• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History

عنوان
Computer security :

پدید آورنده
Sokratis K. Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Annie Antón, Stefanos Gritzalis, John Mylopoulos, Christos Kalloniatis (eds.).

موضوع
Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Data encryption (Computer science), Congresses.,Data protection, Congresses.,Computer networks-- Security measures.,Computer security.,Data encryption (Computer science),Data protection.

رده
QA76
.
9
.
A25

کتابخانه
Center and Library of Islamic Studies in European Languages

محل استقرار
استان: Qom ـ شهر: Qom

Center and Library of Islamic Studies in European Languages

تماس با کتابخانه : 32910706-025

INTERNATIONAL STANDARD BOOK NUMBER

(Number (ISBN
3030127850
(Number (ISBN
3030127869
(Number (ISBN
3030127877
(Number (ISBN
9783030127855
(Number (ISBN
9783030127862
(Number (ISBN
9783030127879
Erroneous ISBN
9783030127855

TITLE AND STATEMENT OF RESPONSIBILITY

Title Proper
Computer security :
General Material Designation
[Book]
Other Title Information
ESORICS 2018 International Workshops, CyberICPS 2018 and SECPRE 2018, Barcelona, Spain, September 6-7, 2018, Revised selected papers /
First Statement of Responsibility
Sokratis K. Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Annie Antón, Stefanos Gritzalis, John Mylopoulos, Christos Kalloniatis (eds.).

.PUBLICATION, DISTRIBUTION, ETC

Place of Publication, Distribution, etc.
Cham :
Name of Publisher, Distributor, etc.
Springer,
Date of Publication, Distribution, etc.
2019.

PHYSICAL DESCRIPTION

Specific Material Designation and Extent of Item
1 online resource (x, 233 pages) :
Other Physical Details
illustrations (some color)

SERIES

Series Title
Lecture notes in computer science ;
Series Title
LNCS sublibrary. SL 4, Security and cryptology
Volume Designation
11387

CONTENTS NOTE

Text of Note
Intro; Preface; Organization; Contents; Security of Industrial Control Systems and Cyber-Physical Systems (CyberICPS 2018); Improving SIEM for Critical SCADA Water Infrastructures Using Machine Learning; 1 Introduction; 2 Experimental Set-Up; 2.1 Modbus Protocol; 2.2 Sensors and PLC; 2.3 Operation Mode; 3 Dataset; 3.1 Scenarios; 3.2 Pre-processing; 4 Experiments and Results; 4.1 Parameters; 4.2 First Experiment; 4.3 Second Experiment; 4.4 Third Experiment; 5 Discussion and Limitations; 6 Related Work; 7 Conclusion and Future Work; References; Cyber-Attacks Against the Autonomous Ship
Text of Note
1 Introduction2 Related Work; 3 The ICT Architecture of the Cyber-Enabled Ship; 4 Identifying and Analyzing Attacks Against the Cyber-Enabled Ship; 4.1 Methodology; 4.2 Applying STRIDE to the Cyber-Enabled Ship; 5 Summary of Results and Discussion; 6 Conclusions and Future Work; References; EPIC: An Electric Power Testbed for Research and Training in Cyber Physical Systems Security; 1 Introduction; 2 Architecture of EPIC; 2.1 Views of EPIC; 3 Experiments with EPIC; 3.1 Feasible Attack Scenarios; 3.2 Power Supply Interruption Attack; 3.3 Physical Damage Attack; 4 Cascading Effects
Text of Note
4 Results4.1 One-Class Support Vector Machines; 4.2 Support Vector Machines; 4.3 Neural Networks; 4.4 Long Short Term Memory Neural Networks; 5 Discussion; 6 Related Work; 7 Conclusion; References; SDN-Enabled Virtual Data Diode; 1 Introduction; 2 Data Diodes for IACS Security; 2.1 Data Diode Products; 3 Leveraging SDN to Virtualize the Data Diode; 3.1 Proactive Data Diode; 3.2 Reactive Data Diode; 3.3 NFV-Assisted Data Diode; 4 Proof-of-Concept Virtual Data Diode Prototype; 5 Evaluation; 5.1 Experimental Testbed; 5.2 Validation and Lessons Learned; 6 Conclusion; References
Text of Note
5 Related Work6 Conclusion and Future Work; References; A Hardware Based Solution for Freshness of Secure Onboard Communication in Vehicles; 1 Introduction; 2 Related Work; 2.1 Limitations of Current Approaches; 3 The Setting; 3.1 The Reference Architecture; 3.2 The Characteristics of CAN Communication; 3.3 Attack Model; 4 Hardware Based Bus Count Solution; 5 Formalization and Proof; 5.1 The Security Modeling Framework SeMF; 5.2 The Formal Model; 5.3 Verification of the Formal Model; 6 Discussion and Conclusions; References
Text of Note
Enhancing Usage Control for Performance: An Architecture for Systems of Systems1 Introduction; 2 Background and Related Work; 2.1 RBAC -- ABAC; 2.2 Usage Control; 2.3 Risk Aggregation; 3 The Proposed Architecture; 3.1 The Architectural Model and its Components; 3.2 Protocol and Interface; 4 Test Case; 5 Conclusion; References; Comparative Study of Machine Learning Methods for In-Vehicle Intrusion Detection; 1 Introduction; 2 Data Sets; 3 Machine Learning Methods; 3.1 One-Class Support Vector Machines; 3.2 Support Vector Machines; 3.3 Neural Networks; 3.4 Long Short Term Memory Neural Networks
0
8
8
8
8

