Critical Information Infrastructures Security 8th International Workshop, CRITIS 2013, Amsterdam, The Netherlands, September 16-18, 2013, Revised Selected Papers /

This book constitutes the thoroughly refereed post-proceedings of the 8th International Workshop on Critical Information Infrastructures Security, CRITIS 2013, held in Amsterdam, The Netherlands, in September 2013. The 16 revised full papers and 4 short papers were thoroughly reviewed and selected f...

Full description

Bibliographic Details
Corporate Author: SpringerLink (Online service)
Other Authors: Luiijf, Eric. (Editor), Hartel, Pieter. (Editor)
Format: Electronic
Language:English
Published: Cham : Springer International Publishing : Imprint: Springer, 2013.
Series:Lecture Notes in Computer Science, 8328
Subjects:
Online Access:View fulltext via EzAccess
LEADER 04074nam a22005175i 4500
001 24110
003 DE-He213
005 20151030201121.0
007 cr nn 008mamaa
008 131217s2013 gw | s |||| 0|eng d
020 # # |a 9783319039640  |9 978-3-319-03964-0 
024 7 # |a 10.1007/978-3-319-03964-0  |2 doi 
050 # 4 |a QA76.9.A25 
072 # 7 |a UR  |2 bicssc 
072 # 7 |a UTN  |2 bicssc 
072 # 7 |a COM053000  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
245 1 0 |a Critical Information Infrastructures Security  |b 8th International Workshop, CRITIS 2013, Amsterdam, The Netherlands, September 16-18, 2013, Revised Selected Papers /  |c edited by Eric Luiijf, Pieter Hartel.  |h [electronic resource] : 
264 # 1 |a Cham :  |b Springer International Publishing :  |b Imprint: Springer,  |c 2013. 
300 # # |a XIV, 219 p. 70 illus.  |b online resource. 
336 # # |a text  |b txt  |2 rdacontent 
337 # # |a computer  |b c  |2 rdamedia 
338 # # |a online resource  |b cr  |2 rdacarrier 
347 # # |a text file  |b PDF  |2 rda 
490 1 # |a Lecture Notes in Computer Science,  |v 8328  |x 0302-9743 ; 
505 0 # |a Security Challenges for Cooperative and Interconnected Mobility Systems -- Study of In-Data Centre Backup Offices for Banks -- Protecting a Federated Database Infrastructure against Denial-of-Service Attacks -- Minimizing the Impact of In-band Jamming Attacks in WDM Optical Networks -- The Role of Critical InfrastructuresỚ" Interdependencies on the Impacts Caused by Natural -- Analysis of Severe Space Weather on Critical Infrastructures -- A Plug and Play, Approximation-Based, Selective Load Shedding Mechanism for the Future Electrical Grid -- A Framework for Risk Analysis in Smart Grid: Perspective Based Approach -- Physical Attestation of Cyber Processes in the Smart Grid -- QSec: Supporting Security Decisions on an IT Infrastructure -- Structural Controllability of Networks for Non-interactive Adversarial Vertex Removal -- Real Time Threat Prediction, Identification and Mitigation for Critical Infrastructure Protection Using Semantics, Event Processing and Sequential Analysis -- Determining Risks from Advanced Multi-step Attacks to Critical Information Infrastructures -- On the Feasibility of Device Fingerprinting in Industrial Control Systems -- Bridging Dolev-Yao Adversaries and Control Systems with Time-Sensitive Channels -- An Indoor Contaminant Sensor Placement Toolbox for Critical Infrastructure Buildings -- Optimization Models in a Smart Tool for the Railway Infrastructure Protection -- Towards Automatic Critical Infrastructure Protection through Machine Learning -- Using NATO Labelling to Support Controlled Information Sharing between Partners -- A Framework for Privacy Protection and Usage Control of Personal Data in a Smart City Scenario. 
520 # # |a This book constitutes the thoroughly refereed post-proceedings of the 8th International Workshop on Critical Information Infrastructures Security, CRITIS 2013, held in Amsterdam, The Netherlands, in September 2013. The 16 revised full papers and 4 short papers were thoroughly reviewed and selected from 57 submissions. The papers are structured in the following topical sections: new challenges, natural disasters, smart grids, threats and risk, and SCADA/ICS and sensors. 
650 # 0 |a Computer science. 
650 # 0 |a Computer communication systems. 
650 # 0 |a Computer security. 
650 # 0 |a Computers and civilization. 
650 1 4 |a Computer Science. 
650 2 4 |a Systems and Data Security. 
650 2 4 |a Computers and Society. 
650 2 4 |a Computer Communication Networks. 
700 1 # |a Luiijf, Eric.  |e editor. 
700 1 # |a Hartel, Pieter.  |e editor. 
710 2 # |a SpringerLink (Online service) 
773 0 # |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9783319039633 
830 # 0 |a Lecture Notes in Computer Science,  |v 8328  |x 0302-9743 ; 
856 4 0 |u https://ezaccess.library.uitm.edu.my/login?url=http://dx.doi.org/10.1007/978-3-319-03964-0  |z View fulltext via EzAccess 
912 # # |a ZDB-2-SCS 
912 # # |a ZDB-2-LNC 
950 # # |a Computer Science (Springer-11645)