Critical infrastructure security : assessment, prevention, detection, response / edited by Francesco Flammini.
Series: Information & communication technologiesPublication details: Southampton ; Boston : WIT Press, c2012.Description: 303 p. : ill. ; 25 cmISBN:- 9781845645625 (hbk.)
- 9781845645632
- 1845645626 (hbk.)
- 006.8 22 CRI
- QA76.9.A25 C748 2012
Item type | Current library | Call number | Copy number | Status | Date due | Barcode |
---|---|---|---|---|---|---|
Book Open Access | Engineering Library | 006.8 CRI (Browse shelf(Opens below)) | 1 | Available | BUML23080401 | |
Book Open Access | Engineering Library | 006.8 CRI (Browse shelf(Opens below)) | 2 | Available | BUML23080402 |
Contents
PART I: Fundamentals of security risk and Vulnerability Assessment
1: Model-based risk analysis for critical infrastructures
1. Introduction
2. The critical infrastructure problem
3. Tools
4. Multi-criterion tools (CARVER and MSRAM)
5. CI/KR as a network
Etc.
2: Physical vulnerability assessment
1. Introduction
2. Common techniques for finding vulnerabilities
3. VA best practices
4. Vulnerability myths and mistakes
PART II: Modelling and simulation Tools for critical infrastructures
3: Modelling and simulation of critical infrastructures
1.Introduction
2.Interdependency modelling
3.Holistic Approaches
4.Critical infrastructures as complex systems
5.Simulative approaches
Etc.
4:Graphical formalism for modelling critical infrastructures
1.Introduction
2.Requirements for CI modelling and simulation
3.Graphical formalisation for CI modelling and simulation
4.Practical Experiences in modelling CIs: meeting the requirements with SAN
5.Conclusions
5: Sematic interoperability among federated simulators of critical infrastructures-DIESIS project
1.Introduction
2.Related works and initiatives
3.DIESIS project
4.Conclusion
Etc.
6: Game theory in infrastructure security
1.Introduction
2.Game-theoretic models
3.Limitations of game-theoretic models
4.Conclusion
Etc.
PART III: Cybersecurity in Information and SCADA Systems
7: Modelling, measuring and managing information technology risks
1.Introduction
2.What is risk with respect to information systems?
3.Why is it important to manage risk?
4.Managing risk at organizational level
5.How is risk assessed?
Etc.
8: trustworthiness evaluation of critical information infrastructures
1.Introduction
2.Dependability and security evaluation approaches
3.On the evaluation of Financial Infrastructure protection (FIP)
4.On the evaluation of CIIP
5.Conclusion
Etc.
9: Network resilience
1.Introduction
2.A component-based framework for improving network resilience in CIs
3.Intrusion detection and reaction in satellite networks
4.Detection and remediation of a distributed attack over an IP-based network
5.Diagnosis-driven reconfiguration of WSNs
Etc.
10: Wireless sensor networks for critical infrastructure protection
1.Introduction
2.Security threat analysis
3.Survey of the state of the art
4.Conclusions and identification of further research topics
PART IV: Monitoring and Surveillance Technologies
11: Intelligent video surveillance
1.Introduction
2.Architecture of an IVS system
3.Examples of applications
Etc.
12: Audio Surveillance
1.Introduction
2.Sound recognition for audio surveillance
3.A representative picture of the related literature
Etc.
13: Terahertz for weapon and explosive detection
1.Introduction
2.Terahertz technology
3.Terahertz for weapon detection
Etc.
14:Structural health monitoring
1. introduction
2. structural evaluation
3. sensor selection, etc
15: Networks of simple sensors foe detecting emplacement of improvised explosive devices
1. clues to IED emplacement
2. sensor management
3. experiments, etc
Part V Security systems integration and Alarm Management
16 : Security systems, Design and Integration
17. multisource information fusion for critical infrastructure situation awareness
18 Simulation-Based learning in the physical security industry
19. Frameworks and tools for imergence response and crisis management
Includes bibliographical references.
There are no comments on this title.