SUMMARY OR ABSTRACT

Text of Note
This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Workshop on the Security of Industrial Control Systems and Cyber-Physical Systems, CyberICPS 2018, and the Second International Workshop on Security and Privacy Requirements Engineering, SECPRE 2018, held in Barcelona, Spain, in September 2018, in conjunction with the 23rd European Symposium on Research in Computer Security, ESORICS 2018. The CyberICPS Workshop received 15 submissions from which 8 full papers were selected for presentation. They cover topics related to threats, vulnerabilities and risks that cyber-physical systems and industrial control systems face; cyber attacks that may be launched against such systems; and ways of detecting and responding to such attacks. From the SECPRE Workshop 5 full papers out of 11 submissions are included. The selected papers deal with aspects of security and privacy requirements assurance and evaluation; and security requirements elicitation and modelling.

ACQUISITION INFORMATION NOTE

Source for Acquisition/Subscription Address
Springer Nature
Stock Number
com.springer.onix.9783030127862

OTHER EDITION IN ANOTHER MEDIUM

International Standard Book Number
9783030127855
International Standard Book Number
9783030127879

PARALLEL TITLE PROPER

Parallel Title
CyberICPS 2018
Parallel Title
SECPRE 2018

TOPICAL NAME USED AS SUBJECT

Computer networks-- Security measures, Congresses.
Computer security, Congresses.
Data encryption (Computer science), Congresses.
Data protection, Congresses.
Computer networks-- Security measures.
Computer security.
Data encryption (Computer science)
Data protection.

(SUBJECT CATEGORY (Provisional

COM053000
UR
UR
UTN

DEWEY DECIMAL CLASSIFICATION

Number
005
.
8
Edition
23

LIBRARY OF CONGRESS CLASSIFICATION

Class number
QA76
.
9
.
A25

PERSONAL NAME - ALTERNATIVE RESPONSIBILITY

Antón, Annie I.
Cuppens, Frédéric
Cuppens, Nora
Gritzalis, Stefanos
Kalloniatis, Christos
Katsikas, Sokratis K.
Lambrinoudakis, Costas
Mylopoulos, John

CORPORATE BODY NAME - PRIMARY RESPONSIBILITY

European Symposium on Research in Computer Security(23rd :2018 :, Barcelona, Spain)

CORPORATE BODY NAME - ALTERNATIVE RESPONSIBILITY

CyberICPS (Workshop)(4th :2018 :, Barcelona, Spain)
SECPRE (Workshop)(2nd :2018 :, Barcelona, Spain)

ORIGINATING SOURCE

Date of Transaction
20200823083027.0
Cataloguing Rules (Descriptive Conventions))
pn

ELECTRONIC LOCATION AND ACCESS

Electronic name
 مطالعه متن کتاب 

[Book]

Y

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival