Buy Critical Information Infrastructure Security by Stefan Geretshuber
close menu
Bookswagon
search
My Account
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Home > Computing and Information Technology > Computer security > Critical Information Infrastructure Security: Third International Workshop, CRITIS 2008, Rome, Italy, October 13-15, 2008(5508 Lecture Notes in Computer Science)
Critical Information Infrastructure Security: Third International Workshop, CRITIS 2008, Rome, Italy, October 13-15, 2008(5508 Lecture Notes in Computer Science)

Critical Information Infrastructure Security: Third International Workshop, CRITIS 2008, Rome, Italy, October 13-15, 2008(5508 Lecture Notes in Computer Science)


     0     
5
4
3
2
1



Available


X
About the Book

This volume contains the proceedings of the Third International Workshop on Critical Information Infrastructure Security (CRITIS 2008),which was held - tober 13-15, 2008 in Villa Mondragone (Rome), Italy, and was co-organized by AIIC (The Italian Society of Critical Infrastructures Experts) and ENEA (The Italian National Agency for New Technology, Energy and the Environment). This year's workshop was focused on an interdisciplinary and multifaced - alogue about the third millennium security strategies for critical information infrastructures (CII) and their protection (CIP). The aim was to explore the new challenges posed by the CII, bringing together researchersand professionals from universities, private companies and public administrations interested in all security-related aspects, and actively involved in the scienti?c communities at a national, European and trans-European level. More than 70 papers were submitted to the conference, which were screened by a very selective double-blind review process to identify the 39 papers selected for presentation, based on their signi?cance, novelty and technical quality. - visions were not checked and the authors bear full responsibility for the content of their papers. CRITIS 2008 also had six outstanding invited speakers: Erol Gelenbe (- perial College, UK), Massoud Amin (University of Minnesota, USA), George Apostolakis(MIT,USA),AndreaValboni(Microsoft,Italy),SujeetShenoi(U- versity of Tulsa, USA) and Angelo Marino (DG Information Society and Media, European Commission).

Table of Contents:
Blackouts in Power Transmission Networks Due to Spatially Localized Load Anomalies.- Stability of a Distributed Generation Network Using the Kuramoto Models.- Enabling System of Systems Analysis of Critical Infrastructure Behaviors.- Information Modelling and Simulation in Large Interdependent Critical Infrastructures in IRRIIS.- Multi-level Dependability Modeling of Interdependencies between the Electricity and Information Infrastructures.- Interdependency Analysis in Electric Power Systems.- Modeling and Simulation of Complex Interdependent Systems: A Federated Agent-Based Approach.- Self-healing and Resilient Critical Infrastructures.- Critical Infrastructures Security Modeling, Enforcement and Runtime Checking.- INcreasing Security and Protection through Infrastructure REsilience: The INSPIRE Project.- Increase of Power System Survivability with the Decision Support Tool CRIPS Based on Network Planning and Simulation Program PSS®SINCAL.- Information Modelling and Simulation in Large Dependent Critical Infrastructures – An Overview on the European Integrated Project IRRIIS.- Assessment of Structural Vulnerability for Power Grids by Network Performance Based on Complex Networks.- Using Centrality Measures to Rank the Importance of the Components of a Complex Network Infrastructure.- RadialNet: An Interactive Network Topology Visualization Tool with Visual Auditing Support.- Quantitative Security Risk Assessment and Management for Railway Transportation Infrastructures.- Assessing and Improving SCADA Security in the Dutch Drinking Water Sector.- Analysis of Malicious Traffic in Modbus/TCP Communications.- Scada Malware, a Proof of Concept.- Testbeds for Assessing Critical Scenarios in Power Control Systems.- A Structured Approach to Incident Response Management inthe Oil and Gas Industry.- Security Strategy Analysis for Critical Information Infrastructures.- Emerging Information Infrastructures: Cooperation in Disasters.- Service Modeling Language Applied to Critical Infrastructure.- Graded Security Expert System.- Protection of Mobile Agents Execution Using a Modified Self-Validating Branch-Based Software Watermarking with External Sentinel.- Adaptation of Modelling Paradigms to the CIs Interdependencies Problem.- Empirical Findings on Critical Infrastructure Dependencies in Europe.- Dependent Automata for the Modelling of Dependencies.- Application of IPK (Information, Preferences, Knowledge) Paradigm for the Modelling of Precautionary Principle Based Decision-Making.- Disaster Propagation in Heterogeneous Media via Markovian Agents.- A Study on Multiformalism Modeling of Critical Infrastructures.- Simulation of Critical ICT Infrastructure for Municipal Crisis Management.- An Ontology-Based Approach to Blind Spot Revelation in Critical Infrastructure Protection Planning.- Security of Water Infrastructure Systems.- Critical Infrastructures as Complex Systems: A Multi-level Protection Architecture.- Challenges Concerning the Energy-Dependency of the Telecom Infrastructure.- An Effective Approach for Cascading Effects Prevision in Critical Infrastructures.


Best Sellers


Product Details
  • ISBN-13: 9783642035517
  • Publisher: Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
  • Publisher Imprint: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Height: 235 mm
  • No of Pages: 396
  • Returnable: N
  • Series Title: 5508 Lecture Notes in Computer Science
  • Width: 155 mm
  • ISBN-10: 3642035515
  • Publisher Date: 21 Sep 2009
  • Binding: Paperback
  • Language: English
  • Returnable: N
  • Series Title: 5508 Lecture Notes in Computer Science
  • Sub Title: Third International Workshop, CRITIS 2008, Rome, Italy, October 13-15, 2008


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Critical Information Infrastructure Security: Third International Workshop, CRITIS 2008, Rome, Italy, October 13-15, 2008(5508 Lecture Notes in Computer Science)
Springer-Verlag Berlin and Heidelberg GmbH & Co. KG -
Critical Information Infrastructure Security: Third International Workshop, CRITIS 2008, Rome, Italy, October 13-15, 2008(5508 Lecture Notes in Computer Science)
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Critical Information Infrastructure Security: Third International Workshop, CRITIS 2008, Rome, Italy, October 13-15, 2008(5508 Lecture Notes in Computer Science)

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!