𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Handbook on Securing Cyber-Physical Critical Infrastructure

✍ Scribed by Sajal K. Das, Krishna Kant and Nan Zhang (Auth.)


Publisher
Morgan Kaufmann
Year
2012
Tongue
English
Leaves
822
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Table of Contents


Content:
Front Matter, Pages i-ii
Copyright, Page iv
Dedication, Page v
About the Authors, Page vi
Contributors, Pages xi-xv
Foreword, Pages xvii-xix
Securing Cyber-Physical Infrastructure: Perspectives and Overview of the Handbook, Pages xxi-xxx
Introduction, Pages 1-4
Chapter 1 - Security and Vulnerability of Cyber-Physical Infrastructure Networks: A Control-Theoretic Approach, Pages 5-30
Chapter 2 - Game Theory for Infrastructure Security: The Power of Intent-Based Adversary Models, Pages 31-53
Chapter 3 - An Analytical Framework for Cyber-Physical Networks, Pages 55-72
Chapter 4 - Evolution of Widely Spreading Worms and Countermeasures: Epidemic Theory and Application, Pages 73-93
Introduction, Pages 95-98
Chapter 5 - Mobile Wireless Network Security, Pages 99-122
Chapter 6 - Robust Wireless Infrastructure against Jamming Attacks, Pages 123-145
Chapter 7 - Security for Mobile Ad Hoc Networks, Pages 147-190
Chapter 8 - Defending Against Identity-Based Attacks in Wireless Networks, Pages 191-222
Introduction, Pages 223-225
Chapter 9 - Efficient and Distributed Access Control for Sensor Networks, Pages 227-250
Chapter 10 - Defending Against Physical Attacks in Wireless Sensor Networks, Pages 251-279
Chapter 11 - Node Compromise Detection in Wireless Sensor Networks, Pages 281-300
Introduction, Pages 301-303
Chapter 12 - Hardware and Security: Vulnerabilities and Solutions, Pages 305-331
Chapter 13 - Languages and Security: Safer Software Through Language and Compiler Techniques, Pages 333-355
Introduction, Pages 357-359
Chapter 14 - Protecting Data in Outsourcing Scenarios, Pages 361-388
Chapter 15 - Data Security in Cloud Computing, Pages 389-410
Chapter 16 - Secure Mobile Cloud Computing, Pages 411-429
Chapter 17 - Relation Privacy Preservation in Publishing Online Social Networks, Pages 431-450
Introduction, Pages 451-453
Chapter 18 - Distributed Network and System Monitoring for Securing Cyber-Physical Infrastructure, Pages 455-479
Chapter 19 - Discovering and Tracking Patterns of Interest in Security Sensor Streams, Pages 481-504
Chapter 20 - Pervasive Sensing and Monitoring for Situational Awareness, Pages 505-535
Chapter 21 - Sense and Response Systems for Crisis Management, Pages 537-548
Introduction, Pages 549-550
Chapter 22 - Managing and Securing Critical Infrastructure – A Semantic Policy- and Trust-Driven Approach, Pages 551-571
Chapter 23 - Policies, Access Control, and Formal Methods, Pages 573-594
Chapter 24 - Formal Analysis of Policy-Based Security Configurations in Enterprise Networks, Pages 595-631
Introduction, Pages 633-636
Chapter 25 - Security and Privacy in the Smart Grid, Pages 637-654
Chapter 26 - Cyber-Physical Security of Automotive Information Technology, Pages 655-676
Chapter 27 - Security and Privacy for Mobile Health-Care (m-Health) Systems, Pages 677-704
Chapter 28 - Security and Robustness in the Internet Infrastructure, Pages 705-733
Chapter 29 - Emergency Vehicular Networks, Pages 735-761
Chapter 30 - Security Issues in VoIP Telecommunication Networks, Pages 763-789
Index, Pages 791-817


πŸ“œ SIMILAR VOLUMES


Cyber-Physical Security: Protecting Crit
✍ Robert M. Clark, Simon Hakim (eds.) πŸ“‚ Library πŸ“… 2017 πŸ› Springer International Publishing 🌐 English

<p>This book focuses on the vulnerabilities of state and local services to cyber-threats and suggests possible protective action that might be taken against such threats. Cyber-threats to U.S. critical infrastructure are of growing concern to policymakers, managers and consumers. Information and com

Cyber-security Protecting Critical Infra
πŸ“‚ Library πŸ“… 2015 πŸ› CRC Pr I Llc, Johnson, Thomas A 🌐 English

The World Economic Forum regards the threat of cyber attack as one of the top five global risks confronting nations of the world today. Cyber attacks are increasingly targeting the core functions of the economies in nations throughout the world. The threat to attack critical infrastructures, disrupt

Cyber Security: Deterrence and IT Protec
✍ Sandro Gaycken, Maurizio Martellini (auth.), Maurizio Martellini (eds.) πŸ“‚ Library πŸ“… 2013 πŸ› Springer International Publishing 🌐 English

<p>The experts of the International Working Group-Landau Network Centro Volta (IWG-LNCV) discuss aspects of cyber security and present possible methods of deterrence, defense and resilience against cyber attacks. This SpringerBrief covers state-of-the-art documentation on the deterrence power of cyb

Cyber Security: Deterrence and IT Protec
✍ Maurizio Martellini πŸ“‚ Library πŸ“… 2013 πŸ› Springer 🌐 English

The experts of the International Working Group-Landau Network Centro Volta (IWG-LNCV) discuss aspects of cyber security and present possible methods of deterrence, defense and resilience against cyber attacks. This SpringerBrief covers state-of-the-art documentation on the deterrence power of cyber