Cyber Security and Critical Infrastructures

This book contains the manuscripts that were accepted for publication in the MDPI Special Topic "Cyber Security and Critical Infrastructure" after a rigorous peer-review process. Authors from academia, government and industry contributed their innovative solutions, consistent with the int...

Full description

Saved in:
Bibliographic Details
HerausgeberIn:
Sonstige:
Year of Publication:2022
Language:English
Physical Description:1 electronic resource (326 p.)
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 02780nam-a2200661z--4500
001 993560443404498
005 20231214133214.0
006 m o d
007 cr|mn|---annan
008 202209s2022 xx |||||o ||| 0|eng d
035 |a (CKB)5680000000080758 
035 |a (oapen)https://directory.doabooks.org/handle/20.500.12854/92047 
035 |a (EXLCZ)995680000000080758 
041 0 |a eng 
100 1 |a Maglaras, Leandros  |4 edt 
245 1 0 |a Cyber Security and Critical Infrastructures 
260 |a Basel  |b MDPI Books  |c 2022 
300 |a 1 electronic resource (326 p.) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
520 |a This book contains the manuscripts that were accepted for publication in the MDPI Special Topic "Cyber Security and Critical Infrastructure" after a rigorous peer-review process. Authors from academia, government and industry contributed their innovative solutions, consistent with the interdisciplinary nature of cybersecurity. The book contains 16 articles: an editorial explaining current challenges, innovative solutions, real-world experiences including critical infrastructure, 15 original papers that present state-of-the-art innovative solutions to attacks on critical systems, and a review of cloud, edge computing, and fog's security and privacy issues. 
546 |a English 
650 7 |a Technology: general issues  |2 bicssc 
650 7 |a History of engineering & technology  |2 bicssc 
653 |a cybersecurity 
653 |a critical Infrastructures 
653 |a privacy preservation 
653 |a risk management 
653 |a big data 
653 |a Internet of Things 
653 |a blockchain 
653 |a cyber threats 
653 |a cyber security and privacy policy 
653 |a hybrid war 
653 |a cybercrime 
653 |a COVID-19 pandemic 
653 |a coronavirus 
653 |a smart grids 
653 |a cyber security modeling and simulation 
653 |a cyber–physical systems 
653 |a industrial control systems 
653 |a network security and protocols 
653 |a cyber threat intelligence 
653 |a resiliency and security of cyber systems 
653 |a hardware security solutions 
653 |a intrusion detection 
653 |a secure communication protocols 
653 |a malware analysis 
653 |a attribution of cyber attacks 
653 |a simulation and test beds for security evaluation of critical infrastructures 
776 |z 3-0365-4845-9 
776 |z 3-0365-4846-7 
700 1 |a Janicke, Helge  |4 edt 
700 1 |a Ferrag, Mohamed Amine  |4 edt 
700 1 |a Maglaras, Leandros  |4 oth 
700 1 |a Janicke, Helge  |4 oth 
700 1 |a Ferrag, Mohamed Amine  |4 oth 
906 |a BOOK 
ADM |b 2023-12-15 05:46:35 Europe/Vienna  |f system  |c marc21  |a 2022-09-22 08:09:39 Europe/Vienna  |g false 
AVE |i DOAB Directory of Open Access Books  |P DOAB Directory of Open Access Books  |x https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&portfolio_pid=5344131370004498&Force_direct=true  |Z 5344131370004498  |b Available  |8 5344131370004498