
Questo prodotto usufruisce delle SPEDIZIONI GRATIS
selezionando l'opzione Corriere Veloce in fase di ordine.
Pagabile anche con Carta della cultura giovani e del merito, 18App Bonus Cultura e Carta del Docente
The cyber infrastructure – comprising computers, embedded devices, networks and software systems – is vital to operations in every sector: chemicals, commercial facilities, communications, critical manufacturing, dams, defense industrial base, emergency services, energy, financial services, food and agriculture, government facilities, healthcare and public health, information technology, nuclear reactors, materials and waste, transportation systems, and water and wastewater systems. Global business and industry, governments, indeed society itself, cannot function if major components of the critical infrastructure are degraded, disabled or destroyed.
Critical Infrastructure Protection XVIII describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving together science, technology and policy to craft sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. Areas of coverage include:
This book is the eighteenth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of nine edited papers from the Eighteenth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, which was held at SRI International, Arlington, Virginia, USA in the spring of 2024.
Critical Infrastructure Protection XVIII is an important resource for researchers, faculty members and graduate students, as well as for policy makers, practitioners and other individuals with interests in homeland security.
Infrastructure Security: Evaluating Cyber Security Risks and Mitigation Strategies for Smart Grids Based on Business Case Scenarios.- On the Security of Electronic Voting Systems. Advanced Manufacturing Security: Detecting Control Injection Attacks Using Energy Data Anomalies in Computer Numerical Control Machining.- Security Assessment of an LBP16-Protocol-Based Computer Numerical Control Machine.- An End-to-End Framework for Verifying and Validating Manufacturing Design Integrity. Industrial Control System Security: Multiple-Bayesian-Network-Based Risk Assessment Methodology for Industrial Control Systems.- Automated Programmable Logic Controller Memory Forensics Using RGB Image Analysis and Deep Learning. Infrastructure Modeling: A Fail-Safe Challenge-Response Mechanism for User Equipment to Detect Rogue IMSI/SUPI Catchers.- Improved Distribution Network Topology Generation with Hierarchical Information Overlay.


Il sito utilizza cookie ed altri strumenti di tracciamento che raccolgono informazioni dal dispositivo dell’utente. Oltre ai cookie tecnici ed analitici aggregati, strettamente necessari per il funzionamento di questo sito web, previo consenso dell’utente possono essere installati cookie di profilazione e marketing e cookie dei social media. Cliccando su “Accetto tutti i cookie” saranno attivate tutte le categorie di cookie. Per accettare solo deterninate categorie di cookie, cliccare invece su “Impostazioni cookie”. Chiudendo il banner o continuando a navigare saranno installati solo cookie tecnici. Per maggiori dettagli, consultare la Cookie Policy.