標(biāo)題: Titlebook: Critical Information Infrastructures Security; 7th International Wo Bernhard M. H?mmerli,Nils Kalstad Svendsen,Javier Conference proceedin [打印本頁(yè)] 作者: 太平間 時(shí)間: 2025-3-21 18:44
書目名稱Critical Information Infrastructures Security影響因子(影響力)
書目名稱Critical Information Infrastructures Security影響因子(影響力)學(xué)科排名
書目名稱Critical Information Infrastructures Security網(wǎng)絡(luò)公開度
書目名稱Critical Information Infrastructures Security網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Critical Information Infrastructures Security被引頻次
書目名稱Critical Information Infrastructures Security被引頻次學(xué)科排名
書目名稱Critical Information Infrastructures Security年度引用
書目名稱Critical Information Infrastructures Security年度引用學(xué)科排名
書目名稱Critical Information Infrastructures Security讀者反饋
書目名稱Critical Information Infrastructures Security讀者反饋學(xué)科排名
作者: 施魔法 時(shí)間: 2025-3-21 21:55
Enhancing SIEM Technology to Protect Critical Infrastructuresnd becoming more sophisticated. Typically, SCADA has been designed without having security in mind, which is indeed approached by reusing solutions to protect solely Information Technology (IT) based infrastructures, such as the Security Information and Events Management (SIEM) systems. According to作者: 保全 時(shí)間: 2025-3-22 01:33
PDR: A Prevention, Detection and Response Mechanism for Anomalies in Energy Control Systems systems. Despite attempts to address these current issues, there is still a particular lack of investigation in these areas, and in particular in dynamic and automatic proactive solutions. In this paper we propose a mechanism, which is called PDR, with the capability of anticipating anomalies, dete作者: Deduct 時(shí)間: 2025-3-22 05:44 作者: NICE 時(shí)間: 2025-3-22 11:58
Improving Control System Cyber-State Awareness Using Known Secure Sensor Measurements - the Known Secure Sensor Measurements (KSSM) method. The KSSM concept relies on physical measurements to detect malicious falsification of the control systems state. The KSSM method can be incrementally integrated with already installed control systems for enhanced resilience. This paper reviews t作者: Crumple 時(shí)間: 2025-3-22 14:33
The Effects of Network Link Unreliability for Leader Election Algorithm in a Smart Grid Systemtal control through computation and communication, one can improve the overall reliability of a network. However, a system designer must consider what effects system unreliability in the cyber-domain can have on the physical distribution system. In this work, we examine the consequences of network u作者: Crumple 時(shí)間: 2025-3-22 18:11
Distributed Generation and Resilience in Power Grids of the distributed generation can drive a power grid beyond its design parameters. In order to overcome such a problem, we propose a topological algorithm derived from the field of Complex Networks to allocate distributed generation sources in an existing power grid.作者: Notorious 時(shí)間: 2025-3-22 22:18 作者: Prostaglandins 時(shí)間: 2025-3-23 01:43 作者: 責(zé)怪 時(shí)間: 2025-3-23 06:26
Modeling Emergency Response Plans with Coloured Petri Netsequate management of emergencies. In particular, emergency response plans define the interactions and operations to be performed inside the infrastructure and among different systems during the occurrence of emergencies. The criticality of these systems need a proper methodology for the analysis of 作者: 忘恩負(fù)義的人 時(shí)間: 2025-3-23 13:41
Distributed Identity Based Private Key Generation for SCADA Systemsriticality for society at large. There is an urgent need for the consideration of security in their design, and for the analysis of the related vulnerabilities and potential threats. The high exposure of industrial critical infrastructure to such threats is mainly due to the intrinsic weakness of th作者: Musculoskeletal 時(shí)間: 2025-3-23 13:56
A Trusted Computing Architecture for Secure Substation Automationtimize specified system objectives based on physical properties, physical constraints, and the current and estimated state of the system. Such systems usually require support for security and performance guarantees: wrongly received or missed commands can render the entire system unstable. Yet, secu作者: 容易做 時(shí)間: 2025-3-23 20:35
Probabilistic Model Checking of CAPTCHA Admission Control for DoS Resistant Anti-SPIT Protectionworks to transmit voice and multimedia data, thus providing extreme cost savings. On the other hand, this technology has inherited drawbacks, like SPAM over Internet Telephony (SPIT). A well-established method to tackle SPIT is the use of CAPTCHAs. CAPTCHAs are vulnerable to Denial of Service (DoS) 作者: 使虛弱 時(shí)間: 2025-3-23 23:56 作者: 狗舍 時(shí)間: 2025-3-24 02:54
Algebraic Analysis of Attack Impacts and Countermeasures in Critical Infrastructuresomponents lead to complex interactions. Calculating the possible impacts of attacks and the success of proposed countermeasures in such environments represents a severe problem. We propose a process algebraic technique as a means of affecting such calculations. Our approach allows us to demonstrate 作者: 虛弱 時(shí)間: 2025-3-24 09:56
Evaluation of Resilience of Interconnected Systems Based on Stability Analysisal functional dependencies. Each system is identified by a node of a directed graph, whose arcs represent such dependencies. In case of malfunction in a node, the failure may propagate to the other nodes with a possible cascading effect. The system behavior under failures is analyzed in a simple cas作者: conjunctiva 時(shí)間: 2025-3-24 12:05 作者: Intellectual 時(shí)間: 2025-3-24 17:17
Contaminant Detection in Urban Water Distribution Networks Using Chlorine Measurementsor measurements, which are compare to certain computed upper and lower periodic bounds. The bounds are computed using randomized simulations aimed at capturing the variations in chlorine concentration due to the significant uncertainty in the water demand patterns, average nodal consumptions, roughn作者: Neutral-Spine 時(shí)間: 2025-3-24 22:12
Collaboration between Competing Mobile Network Operators to Improve CIIPtional continuity despite of the potential loss of system integrity and malware attacks. Sharing information about security related incidents allows MNOs to better react to attacks and anomalies, and to mitigate the impact of the observed phenomena. The fear to risk its reputation may hinder an MNO 作者: Haphazard 時(shí)間: 2025-3-25 02:44 作者: Evacuate 時(shí)間: 2025-3-25 04:50 作者: 最高峰 時(shí)間: 2025-3-25 07:52
es. In comparison with other methods, such as attack/defense trees and attack graphs, our approach allows us to relax assumptions regarding the ordering of events by applying structural reasoning to outcomes and reducing the state space for the analysis. An obvious application is to risk management.作者: 脊椎動(dòng)物 時(shí)間: 2025-3-25 13:40 作者: Definitive 時(shí)間: 2025-3-25 19:30
ibution network, for which on-line chlorine concentration sensors are assumed to have been installed at certain locations following an optimization procedure. The results indicate that by using the periodic bounds computed from the randomized simulations, for the proposed benchmark, contamination events are detected within reasonable time.作者: cogitate 時(shí)間: 2025-3-25 20:17 作者: Exposition 時(shí)間: 2025-3-26 03:15 作者: AVERT 時(shí)間: 2025-3-26 06:27 作者: Agronomy 時(shí)間: 2025-3-26 08:59
System Dynamics for Railway Infrastructure Protectionnd, we used a System Dynamics approach to model how the different factors influence the railway station target attractiveness, fragility and vulnerability. Specifically, a deep analysis of past incidents (and near incidents) allows us to quantify the effectiveness of the different elements.作者: 投票 時(shí)間: 2025-3-26 14:29
Contaminant Detection in Urban Water Distribution Networks Using Chlorine Measurementsibution network, for which on-line chlorine concentration sensors are assumed to have been installed at certain locations following an optimization procedure. The results indicate that by using the periodic bounds computed from the randomized simulations, for the proposed benchmark, contamination events are detected within reasonable time.作者: Inculcate 時(shí)間: 2025-3-26 18:32
Das Eisen-Kohlenstoff-Diagramm,tion (GET) module collects security data from heterogeneous sources, by providing intelligence at the edge of the SIEM; the Resilient Storage (RS), reliably stores data related to relevant security breaches. We illustrate a prototypal deployment for the dam monitoring and control case study.作者: Mnemonics 時(shí)間: 2025-3-26 22:57
Die Verteilung des Kohlenstoffs im Stahl,functional capacities by evaluating its efficacy and precision in the prediction and detection of disturbances. With this, the entire system is able to know the real reliability of its services and its activity in remote substations at all times.作者: occult 時(shí)間: 2025-3-27 04:47 作者: 鉗子 時(shí)間: 2025-3-27 08:24
components and a novel access control structure that enforces . (availability) policies, we show how to develop IEC/TR 61850-90-5 compliant substation automation systems that are resilient. We demonstrate the feasibility of our approach by analyzing and experimenting with an open source IEC/TR 61850-90-5 implementation.作者: ordain 時(shí)間: 2025-3-27 12:56
bilities and risks in dependent critical infrastructure. To validate the analytical framework we have carried out a series of experiments on a Cyber Range facility, simulating dependent information infrastructures. This paper presents results obtained from the experiments.作者: CARE 時(shí)間: 2025-3-27 14:05 作者: 鞠躬 時(shí)間: 2025-3-27 21:31 作者: Arctic 時(shí)間: 2025-3-28 00:53 作者: 百靈鳥 時(shí)間: 2025-3-28 05:42
A Trusted Computing Architecture for Secure Substation Automationcomponents and a novel access control structure that enforces . (availability) policies, we show how to develop IEC/TR 61850-90-5 compliant substation automation systems that are resilient. We demonstrate the feasibility of our approach by analyzing and experimenting with an open source IEC/TR 61850-90-5 implementation.作者: 一條卷發(fā) 時(shí)間: 2025-3-28 07:39
Reasoning about Vulnerabilities in Dependent Information Infrastructures: A Cyber Range Experimentbilities and risks in dependent critical infrastructure. To validate the analytical framework we have carried out a series of experiments on a Cyber Range facility, simulating dependent information infrastructures. This paper presents results obtained from the experiments.作者: 神化怪物 時(shí)間: 2025-3-28 13:47
Approach to Enhance the Efficiency of Security Operation Centers to Heterogeneous IDS Landscapes a standardized IDS parameterization independent of its scope (host based or network based IDS) and vendor. The exchange of the parameterization was integrated via communication modules in three open source IDS to demonstrate the common applicability of the format. An enhanced IDS model of the IETF will be illustrated.作者: Apraxia 時(shí)間: 2025-3-28 15:44 作者: Synovial-Fluid 時(shí)間: 2025-3-28 22:29 作者: HACK 時(shí)間: 2025-3-29 00:41
Breaking Nondeducible Attacks on the Smart Grid its normal operation. Through the use of information flow properties, the attack is proven to be nondeducible and thus unidentifiable in a current smart grid architecture. An adaptation of mutual exclusion is then applied to break the nondeducible attack.作者: 青春期 時(shí)間: 2025-3-29 03:25 作者: Encapsulate 時(shí)間: 2025-3-29 07:29 作者: Macronutrients 時(shí)間: 2025-3-29 12:15
Conference proceedings 2013TIS 2012, held in Lillehammer, Norway, in September 2012. The 23 revised full papers were thoroughly reviewed and selected from 67 submissions. The papers are structured in the following topical sections: intrusion management; smart metering and grid, analysis and modeling; SCADA; cyber issues; CI a作者: ACTIN 時(shí)間: 2025-3-29 16:48 作者: 道學(xué)氣 時(shí)間: 2025-3-29 22:30
https://doi.org/10.1007/978-3-662-36622-6 affords an analysis at both the level of abstraction of functionality and the type of functionality within a CPS. The CPS-CSH model is developed and examples from reliability for electric smart grid systems and security for water distribution systems are presented.作者: labyrinth 時(shí)間: 2025-3-30 03:37 作者: reject 時(shí)間: 2025-3-30 07:38
a node, the failure may propagate to the other nodes with a possible cascading effect. The system behavior under failures is analyzed in a simple case study by using well-established stability tools. Based on such results, metrics of resilience are discussed.作者: CRANK 時(shí)間: 2025-3-30 10:01
CPS-CSH Cyber-Physical Analysis and Design affords an analysis at both the level of abstraction of functionality and the type of functionality within a CPS. The CPS-CSH model is developed and examples from reliability for electric smart grid systems and security for water distribution systems are presented.作者: PSA-velocity 時(shí)間: 2025-3-30 12:53 作者: 功多汁水 時(shí)間: 2025-3-30 19:08 作者: GUMP 時(shí)間: 2025-3-31 00:36 作者: LASH 時(shí)間: 2025-3-31 03:35
Das Eisen-Kohlenstoff-Diagramm, a standardized IDS parameterization independent of its scope (host based or network based IDS) and vendor. The exchange of the parameterization was integrated via communication modules in three open source IDS to demonstrate the common applicability of the format. An enhanced IDS model of the IETF will be illustrated.作者: muster 時(shí)間: 2025-3-31 08:04
Das Eisen-Kohlenstoff-Diagramm,at destabilisation. In this paper we study a smart metering device that uses a trusted platform for storage and communication of metering data, and show that despite the hard core security, there is still room for deployment of a second level of defence as an embedded real-time anomaly detector that can cover both the cyber and physical domains.作者: Cholesterol 時(shí)間: 2025-3-31 10:54 作者: doxazosin 時(shí)間: 2025-3-31 13:44
Die Bestandesgründung oder Verjüngung its normal operation. Through the use of information flow properties, the attack is proven to be nondeducible and thus unidentifiable in a current smart grid architecture. An adaptation of mutual exclusion is then applied to break the nondeducible attack.作者: 語(yǔ)言學(xué) 時(shí)間: 2025-3-31 20:22
C. Trollto share information that could help other MNOs to improve their protection and assure operational continuity. The contributions of this paper are technical solutions for collaboration between competing MNOs, which prevent loss of reputation and thus improve the acceptance to share information.作者: 執(zhí)拗 時(shí)間: 2025-4-1 00:10