Handbook on securing cyber-physical critical infrastructure: foundations and challenges
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Amsterdam [u.a.]
Elsevier
2012
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | xxx, 817 p. Ill., graph. Darst. 25 cm |
ISBN: | 9780124158153 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV040338819 | ||
003 | DE-604 | ||
005 | 20141217 | ||
007 | t | ||
008 | 120727s2012 xxuad|| |||| 00||| eng d | ||
010 | |a 2011038620 | ||
020 | |a 9780124158153 |9 978-0-12-415815-3 | ||
035 | |a (OCoLC)793480062 | ||
035 | |a (DE-599)BVBBV040338819 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-91G | ||
050 | 0 | |a TK5105.59 | |
082 | 0 | |a 005.8 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a DAT 050b |2 stub | ||
084 | |a DAT 055b |2 stub | ||
084 | |a DAT 461b |2 stub | ||
100 | 1 | |a Das, Sajal |d 1960- |e Verfasser |0 (DE-588)141294477 |4 aut | |
245 | 1 | 0 | |a Handbook on securing cyber-physical critical infrastructure |b foundations and challenges |c Sajal Das ... [eds.] |
264 | 1 | |a Amsterdam [u.a.] |b Elsevier |c 2012 | |
300 | |a xxx, 817 p. |b Ill., graph. Darst. |c 25 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
650 | 4 | |a Computer networks |x Security measures |v Handbooks, manuals, etc | |
650 | 4 | |a Computer security |v Handbooks, manuals, etc | |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datenschutz |0 (DE-588)4011134-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 2 | |a Datenschutz |0 (DE-588)4011134-9 |D s |
689 | 0 | |5 DE-604 | |
856 | 4 | 2 | |m HBZ Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025193113&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-025193113 |
Datensatz im Suchindex
_version_ | 1804149371141357568 |
---|---|
adam_text | Titel: Handbook on securing cyber-physical critical infrastructure
Autor: Das, Sajal Kumar
Jahr: 2012
CONTENTS
About the Authors, vi
Contributors, xi
Foreword, xvii
Securing Cyber-Physical Infrastructure, xxi
PART I Theoretical Foundations
1 Security and Vulnerability of Cyber-Physical Infrastructure Networks:
A Control-Theoretic Approach, 5
Mengran Xue, Sandip Roy, Yan Wan, Sajal K. Das
2 Game Theory for Infrastructure Security: The Power of Intent-Based
Adversary Models, 31
Xin Jin, Min Dan, Nan Zhang, Wei Yu, Xinwen Fu, Sajal K. Das
3 An Analytical Framework for Cyber-Physical Networks, 55
Nageswara S. V. Rao, Y. Narahari, C. E. Veni Madhavan, David K. Y. Yau, Chris Y.T. Ma
4 Evolution of Widely Spreading Worms and Countermeasures: Epidemic
Theory and Application, 73
Wei Yu, Nan Zhang, Xinwen Fu, Brian Rivera
PART II Security for Wireless Mobile Networks
5 Mobile Wireless Network Security, 99
Michel Barbeau
6 Robust Wireless Infrastructure against Jamming Attacks, 123
Guevara Noubir
7 Security for Mobile Ad Hoc Networks, 147
Raja Datta, Ningrinla Marchang
8 Defending Against Identity-Based Attacks in Wireless Networks, 191
Yingying Chen, Jie Yang
CONTENTS
PART III Security for Sensor Networks
9 Efficient and Distributed Access Control for Sensor Networks, 227
Donggang Liu
10 Defending Against Physical Attacks in Wireless Sensor Networks, 251
Jin Teng, Wenjun Gu, Dong Xuan
11 Node Compromise Detection in Wireless Sensor Networks, 281
Jun-Won Ho, Sajal K. Das
PART IV Platform Security
12 Hardware and Security: Vulnerabilities and Solutions, 305
Gedare Bloom, Eugen Leontie, Bhagirath Narahari, Rahul Simha
13 Languages and Security: Safer Software Through Language and
Compiler Techniques, 333
Rahul Simha, Scotty Smith
PART V Cloud Computing and Data Security
14 Protecting Data in Outsourcing Scenarios, 361
Sabrina De Capitani di Vimercati, Sara Foresti, Pierangela Samarati
15 Data Security in Cloud Computing, 389
Shucheng Yu, Wenjìng Lou, Kuì Ren
16 Secure Mobile Cloud Computing, 411
Mayank Raj, Mario Di Francesco, Sajal K. Das
17 Relation Privacy Preservation in Publishing Online Social Networks, 431
A/a Li, Nan Zhang, Sajal K. Das
PART VI Event Monitoring and Situation Awareness
18 Distributed Network and System Monitoring for Securing
Cyber-Physical Infrastructure, 455
Yang Liu, Yong Guan
19 Discovering and Tracking Patterns of Interest in Security
Sensor Streams, 481
Parisa Rashidi, Narayanan Krishnan, Diane J. Cook
20 Pervasive Sensing and Monitoring for Situational Awareness, 505
Sharad Mehrotra, Nalini Venkatasubramanian, Mark-Oliver Stehr, Carolyn Talcott
CONTENTS
21 Sense and Response Systems for Crisis Management, 537
J.J. Bunn, K.M. Chandy, M. Faulkner, A.H. Liu, M. Olson
PART VII Policy Issues in Security Management
22 Managing and Securing Critical Infrastructure - A Semantic Policy- and
Trust-Driven Approach, 551
Wenjia Li, Palanivel Kodeswaran, Pramod Jagtap, Anupam Joshi, Tim Finin
23 Policies, Access Control, and Formal Methods, 573
Elisa Bettino
24 Formal Analysis of Policy-Based Security Configurations
in Enterprise Networks, 595
S.K. Ghosh, Ehab Al-Shaer, P. Bera
PART VIII Security in Real-World Systems
25 Security and Privacy in the Smart Grid, 637
Alvaro A. Cárdenas, Reihaneh Safavi-Naini
26 Cyber-Physical Security of Automotive Information Technology, 655
Richard R. Brooks, Seok Bae Yun, Juan Deng
27 Security and Privacy for Mobile Health-Care (m-Health) Systems, 677
Jinyuan Sun, Xiaoyan Zhu, Chi Zhang, Yuguang Fang
28 Security and Robustness in the Internet Infrastructure, 705
Krishna Kant, Casey Deccio
29 Emergency Vehicular Networks, 735
Mario Gerla, Eun Kyu Lee, Uichin Lee, Giovanni Pau
30 Security Issues in VoIP Telecommunication Networks, 763
Xiaohui Yang, Ram Dantu, Duminda Wijesekera
Index, 791
|
any_adam_object | 1 |
