Critical Information Infrastructures Security

Critical Information Infrastructures Security

12th International Conference, CRITIS 2017, Lucca, Italy, October 8-13, 2017, Revised Selected Papers

Scala, Antonio; D'Agostino, Gregorio

Springer International Publishing AG

09/2018

272

Mole

Inglês

9783319998428

15 a 20 dias

454

Descrição não disponível.
Resilience of Electrical Distribution Systems with Critical Load Prioritization.- Public tolerance levels of transportation resilience: a focus on the Oresund region within the IMPROVER Project.- Towards a Common Vocabulary for Crisis Management Scenarios.- Analysis and Classification of Adaptation Tools for Transport Sector Adaptation Planning.- Timing-based Anomaly Detection in SCADA Networks.- Operational Resilience metrics for a complex electrical networks.- The Influence of Load Characteristics on Early Warning Signs in Power Systems.- DMA optimal layout for protection of water distribution networks from malicious attack.- Role of urban interactions and damage in seismic resilience of historical centers.- Towards Blockchain-Based Collaborative Intrusion Detection Systems.- Analysis of cybersecurity threats in Industry 4.0: the case of intrusion detection.- De-Synchronisation Attack Modelling in Real-Time Protocols Using Queue Networks: Attacking the ISO/IEC 61850 Substation Automation Protocol.- Assessing Urban Rail Transit Systems Vulnerability: Metrics vs. Interdiction Models.- Automatically Generating Security Models from System Models to Aid in the Evaluation of AMI Deployment Options.- A Gamified Approach to Participatory Modelling of Water System Risks.- Managing gas and electric power network dependencies to secure energy supply: application to the UK system.- What the Stack? On Memory Exploitation and Protection in Resource Constrained Automotive Systems.- Dealing with Functional Safety Requirements for Automotive Systems: A Cyber-Physical-Social Approach.- Side-channel based intrusion detection for industrial control systems.- Security Evaluation of Cyber-Physical Systems using Automatically Generated Attack Trees.- Faulty or Malicious Anchor Detection Criteria for Distance-Based Localization.- One step more : Automatic ICS Protocol Field Analysis.- Motion magnification for urban buildings.- Reputation Systems to Mitigate DoS Attack in Vehicular Network.-On the security of aircraft communication networks.
adaptive control systems;artificial intelligence;authentication;bayesian networks;computer architecture;computer crime;computer networks;congestion control (communication);cryptography;data security;distributed parameter networks;distribution network;intrusion detection;ontologies;semantics;telecommunication traffic