Buch, Englisch, 848 Seiten, Format (B × H): 189 mm x 241 mm, Gewicht: 1482 g
Buch, Englisch, 848 Seiten, Format (B × H): 189 mm x 241 mm, Gewicht: 1482 g
ISBN: 978-0-12-415815-3
Verlag: Elsevier Science
Zielgruppe
<p>Researchers and security practitioners in relevant application areas such as smart power grid, transportation systems, communication networks, etc. The handbook is also intended to be suitable for advanced courses and seminars as well as graduate students working on various facets of security in cyber and physical systems.</p>
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Computerkriminalität & Hacking
- Technische Wissenschaften Technik Allgemein Technische Zuverlässigkeit, Sicherheitstechnik
- Mathematik | Informatik EDV | Informatik Computerkommunikation & -vernetzung Netzwerksicherheit
- Wirtschaftswissenschaften Wirtschaftssektoren & Branchen Dienstleistungssektor & Branchen Sicherheitsgewerbe
Weitere Infos & Material
Introduction: Securing Cyber-Physical Infrastructures--An OverviewPart 1: Theoretical Foundations of SecurityChapter 1: Security and Vulnerability of Cyber-Physical Infrastructure Networks: A Control-Theoretic ApproachChapter 2: Game Theory for Infrastructure Security - The Power of Intent-Based Adversary ModelsChapter 3: An Analytical Framework for Cyber-Physical NetworksChapter 4: Evolution of Widely Spreading Worms and Countermeasures: Epidemic Theory and ApplicationPart 2: Security for Wireless Mobile NetworksChapter 5: Mobile Wireless Network SecurityChapter 6: Robust Wireless Infrastructure against Jamming AttacksChapter 7: Security for Mobile Ad Hoc NetworksChapter 8: Defending against Identity-Based Attacks in Wireless NetworksPart 3: Security for Sensor NetworksChapter 9: Efficient and Distributed Access Control for Sensor NetworksChapter 10: Defending against Physical Attacks in Wireless Sensor NetworksChapter 11: Node Compromise Detection in Wireless Sensor NetworksPart 4: Platform SecurityChapter 12: Hardware and Security: Vulnerabilities and SolutionsChapter 13: Languages and Security: Safer Software Through Language and Compiler TechniquesPart 5: Cloud Computing and Data SecurityChapter 14: Protecting Data in Outsourcing ScenariosChapter 15: Data Security in Cloud ComputingChapter 16: Secure Mobile Cloud ComputingChapter 17: Relation Privacy Preservation in Online Social NetworksPart 6: Event Monitoring and Situation AwarenessChapter 18: Distributed Network and System Monitoring for Securing Cyber-Physical InfrastructureChapter 19: Discovering and Tracking Patterns of Interest in Security Sensor StreamsChapter 20: Pervasive Sensing and Monitoring for Situational AwarenessChapter 21: Sense and Response Systems for Crisis ManagementPart 7. Policy Issues in Security ManagementChapter 22: Managing and Securing Critical Infrastructure -- A Semantic Policy and Trust-Driven ApproachChapter 23: Policies, Access Control, and Formal Methods Chapter 24: Formal Analysis of Policy based Security Con?gurations in Enterprise NetworksPart 8: Security Issues in Real-World SystemsChapter 25: Security and Privacy in the Smart GridChapter 26: Cyber-physical Security of Automotive Information TechnologyChapter 27: Security and Privacy for Mobile Healthcare (m-Health) SystemsChapter 28: Security and Robustness in the Internet InfrastructureChapter 29: Emergency Vehicular NetworksChapter 30: Security Issues in VoIP Telecommunication Networks