author | Das, Sajal 1960- |
author_GND | (DE-588)141294477 |
author_facet | Das, Sajal 1960- |
author_role | aut |
author_sort | Das, Sajal 1960- |
author_variant | s d sd |
building | Verbundindex |
bvnumber | BV040338819 |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.59 |
callnumber-search | TK5105.59 |
callnumber-sort | TK 45105.59 |
callnumber-subject | TK - Electrical and Nuclear Engineering |
classification_rvk | ST 276 |
classification_tum | DAT 050b DAT 055b DAT 461b |
ctrlnum | (OCoLC)793480062 (DE-599)BVBBV040338819 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01861nam a2200481zc 4500</leader><controlfield tag="001">BV040338819</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20141217 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">120727s2012 xxuad|| |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2011038620</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780124158153</subfield><subfield code="9">978-0-12-415815-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)793480062</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV040338819</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91G</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">TK5105.59</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 050b</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 055b</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 461b</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Das, Sajal</subfield><subfield code="d">1960-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)141294477</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Handbook on securing cyber-physical critical infrastructure</subfield><subfield code="b">foundations and challenges</subfield><subfield code="c">Sajal Das ... [eds.]</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Amsterdam [u.a.]</subfield><subfield code="b">Elsevier</subfield><subfield code="c">2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xxx, 817 p.</subfield><subfield code="b">Ill., graph. Darst.</subfield><subfield code="c">25 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="v">Handbooks, manuals, etc</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="v">Handbooks, manuals, etc</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">HBZ Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025193113&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-025193113</subfield></datafield></record></collection> |
id | DE-604.BV040338819 |
illustrated | Illustrated |
indexdate | 2024-07-10T00:21:58Z |
institution | BVB |
isbn | 9780124158153 |
language | English |
lccn | 2011038620 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-025193113 |
oclc_num | 793480062 |
open_access_boolean | |
owner | DE-91G DE-BY-TUM |
owner_facet | DE-91G DE-BY-TUM |
physical | xxx, 817 p. Ill., graph. Darst. 25 cm |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | Elsevier |
record_format | marc |
spelling | Das, Sajal 1960- Verfasser (DE-588)141294477 aut Handbook on securing cyber-physical critical infrastructure foundations and challenges Sajal Das ... [eds.] Amsterdam [u.a.] Elsevier 2012 xxx, 817 p. Ill., graph. Darst. 25 cm txt rdacontent n rdamedia nc rdacarrier Includes bibliographical references and index Computer networks Security measures Handbooks, manuals, etc Computer security Handbooks, manuals, etc Rechnernetz (DE-588)4070085-9 gnd rswk-swf Datenschutz (DE-588)4011134-9 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Rechnernetz (DE-588)4070085-9 s Computersicherheit (DE-588)4274324-2 s Datenschutz (DE-588)4011134-9 s DE-604 HBZ Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025193113&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Das, Sajal 1960- Handbook on securing cyber-physical critical infrastructure foundations and challenges Computer networks Security measures Handbooks, manuals, etc Computer security Handbooks, manuals, etc Rechnernetz (DE-588)4070085-9 gnd Datenschutz (DE-588)4011134-9 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4070085-9 (DE-588)4011134-9 (DE-588)4274324-2 |
title | Handbook on securing cyber-physical critical infrastructure foundations and challenges |
title_auth | Handbook on securing cyber-physical critical infrastructure foundations and challenges |
title_exact_search | Handbook on securing cyber-physical critical infrastructure foundations and challenges |
title_full | Handbook on securing cyber-physical critical infrastructure foundations and challenges Sajal Das ... [eds.] |
title_fullStr | Handbook on securing cyber-physical critical infrastructure foundations and challenges Sajal Das ... [eds.] |
title_full_unstemmed | Handbook on securing cyber-physical critical infrastructure foundations and challenges Sajal Das ... [eds.] |
title_short | Handbook on securing cyber-physical critical infrastructure |
title_sort | handbook on securing cyber physical critical infrastructure foundations and challenges |
title_sub | foundations and challenges |
topic | Computer networks Security measures Handbooks, manuals, etc Computer security Handbooks, manuals, etc Rechnernetz (DE-588)4070085-9 gnd Datenschutz (DE-588)4011134-9 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Computer networks Security measures Handbooks, manuals, etc Computer security Handbooks, manuals, etc Rechnernetz Datenschutz Computersicherheit |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025193113&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT dassajal handbookonsecuringcyberphysicalcriticalinfrastructurefoundationsandchallenges |