|
![]() |
|||
|
||||
OverviewThe information infrastructure – comprising computers, embedded devices, networks and software systems – is vital to operations in every sector: chemicals, commercial facilities, communications, critical manufacturing, dams, defense industrial base, emergency services, energy, financial services, food and agriculture, government facilities, healthcare and public health, information technology, nuclear reactors, materials and waste, transportation systems, and water and wastewater systems. Global business and industry, governments, indeed society itself, cannot function if major components of the critical information infrastructure are degraded, disabled or destroyed.Critical Infrastructure Protection XIV describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. Areas of coverage include: Aviation Infrastructure Security; Vehicle Infrastructure Security; Telecommunications Systems Security; Industrial Control Systems Security; Cyber-Physical Systems Security; and Infrastructure Modeling and Simulation. This book is the fourteenth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of sixteen edited papers from the Fourteenth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, held at SRI International, Arlington, Virginia, USA in the spring of 2020. Critical Infrastructure Protection XIV is an important resource for researchers, faculty members and graduate students, as well as for policy makers, practitioners and other individuals with interests in homeland security. Full Product DetailsAuthor: Jason Staggs , Sujeet ShenoiPublisher: Springer Nature Switzerland AG Imprint: Springer Nature Switzerland AG Edition: 1st ed. 2020 Volume: 596 Weight: 0.563kg ISBN: 9783030628420ISBN 10: 3030628426 Pages: 348 Publication Date: 16 December 2021 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: Manufactured on demand ![]() We will order this item for you from a manufactured on demand supplier. Table of ContentsAviation Infrastructure Security.- Cyber-Physical Security of Air Traffic Surveillance Systems.- Simulation-Based Logic Bomb Identification and Verification for Unmanned Aerial Vehicles.- Assessing the Cyber Risk of Small Unmanned Aerial Vehicles.- Cyber State Requirements for Design and Validation of Trust in the Critical Transportation Infrastructure.- Vehicle Infrastructure Security.- An Efficient Blockchain Authentication Scheme for Vehicular Ad-Hoc Networks.- Engaging Empirical Dynamic Modeling to Detect Intrusions in Cyber-Physical Systems.- Telecommunications Systems Security.- Multi-Channel Security Through Data Fragmentation.- Securing an InfiniBand Network and its Effect on Performance.- Industrial Control Systems Security.- Cyber-Resilient SCADA Systems via Secure State Restoration.- Vulnerability Assessments of Building Management Systems.- Forensic Investigation of a Hacked Industrial Robot.- Cyber-Physical Systems Security.- Distributed Bias Detection in Cyber-Physical Systems.- Comparison of Design-Centric and Data-Centric Methods for Distributed Attack Detection in Cyber-Physical Systems.- Infrastructure Modeling and Simulation.- A Model-Based Safety-Security Risk Analysis Framework for Interconnected Critical Infrastructures.- Creating a Cross-Domain Simulation Framework for Risk Analyses of Cities.- Modeling Telecommunications Infrastructures Using the CISIApro 2.0 Simulator.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |