: 2025-3-26 01:31

作者: CHART    時(shí)間: 2025-3-26 08:18

作者: acolyte    時(shí)間: 2025-3-26 10:25
Waldbauliche Forschungen und Betrachtungenon-sequential integration of safety and security, related to the order in which safety and security risks are assessed. This study provides a basis for developing more effective integrated safety and security risk assessment methods in the future.
作者: Angioplasty    時(shí)間: 2025-3-26 16:21
,Die Th?tigkeit des Wassers im Waldboden,e launched on SWaT while data collection continued. The dataset reported here contains the physical properties related to the plant and the water treatment process, as well as network traffic in the testbed. The data of both physical properties and network traffic contains attacks that were created and generated by our research team.
作者: 不能和解    時(shí)間: 2025-3-26 19:11

作者: Agronomy    時(shí)間: 2025-3-26 21:47
,Beschreibung ausgeführter Kraftanlagen,ated approach to changing their . strategies to maximize surplus power gains. We propose an . mechanism that makes use of allocative efficiency and message overheads to detect and mitigate cheating forms.
作者: PLIC    時(shí)間: 2025-3-27 04:59
,Beschreibung ausgeführter Kraftanlagen,y, privacy and system downtime. In this work, we focus on the latter aspect analyzing the availability of the SCADA system managing the Italian power transmission network for different possible adoptions of the cloud.
作者: 沖突    時(shí)間: 2025-3-27 08:10
https://doi.org/10.1007/978-3-662-39985-9and impact analysis (NESCOR failure scenarios), and assess their applicability and utility in URS. We use a publicly-available software tool that supports failure scenario analysis to assess example failures on railway supervisory control systems and identify directions for further improving railway failure scenario analysis.
作者: gratify    時(shí)間: 2025-3-27 09:46
On Auxiliary Entity Allocation Problem in Multi-layered Interdependent Critical Infrastructures,de an optimal solution using Integer Linear program and a heuristic for a restricted case. The efficacy of heuristic with respect to the optimal is judged through experimentation using real world data sets with heuristic deviating . from optimal on average.
作者: 咯咯笑    時(shí)間: 2025-3-27 15:07
Integrated Safety and Security Risk Assessment Methods: A Survey of Key Characteristics and Applicaon-sequential integration of safety and security, related to the order in which safety and security risks are assessed. This study provides a basis for developing more effective integrated safety and security risk assessment methods in the future.
作者: 埋葬    時(shí)間: 2025-3-27 20:45
A Dataset to Support Research in the Design of Secure Water Treatment Systems,e launched on SWaT while data collection continued. The dataset reported here contains the physical properties related to the plant and the water treatment process, as well as network traffic in the testbed. The data of both physical properties and network traffic contains attacks that were created and generated by our research team.
作者: entreat    時(shí)間: 2025-3-27 22:54

作者: 火光在搖曳    時(shí)間: 2025-3-28 02:10
Power Auctioning in Resource Constrained Micro-grids: Cases of Cheating,ated approach to changing their . strategies to maximize surplus power gains. We propose an . mechanism that makes use of allocative efficiency and message overheads to detect and mitigate cheating forms.
作者: 征兵    時(shí)間: 2025-3-28 06:48
Availability Study of the Italian Electricity SCADA System in the Cloud,y, privacy and system downtime. In this work, we focus on the latter aspect analyzing the availability of the SCADA system managing the Italian power transmission network for different possible adoptions of the cloud.
作者: TIA742    時(shí)間: 2025-3-28 12:10
Railway System Failure Scenario Analysis,and impact analysis (NESCOR failure scenarios), and assess their applicability and utility in URS. We use a publicly-available software tool that supports failure scenario analysis to assess example failures on railway supervisory control systems and identify directions for further improving railway failure scenario analysis.
作者: Palliation    時(shí)間: 2025-3-28 15:35
Conference proceedings 2017016, held in Paris, France, in October 2016.. .The 22 full papers and 8 short papers presented were carefully reviewed and selected from 58 submissions. They present?the most recent innovations, trends, results,?experiences and concerns in selected perspectives of critical information infrastructure
作者: 吹牛大王    時(shí)間: 2025-3-28 20:54

作者: 過于平凡    時(shí)間: 2025-3-29 01:21
Waldbauliche Forschungen und Betrachtungengy. Experiments comprising the Tennessee Eastman chemical plant, the IEEE 14-bus electricity grid and the IEEE 300-bus New England electricity grid show the applicability and effectiveness of the developed methodology.
作者: Tailor    時(shí)間: 2025-3-29 04:14

作者: acquisition    時(shí)間: 2025-3-29 07:14

作者: ARENA    時(shí)間: 2025-3-29 11:53
Betriebskosten von Kraftanlagen,measures might have on the system. A water treatment system is used as an example to illustrate how the proposed model could serve as a useful tool in the safety and security modeling and analysis of critical infrastructures.
作者: 個(gè)阿姨勾引你    時(shí)間: 2025-3-29 18:19
Betriebskosten von Kraftanlagen,o address those problems. Finally, we present our solution with commercial off-the-shelf (COTS) hardware based security technologies, which assures that the system is practical and suitable for integration with current systems. In order to show the feasibility of design, we also implement the solution using open source platforms.
作者: Coronary    時(shí)間: 2025-3-29 20:41

作者: 山間窄路    時(shí)間: 2025-3-30 03:04

作者: Multiple    時(shí)間: 2025-3-30 06:12

作者: sultry    時(shí)間: 2025-3-30 09:23
Using Incentives to Foster Security Information Sharing and Cooperation: A General Theory and Appliformation Security. The SIS model was used to analyse the incentive mechanisms that most effectively support SIS for CIP. Our work contribute to an understanding of the free rider problem that plagues the provision of the public good that is cybersecurity, and offer clues to its mitigation.
作者: SPER    時(shí)間: 2025-3-30 13:47

作者: 松雞    時(shí)間: 2025-3-30 17:50
Tamper Resistant Secure Digital Silo for Log Storage in Critical Infrastructures,o address those problems. Finally, we present our solution with commercial off-the-shelf (COTS) hardware based security technologies, which assures that the system is practical and suitable for integration with current systems. In order to show the feasibility of design, we also implement the solution using open source platforms.
作者: 沙草紙    時(shí)間: 2025-3-30 22:16
Stealth Low-Level Manipulation of Programmable Logic Controllers I/O by Pin Control Exploitation,d approach. In this paper, we investigate the security implications of the PLC pin control system. In particular, we show how an attacker can tamper with the integrity and availability of PLCs I/O by exploiting certain pin control operations and the lack of hardware interrupts associated to them.
作者: ascetic    時(shí)間: 2025-3-31 01:40

作者: 或者發(fā)神韻    時(shí)間: 2025-3-31 05:20
Conference proceedings 2017s. They present?the most recent innovations, trends, results,?experiences and concerns in selected perspectives of critical information infrastructure protection covering the range from?small-scale cyber-physical systems security via information infrastructures?and their interaction with national and international infrastructures..
作者: ALIEN    時(shí)間: 2025-3-31 11:06
,Beschreibung ausgeführter Kraftanlagen,rms of sensor placement problem using an . approach. The obtained results confirm the effectiveness of the proposed method in supporting security experts in both the design and reconfiguration of a surveillance system, in order to increase the asset security level.
作者: Sciatica    時(shí)間: 2025-3-31 16:24

作者: 同來核對(duì)    時(shí)間: 2025-3-31 19:38





歡迎光臨 派博傳思國(guó)際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
宜宾市| 大姚县| 景泰县| 宜州市| 礼泉县| 芜湖市| 图木舒克市| 巴东县| 北碚区| 佛坪县| 应用必备| 平阳县| 秦皇岛市| 边坝县| 平和县| 沙河市| 大同市| 潍坊市| 阿克苏市| 佛冈县| 交口县| 纳雍县| 呼玛县| 班戈县| 融水| 桦川县| 浏阳市| 思南县| 凉山| 瓦房店市| 崇左市| 黑水县| 合水县| 乌鲁木齐县| 普格县| 琼结县| 福贡县| 奉节县| 樟树市| 辉县市| 连平县|