標(biāo)題: Titlebook: Critical Information Infrastructure Security; 5th International Wo Christos Xenakis,Stephen Wolthusen Conference proceedings 2011 Springer- [打印本頁] 作者: Carter 時間: 2025-3-21 18:11
書目名稱Critical Information Infrastructure Security影響因子(影響力)
書目名稱Critical Information Infrastructure Security影響因子(影響力)學(xué)科排名
書目名稱Critical Information Infrastructure Security網(wǎng)絡(luò)公開度
書目名稱Critical Information Infrastructure Security網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Critical Information Infrastructure Security被引頻次
書目名稱Critical Information Infrastructure Security被引頻次學(xué)科排名
書目名稱Critical Information Infrastructure Security年度引用
書目名稱Critical Information Infrastructure Security年度引用學(xué)科排名
書目名稱Critical Information Infrastructure Security讀者反饋
書目名稱Critical Information Infrastructure Security讀者反饋學(xué)科排名
作者: 彩色 時間: 2025-3-21 21:31
https://doi.org/10.1007/978-3-642-21694-7access control; anonymity; authentication; information warfare; intrusion detection; networking; privacy; s作者: eustachian-tube 時間: 2025-3-22 00:41
978-3-642-21693-0Springer-Verlag GmbH Berlin Heidelberg 2011作者: 使堅硬 時間: 2025-3-22 06:01
Conference proceedings 2011IS 2010, held in Athens, Greece in September 2010. The 12 revised full papers and two poster papers presented went through two rounds of reviewing and improvement and were selected from 30 submissions. The papers included address various techniques to realize the security of systems, communications, and data.作者: 食料 時間: 2025-3-22 09:34 作者: 陳舊 時間: 2025-3-22 16:54 作者: 陳舊 時間: 2025-3-22 18:53 作者: 我邪惡 時間: 2025-3-22 23:47 作者: Mercantile 時間: 2025-3-23 01:57
malous behaviours and also capable of reacting against them in advance. These mechanisms are known as Early Warning Systems (EWSs) and this will be precisely the main topic of this paper. More specifically, we present in this paper an EWS design based on a Wireless Sensor Network (using the ISA100.1作者: 偶像 時間: 2025-3-23 05:58 作者: 投射 時間: 2025-3-23 13:18 作者: Anthem 時間: 2025-3-23 14:20 作者: Substitution 時間: 2025-3-23 22:04 作者: 毛細血管 時間: 2025-3-24 00:17 作者: 震驚 時間: 2025-3-24 06:09
https://doi.org/10.1007/978-3-662-33786-8which delivers economical telephony that can clearly benefit both consumers and businesses, but it also provides a cheap method of mass advertising. Those bulks unsolicited calls are known as SPam over Internet Telephony (SPIT). In this paper we illustrate an anti-SPIT policy-based management (aSPM)作者: 讓你明白 時間: 2025-3-24 09:05 作者: 維持 時間: 2025-3-24 12:06
https://doi.org/10.1007/978-3-662-33787-5hnology and the potential benefits associated with it shows little sign of abating. Unfortunately the reality of modern information and communications systems involves a complex array of hardware, middleware, software, communications protocols and services, operated by a diverse set of stakeholders 作者: 跟隨 時間: 2025-3-24 16:06
Christos Xenakis,Stephen WolthusenUp-to-date- results.Fast track conference proceedings.State-of-the-art report作者: Colonoscopy 時間: 2025-3-24 20:20
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/c/image/239965.jpg作者: 相反放置 時間: 2025-3-25 03:12
0302-9743 of the 5th International Workshop on Critical Information Infrastructure Security, CRITIS 2010, held in Athens, Greece in September 2010. The 12 revised full papers and two poster papers presented went through two rounds of reviewing and improvement and were selected from 30 submissions. The papers 作者: uveitis 時間: 2025-3-25 04:56 作者: Ganglion 時間: 2025-3-25 09:40 作者: 流利圓滑 時間: 2025-3-25 12:28
https://doi.org/10.1007/978-3-662-33786-8gainst its intended goals. We provide model checking results that report upper bounds in the duration of call session establishment for the analyzed anti-SPIT policy over the Session Initiation Protocol (SIP) and prove the absence of deadlocks.作者: Crohns-disease 時間: 2025-3-25 17:24 作者: 變色龍 時間: 2025-3-25 23:49
The EU FP6 Integrated Project IRRIIS on Dependent Critical Infrastructures,h towards the communication between SCADA centers and risk estimation taking the situation in depending CIs into account will be presented here. Conclusions will be drawn, and challenges for future research in this area be identified.作者: 防御 時間: 2025-3-26 03:37 作者: 橡子 時間: 2025-3-26 07:53 作者: 變形詞 時間: 2025-3-26 10:40
Trust and Reputation for Information Exchange in Critical Infrastructures,is the proposed solution..The proposed solution is being applied to information exchange among interconnected CI in scope of the European FP7 MICIE project, in order to improve information accuracy and to protect each CI from using inconsistent and non trustable information about critical events.作者: Obituary 時間: 2025-3-26 16:40
Conference proceedings 2011IS 2010, held in Athens, Greece in September 2010. The 12 revised full papers and two poster papers presented went through two rounds of reviewing and improvement and were selected from 30 submissions. The papers included address various techniques to realize the security of systems, communications,作者: 表示問 時間: 2025-3-26 17:46
0302-9743 ed full papers and two poster papers presented went through two rounds of reviewing and improvement and were selected from 30 submissions. The papers included address various techniques to realize the security of systems, communications, and data.978-3-642-21693-0978-3-642-21694-7Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: 轎車 時間: 2025-3-26 22:52
Dziobek the “Methodology for Interdependencies Assessment” EU Project to asses inter-dependencies in ICT and Power System networks. The major project finding, metrics applicability results and scalability issues are described in the paper.作者: 使尷尬 時間: 2025-3-27 04:36
in a crowd. Cell-phone records are used to identify the location of callers on the ground and choose people close to an emergency scene in order to obtain information about the emergency and issue early warnings about changing resource requirements.作者: 夾克怕包裹 時間: 2025-3-27 05:18
r, we introduce the concept of Critical State Prediction, function that is used for anticipating the evolution of the system towards possible critical states. Finally we provide experimental comparative results that confirm the validity of the proposed approach.作者: 不感興趣 時間: 2025-3-27 11:44
Inter-dependency Assessment in the ICT-PS Network: The MIA Project Results, the “Methodology for Interdependencies Assessment” EU Project to asses inter-dependencies in ICT and Power System networks. The major project finding, metrics applicability results and scalability issues are described in the paper.作者: 膽汁 時間: 2025-3-27 14:36 作者: 冥界三河 時間: 2025-3-27 20:16 作者: 殖民地 時間: 2025-3-27 22:03
Weymannprevalence of long time delays, dynamic complexity and a tendency to view hazardous conditions as normal all contribute to long term crisis proneness. We argue that some common beliefs about crisis conditions actually are fallacies that must be overcome to avoid recurrent crises in the power generation and distribution sector.作者: GULP 時間: 2025-3-28 03:12 作者: 不自然 時間: 2025-3-28 10:08
mes) and explicitly model multiple adversarial . rather than a single omnipotent adversary so as to capture synchronisation and communication effects. As an example of the model’s capabilities, we derive targets for intrusion detection based on constraints on adversary action resulting from adversary-agent communication capabilities.作者: botany 時間: 2025-3-28 10:42
https://doi.org/10.1007/978-3-662-33786-8t a cloud provider-agnostic model for outsourcing both static and dynamic data to third parties, while preserving their confidentiality and integrity. In addition to a detailed presentation of our model, we also depict an evaluation of it, in terms of its capabilities and weaknesses.作者: 鋼盔 時間: 2025-3-28 18:39 作者: mosque 時間: 2025-3-28 21:32 作者: GLEAN 時間: 2025-3-29 02:44
A Formal Adversary Capability Model for SCADA Environments,mes) and explicitly model multiple adversarial . rather than a single omnipotent adversary so as to capture synchronisation and communication effects. As an example of the model’s capabilities, we derive targets for intrusion detection based on constraints on adversary action resulting from adversary-agent communication capabilities.作者: DOSE 時間: 2025-3-29 03:23
A Cloud Provider-Agnostic Secure Storage Protocol,t a cloud provider-agnostic model for outsourcing both static and dynamic data to third parties, while preserving their confidentiality and integrity. In addition to a detailed presentation of our model, we also depict an evaluation of it, in terms of its capabilities and weaknesses.作者: 不來 時間: 2025-3-29 10:52
Inter-dependency Assessment in the ICT-PS Network: The MIA Project Results,onduct appropriate networks inter-dependencies measurements undermines the possibility that the Critical Infrastructures protection programs can correctly assign resources and efforts for mitigation solutions targeted to the most important risks..This paper describes the approach and metrics used in作者: Defraud 時間: 2025-3-29 13:33
A Quantitative Risk Analysis Approach for Deliberate Threats,. However, the majority of the existing qualitative/empirical methods fail to adhere to the terminology defined by ISO 27000-series and treat deliberate threats in a misleading way. In this paper, a quantitative risk analysis approach for deliberate threats is introduced. The proposed approach follo作者: Progesterone 時間: 2025-3-29 18:57 作者: 輕率的你 時間: 2025-3-29 20:14 作者: 小樣他閑聊 時間: 2025-3-30 02:02 作者: 和音 時間: 2025-3-30 04:52
Emergency Response with Proactive Crowd-Sourcing Reverse-111,d can be contacted by an Emergency Response Centre (ERC), to provide relevant and useful information pertaining to an emergency situation. We have co-developed a variety of first responder agents who can participate within a response simulation wherein participation is solicited from local citizens 作者: negligence 時間: 2025-3-30 10:15 作者: orthopedist 時間: 2025-3-30 14:40
A Formal Adversary Capability Model for SCADA Environments,model in which an adversary fully participates in network communication. In the case of control (supervisory control and data acquisition, SCADA) systems, this set of assumptions can lead to undesirable results as constraints on communication affect both defender and adversary capabilities. These in