Cyber Security and Critical Infrastructures

This book contains the manuscripts that were accepted for publication in the MDPI Special Topic "Cyber Security and Critical Infrastructure" after a rigorous peer-review process. Authors from academia, government and industry contributed their innovative solutions, consistent with the int...

Full description

Saved in:
Bibliographic Details
HerausgeberIn:
Sonstige:
Year of Publication:2022
Language:English
Physical Description:1 electronic resource (326 p.)
Tags: Add Tag
No Tags, Be the first to tag this record!
id 993560443404498
ctrlnum (CKB)5680000000080758
(oapen)https://directory.doabooks.org/handle/20.500.12854/92047
(EXLCZ)995680000000080758
collection bib_alma
record_format marc
spelling Maglaras, Leandros edt
Cyber Security and Critical Infrastructures
Basel MDPI Books 2022
1 electronic resource (326 p.)
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
This book contains the manuscripts that were accepted for publication in the MDPI Special Topic "Cyber Security and Critical Infrastructure" after a rigorous peer-review process. Authors from academia, government and industry contributed their innovative solutions, consistent with the interdisciplinary nature of cybersecurity. The book contains 16 articles: an editorial explaining current challenges, innovative solutions, real-world experiences including critical infrastructure, 15 original papers that present state-of-the-art innovative solutions to attacks on critical systems, and a review of cloud, edge computing, and fog's security and privacy issues.
English
Technology: general issues bicssc
History of engineering & technology bicssc
cybersecurity
critical Infrastructures
privacy preservation
risk management
big data
Internet of Things
blockchain
cyber threats
cyber security and privacy policy
hybrid war
cybercrime
COVID-19 pandemic
coronavirus
smart grids
cyber security modeling and simulation
cyber–physical systems
industrial control systems
network security and protocols
cyber threat intelligence
resiliency and security of cyber systems
hardware security solutions
intrusion detection
secure communication protocols
malware analysis
attribution of cyber attacks
simulation and test beds for security evaluation of critical infrastructures
3-0365-4845-9
3-0365-4846-7
Janicke, Helge edt
Ferrag, Mohamed Amine edt
Maglaras, Leandros oth
Janicke, Helge oth
Ferrag, Mohamed Amine oth
language English
format eBook
author2 Janicke, Helge
Ferrag, Mohamed Amine
Maglaras, Leandros
Janicke, Helge
Ferrag, Mohamed Amine
author_facet Janicke, Helge
Ferrag, Mohamed Amine
Maglaras, Leandros
Janicke, Helge
Ferrag, Mohamed Amine
author2_variant l m lm
h j hj
m a f ma maf
author2_role HerausgeberIn
HerausgeberIn
Sonstige
Sonstige
Sonstige
title Cyber Security and Critical Infrastructures
spellingShingle Cyber Security and Critical Infrastructures
title_full Cyber Security and Critical Infrastructures
title_fullStr Cyber Security and Critical Infrastructures
title_full_unstemmed Cyber Security and Critical Infrastructures
title_auth Cyber Security and Critical Infrastructures
title_new Cyber Security and Critical Infrastructures
title_sort cyber security and critical infrastructures
publisher MDPI Books
publishDate 2022
physical 1 electronic resource (326 p.)
isbn 3-0365-4845-9
3-0365-4846-7
illustrated Not Illustrated
work_keys_str_mv AT maglarasleandros cybersecurityandcriticalinfrastructures
AT janickehelge cybersecurityandcriticalinfrastructures
AT ferragmohamedamine cybersecurityandcriticalinfrastructures
status_str n
ids_txt_mv (CKB)5680000000080758
(oapen)https://directory.doabooks.org/handle/20.500.12854/92047
(EXLCZ)995680000000080758
carrierType_str_mv cr
is_hierarchy_title Cyber Security and Critical Infrastructures
author2_original_writing_str_mv noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
_version_ 1787551963017117697
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02780nam-a2200661z--4500</leader><controlfield tag="001">993560443404498</controlfield><controlfield tag="005">20231214133214.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr|mn|---annan</controlfield><controlfield tag="008">202209s2022 xx |||||o ||| 0|eng d</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)5680000000080758</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(oapen)https://directory.doabooks.org/handle/20.500.12854/92047</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)995680000000080758</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Maglaras, Leandros</subfield><subfield code="4">edt</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber Security and Critical Infrastructures</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Basel</subfield><subfield code="b">MDPI Books</subfield><subfield code="c">2022</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 electronic resource (326 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This book contains the manuscripts that were accepted for publication in the MDPI Special Topic "Cyber Security and Critical Infrastructure" after a rigorous peer-review process. Authors from academia, government and industry contributed their innovative solutions, consistent with the interdisciplinary nature of cybersecurity. The book contains 16 articles: an editorial explaining current challenges, innovative solutions, real-world experiences including critical infrastructure, 15 original papers that present state-of-the-art innovative solutions to attacks on critical systems, and a review of cloud, edge computing, and fog's security and privacy issues.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Technology: general issues</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">History of engineering &amp; technology</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">cybersecurity</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">critical Infrastructures</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">privacy preservation</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">risk management</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">big data</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Internet of Things</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">blockchain</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">cyber threats</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">cyber security and privacy policy</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">hybrid war</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">cybercrime</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">COVID-19 pandemic</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">coronavirus</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">smart grids</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">cyber security modeling and simulation</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">cyber–physical systems</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">industrial control systems</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">network security and protocols</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">cyber threat intelligence</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">resiliency and security of cyber systems</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">hardware security solutions</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">intrusion detection</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">secure communication protocols</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">malware analysis</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">attribution of cyber attacks</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">simulation and test beds for security evaluation of critical infrastructures</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">3-0365-4845-9</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">3-0365-4846-7</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Janicke, Helge</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ferrag, Mohamed Amine</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Maglaras, Leandros</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Janicke, Helge</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ferrag, Mohamed Amine</subfield><subfield code="4">oth</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2023-12-15 05:46:35 Europe/Vienna</subfield><subfield code="f">system</subfield><subfield code="c">marc21</subfield><subfield code="a">2022-09-22 08:09:39 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="i">DOAB Directory of Open Access Books</subfield><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&amp;portfolio_pid=5344131370004498&amp;Force_direct=true</subfield><subfield code="Z">5344131370004498</subfield><subfield code="b">Available</subfield><subfield code="8">5344131370004498</subfield></datafield></record></collection>