menu
{ "item_title" : "Critical Infrastructure Protection VIII", "item_author" : [" Jonathan Butts", "Sujeet Shenoi "], "item_description" : "Detecting Integrity Attacks on Industrial Control Systems.- Detecting Malicious Software Execution in Programmable Logic Controllers Using Power Fingerprinting.- Timing of Cyber-Physical Attacks on Process Control Systems.- Recovery of Structural Controllability for Control Systems.- Industrial Control System Traffic Data Sets for Intrusion Detection Research.- An Industrial Control System Testbed Based on Emulation, Physical Devices and Simulation.- Evidence Theory for Cyber-Physical Systems.- An Automated Dialog System for Conducting Security Interviews for Access Control.- A Survey of Critical Infrastructure Security.- A System Dynamics Framework for Modeling Critical Infrastructure Resilience.- Reinforcement Learning Using Monte Carlo Policy Estimation for Disaster Mitigation.- Accuracy of Service Area Estimation Methods Used for Critical Infrastructure Recovery.- A Decision Support Tool for a Unified Homeland Security Strategy.- Assessing the Impact of Cyber Attacks on Wireless Sensor Nodes That Monitor Interdependent Physical Systems.- Assessing Potential Casualties in Critical Events.- Evaluation of Format-Preserving Encryption Algorithms for Critical Infrastructure Protection.- Asynchronous Binary Byzantine Consensus over Graphs with Power-Law Degree Sequence.", "item_img_path" : "https://covers4.booksamillion.com/covers/bam/3/66/252/616/3662526166_b.jpg", "price_data" : { "retail_price" : "54.99", "online_price" : "54.99", "our_price" : "54.99", "club_price" : "54.99", "savings_pct" : "0", "savings_amt" : "0.00", "club_savings_pct" : "0", "club_savings_amt" : "0.00", "discount_pct" : "10", "store_price" : "" } }
Critical Infrastructure Protection VIII|Jonathan Butts

Critical Infrastructure Protection VIII : 8th Ifip Wg 11.10 International Conference, Iccip 2014, Arlington, Va, Usa, March 17-19, 2014, Revised Select

local_shippingShip to Me
In Stock.
FREE Shipping for Club Members help

Overview

Detecting Integrity Attacks on Industrial Control Systems.- Detecting Malicious Software Execution in Programmable Logic Controllers Using Power Fingerprinting.- Timing of Cyber-Physical Attacks on Process Control Systems.- Recovery of Structural Controllability for Control Systems.- Industrial Control System Traffic Data Sets for Intrusion Detection Research.- An Industrial Control System Testbed Based on Emulation, Physical Devices and Simulation.- Evidence Theory for Cyber-Physical Systems.- An Automated Dialog System for Conducting Security Interviews for Access Control.- A Survey of Critical Infrastructure Security.- A System Dynamics Framework for Modeling Critical Infrastructure Resilience.- Reinforcement Learning Using Monte Carlo Policy Estimation for Disaster Mitigation.- Accuracy of Service Area Estimation Methods Used for Critical Infrastructure Recovery.- A Decision Support Tool for a Unified Homeland Security Strategy.- Assessing the Impact of Cyber Attacks on Wireless Sensor Nodes That Monitor Interdependent Physical Systems.- Assessing Potential Casualties in Critical Events.- Evaluation of Format-Preserving Encryption Algorithms for Critical Infrastructure Protection.- Asynchronous Binary Byzantine Consensus over Graphs with Power-Law Degree Sequence.

This item is Non-Returnable

Details

  • ISBN-13: 9783662526163
  • ISBN-10: 3662526166
  • Publisher: Springer
  • Publish Date: September 2016
  • Dimensions: 9.21 x 6.14 x 0.62 inches
  • Shipping Weight: 0.92 pounds
  • Page Count: 276

Related Categories

You May Also Like...

    1

BAM Customer Reviews