Cyber Security and Critical Infrastructures
This book contains the manuscripts that were accepted for publication in the MDPI Special Topic "Cyber Security and Critical Infrastructure" after a rigorous peer-review process. Authors from academia, government and industry contributed their innovative solutions, consistent with the int...
Saved in:
HerausgeberIn: | |
---|---|
Sonstige: | |
Year of Publication: | 2022 |
Language: | English |
Physical Description: | 1 electronic resource (326 p.) |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
993560443404498 |
---|---|
ctrlnum |
(CKB)5680000000080758 (oapen)https://directory.doabooks.org/handle/20.500.12854/92047 (EXLCZ)995680000000080758 |
collection |
bib_alma |
record_format |
marc |
spelling |
Maglaras, Leandros edt Cyber Security and Critical Infrastructures Basel MDPI Books 2022 1 electronic resource (326 p.) text txt rdacontent computer c rdamedia online resource cr rdacarrier This book contains the manuscripts that were accepted for publication in the MDPI Special Topic "Cyber Security and Critical Infrastructure" after a rigorous peer-review process. Authors from academia, government and industry contributed their innovative solutions, consistent with the interdisciplinary nature of cybersecurity. The book contains 16 articles: an editorial explaining current challenges, innovative solutions, real-world experiences including critical infrastructure, 15 original papers that present state-of-the-art innovative solutions to attacks on critical systems, and a review of cloud, edge computing, and fog's security and privacy issues. English Technology: general issues bicssc History of engineering & technology bicssc cybersecurity critical Infrastructures privacy preservation risk management big data Internet of Things blockchain cyber threats cyber security and privacy policy hybrid war cybercrime COVID-19 pandemic coronavirus smart grids cyber security modeling and simulation cyber–physical systems industrial control systems network security and protocols cyber threat intelligence resiliency and security of cyber systems hardware security solutions intrusion detection secure communication protocols malware analysis attribution of cyber attacks simulation and test beds for security evaluation of critical infrastructures 3-0365-4845-9 3-0365-4846-7 Janicke, Helge edt Ferrag, Mohamed Amine edt Maglaras, Leandros oth Janicke, Helge oth Ferrag, Mohamed Amine oth |
language |
English |
format |
eBook |
author2 |
Janicke, Helge Ferrag, Mohamed Amine Maglaras, Leandros Janicke, Helge Ferrag, Mohamed Amine |
author_facet |
Janicke, Helge Ferrag, Mohamed Amine Maglaras, Leandros Janicke, Helge Ferrag, Mohamed Amine |
author2_variant |
l m lm h j hj m a f ma maf |
author2_role |
HerausgeberIn HerausgeberIn Sonstige Sonstige Sonstige |
title |
Cyber Security and Critical Infrastructures |
spellingShingle |
Cyber Security and Critical Infrastructures |
title_full |
Cyber Security and Critical Infrastructures |
title_fullStr |
Cyber Security and Critical Infrastructures |
title_full_unstemmed |
Cyber Security and Critical Infrastructures |
title_auth |
Cyber Security and Critical Infrastructures |
title_new |
Cyber Security and Critical Infrastructures |
title_sort |
cyber security and critical infrastructures |
publisher |
MDPI Books |
publishDate |
2022 |
physical |
1 electronic resource (326 p.) |
isbn |
3-0365-4845-9 3-0365-4846-7 |
illustrated |
Not Illustrated |
work_keys_str_mv |
AT maglarasleandros cybersecurityandcriticalinfrastructures AT janickehelge cybersecurityandcriticalinfrastructures AT ferragmohamedamine cybersecurityandcriticalinfrastructures |
status_str |
n |
ids_txt_mv |
(CKB)5680000000080758 (oapen)https://directory.doabooks.org/handle/20.500.12854/92047 (EXLCZ)995680000000080758 |
carrierType_str_mv |
cr |
is_hierarchy_title |
Cyber Security and Critical Infrastructures |
author2_original_writing_str_mv |
noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField |
_version_ |
1787551963017117697 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02780nam-a2200661z--4500</leader><controlfield tag="001">993560443404498</controlfield><controlfield tag="005">20231214133214.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr|mn|---annan</controlfield><controlfield tag="008">202209s2022 xx |||||o ||| 0|eng d</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)5680000000080758</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(oapen)https://directory.doabooks.org/handle/20.500.12854/92047</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)995680000000080758</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Maglaras, Leandros</subfield><subfield code="4">edt</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber Security and Critical Infrastructures</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Basel</subfield><subfield code="b">MDPI Books</subfield><subfield code="c">2022</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 electronic resource (326 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This book contains the manuscripts that were accepted for publication in the MDPI Special Topic "Cyber Security and Critical Infrastructure" after a rigorous peer-review process. Authors from academia, government and industry contributed their innovative solutions, consistent with the interdisciplinary nature of cybersecurity. The book contains 16 articles: an editorial explaining current challenges, innovative solutions, real-world experiences including critical infrastructure, 15 original papers that present state-of-the-art innovative solutions to attacks on critical systems, and a review of cloud, edge computing, and fog's security and privacy issues.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Technology: general issues</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">History of engineering & technology</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">cybersecurity</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">critical Infrastructures</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">privacy preservation</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">risk management</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">big data</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Internet of Things</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">blockchain</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">cyber threats</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">cyber security and privacy policy</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">hybrid war</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">cybercrime</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">COVID-19 pandemic</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">coronavirus</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">smart grids</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">cyber security modeling and simulation</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">cyber–physical systems</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">industrial control systems</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">network security and protocols</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">cyber threat intelligence</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">resiliency and security of cyber systems</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">hardware security solutions</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">intrusion detection</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">secure communication protocols</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">malware analysis</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">attribution of cyber attacks</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">simulation and test beds for security evaluation of critical infrastructures</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">3-0365-4845-9</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">3-0365-4846-7</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Janicke, Helge</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ferrag, Mohamed Amine</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Maglaras, Leandros</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Janicke, Helge</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ferrag, Mohamed Amine</subfield><subfield code="4">oth</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2023-12-15 05:46:35 Europe/Vienna</subfield><subfield code="f">system</subfield><subfield code="c">marc21</subfield><subfield code="a">2022-09-22 08:09:39 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="i">DOAB Directory of Open Access Books</subfield><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&portfolio_pid=5344131370004498&Force_direct=true</subfield><subfield code="Z">5344131370004498</subfield><subfield code="b">Available</subfield><subfield code="8">5344131370004498</subfield></datafield></record></collection> |