Handbook on securing cyber-physical critical infrastructure : foundation and challenges
著者
書誌事項
Handbook on securing cyber-physical critical infrastructure : foundation and challenges
Morgan Kaufmann, c2012
大学図書館所蔵 件 / 全1件
-
該当する所蔵館はありません
- すべての絞り込み条件を解除する
注記
Includes bibliographical references and index
内容説明・目次
内容説明
The worldwide reach of the Internet allows malicious cyber criminals to coordinate and launch attacks on both cyber and cyber-physical infrastructure from anywhere in the world. This purpose of this handbook is to introduce the theoretical foundations and practical solution techniques for securing critical cyber and physical infrastructures as well as their underlying computing and communication architectures and systems. Examples of such infrastructures include utility networks (e.g., electrical power grids), ground transportation systems (automotives, roads, bridges and tunnels), airports and air traffic control systems, wired and wireless communication and sensor networks, systems for storing and distributing water and food supplies, medical and healthcare delivery systems, as well as financial, banking and commercial transaction assets. The handbook focus mostly on the scientific foundations and engineering techniques - while also addressing the proper integration of policies and access control mechanisms, for example, how human-developed policies can be properly enforced by an automated system.
目次
Introduction: Securing Cyber-Physical Infrastructures--An OverviewPart 1: Theoretical Foundations of SecurityChapter 1: Security and Vulnerability of Cyber-Physical Infrastructure Networks: A Control-Theoretic ApproachChapter 2: Game Theory for Infrastructure Security - The Power of Intent-Based Adversary ModelsChapter 3: An Analytical Framework for Cyber-Physical NetworksChapter 4: Evolution of Widely Spreading Worms and Countermeasures : Epidemic Theory and ApplicationPart 2: Security for Wireless Mobile NetworksChapter 5: Mobile Wireless Network SecurityChapter 6: Robust Wireless Infrastructure against Jamming AttacksChapter 7: Security for Mobile Ad Hoc NetworksChapter 8: Defending against Identity-Based Attacks in Wireless NetworksPart 3: Security for Sensor NetworksChapter 9: Efficient and Distributed Access Control for Sensor NetworksChapter 10: Defending against Physical Attacks in Wireless Sensor NetworksChapter 11: Node Compromise Detection in Wireless Sensor NetworksPart 4: Platform SecurityChapter 12: Hardware and Security: Vulnerabilities and SolutionsChapter 13: Languages and Security: Safer Software Through Language and Compiler TechniquesPart 5: Cloud Computing and Data SecurityChapter 14: Protecting Data in Outsourcing ScenariosChapter 15: Data Security in Cloud ComputingChapter 16: Secure Mobile Cloud ComputingChapter 17: Relation Privacy Preservation in Online Social NetworksPart 6: Event Monitoring and Situation AwarenessChapter 18: Distributed Network and System Monitoring for Securing Cyber-Physical InfrastructureChapter 19: Discovering and Tracking Patterns of Interest in Security Sensor StreamsChapter 20: Pervasive Sensing and Monitoring for Situational AwarenessChapter 21: Sense and Response Systems for Crisis ManagementPart 7. Policy Issues in Security ManagementChapter 22: Managing and Securing Critical Infrastructure -- A Semantic Policy and Trust-Driven ApproachChapter 23: Policies, Access Control, and Formal Methods Chapter 24: Formal Analysis of Policy based Security Con?gurations in Enterprise NetworksPart 8: Security Issues in Real-World SystemsChapter 25: Security and Privacy in the Smart GridChapter 26: Cyber-physical Security of Automotive Information TechnologyChapter 27: Security and Privacy for Mobile Healthcare (m-Health) SystemsChapter 28: Security and Robustness in the Internet InfrastructureChapter 29: Emergency Vehicular NetworksChapter 30: Security Issues in VoIP Telecommunication Networks
「Nielsen BookData」 より