|
![]() |
|||
|
||||
OverviewFull Product DetailsAuthor: Jonathan Butts , Sujeet ShenoiPublisher: Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Imprint: Springer-Verlag Berlin and Heidelberg GmbH & Co. K Edition: Softcover reprint of the original 1st ed. 2014 Volume: 441 Weight: 4.511kg ISBN: 9783662526163ISBN 10: 3662526166 Pages: 276 Publication Date: 29 September 2016 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: Manufactured on demand ![]() We will order this item for you from a manufactured on demand supplier. Table of ContentsDetecting Integrity Attacks on Industrial Control Systems.- Detecting Malicious Software Execution in Programmable Logic Controllers Using Power Fingerprinting.- Timing of Cyber-Physical Attacks on Process Control Systems.- Recovery of Structural Controllability for Control Systems.- Industrial Control System Traffic Data Sets for Intrusion Detection Research.- An Industrial Control System Testbed Based on Emulation, Physical Devices and Simulation.- Evidence Theory for Cyber-Physical Systems.- An Automated Dialog System for Conducting Security Interviews for Access Control.- A Survey of Critical Infrastructure Security.- A System Dynamics Framework for Modeling Critical Infrastructure Resilience.- Reinforcement Learning Using Monte Carlo Policy Estimation for Disaster Mitigation.- Accuracy of Service Area Estimation Methods Used for Critical Infrastructure Recovery.- A Decision Support Tool for a Unified Homeland Security Strategy.- Assessing the Impact of Cyber Attacks on Wireless Sensor Nodes That Monitor Interdependent Physical Systems.- Assessing Potential Casualties in Critical Events.- Evaluation of Format-Preserving Encryption Algorithms for Critical Infrastructure Protection.- Asynchronous Binary Byzantine Consensus over Graphs with Power-Law Degree Sequence.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |