Контакты/Проезд  Доставка и Оплата Помощь/Возврат
История
  +7(495) 980-12-10
  пн-пт: 10-18 сб,вс: 11-18
  shop@logobook.ru
   
    Поиск книг                    Поиск по списку ISBN Расширенный поиск    
Найти
  Зарубежные издательства Российские издательства  
Авторы | Каталог книг | Издательства | Новинки | Учебная литература | Акции | Хиты | |
 

Cyber-Security in Critical Infrastructures: A Game-Theoretic Approach, Rass Stefan, Schauer Stefan, Kцnig Sandra


Варианты приобретения
Цена: 25155.00р.
Кол-во:
 о цене
Наличие: Отсутствует. Возможна поставка под заказ.

При оформлении заказа до: 2025-07-28
Ориентировочная дата поставки: Август-начало Сентября
При условии наличия книги у поставщика.

Добавить в корзину
в Мои желания

Автор: Rass Stefan, Schauer Stefan, Kцnig Sandra
Название:  Cyber-Security in Critical Infrastructures: A Game-Theoretic Approach
ISBN: 9783030469078
Издательство: Springer
Классификация:




ISBN-10: 3030469077
Обложка/Формат: Hardcover
Страницы: 297
Вес: 0.61 кг.
Дата издания: 25.06.2020
Серия: Advanced sciences and technologies for security applications
Язык: English
Издание: 1st ed. 2020
Иллюстрации: 50 tables, color; 28 illustrations, color; 43 illustrations, black and white; xi, 297 p. 71 illus., 28 illus. in color.
Размер: 23.39 x 15.60 x 1.91 cm
Читательская аудитория: Professional & vocational
Подзаголовок: A game-theoretic approach
Ссылка на Издательство: Link
Рейтинг:
Поставляется из: Германии
Описание: Much traditional security research has a narrow focus on specific attack scenarios or applications, and strives to make an attack practically impossible. A more recent approach to security views it as a scenario in which the cost of an attack exceeds the potential reward.


The Security of Critical Infrastructures: Risk, Resilience and Defense

Автор: Keupp Marcus Matthias
Название: The Security of Critical Infrastructures: Risk, Resilience and Defense
ISBN: 3030418251 ISBN-13(EAN): 9783030418250
Издательство: Springer
Рейтинг:
Цена: 20962.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: This book analyzes the security of critical infrastructures such as road, rail, water, health, and electricity networks that are vital for a nation`s society and economy, and assesses the resilience of these networks to intentional attacks.

Protecting Critical Infrastructures Against Cyber-Attack

Автор: Lukasik
Название: Protecting Critical Infrastructures Against Cyber-Attack
ISBN: 0198530161 ISBN-13(EAN): 9780198530169
Издательство: Taylor&Francis
Рейтинг:
Цена: 3980.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: The threat that is posed by 'cyber warriors' is illustrated by recent incidents such as the Year 2000 'Millennium bug'. Strategies to reduce the risk that cyber attack poses, at both individual and national level, are described and compared with the actions being taken by a number of Western
governments.

Cyber-Security: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare

Автор: Johnson Thomas A. Jr.
Название: Cyber-Security: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare
ISBN: 1482239221 ISBN-13(EAN): 9781482239225
Издательство: Taylor&Francis
Рейтинг:
Цена: 17609.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание:

The World Economic Forum regards the threat of cyber attack as one of the top five global risks confronting nations of the world today. Cyber attacks are increasingly targeting the core functions of the economies in nations throughout the world. The threat to attack critical infrastructures, disrupt critical services, and induce a wide range of damage is becoming more difficult to defend against. Cybersecurity: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare examines the current cyber threat landscape and discusses the strategies being used by governments and corporations to protect against these threats.

The book first provides a historical reference, detailing the emergence of viruses, worms, malware, and other cyber threats that created the need for the cybersecurity field. It then discusses the vulnerabilities of our critical infrastructures, the broad arsenal of cyber attack tools, and the various engineering design issues involved in protecting our infrastructures. It goes on to cover cyber intelligence tactics, recent examples of cyber conflict and warfare, and the key issues in formulating a national strategy to defend against cyber warfare.

The book also discusses how to assess and measure the cost of cybersecurity. It examines the many associated cost factors and presents the results of several important industry-based economic studies of security breaches that have occurred within many nations. The book concludes with a look at future trends in cybersecurity. It discusses the potential impact of industry-wide transformational changes, such as virtualization, social media, cloud computing, structured and unstructured data, big data, and data analytics.

Cyber-physical threat intelligence for critical infrastructures security

Название: Cyber-physical threat intelligence for critical infrastructures security
ISBN: 1680836862 ISBN-13(EAN): 9781680836868
Издательство: Mare Nostrum (Eurospan)
Рейтинг:
Цена: 12335.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Presents integrated (cyber and physical) security approaches and technologies for the critical infrastructures that underpin our societies. Specifically, the book introduces advanced techniques for threat detection, risk assessment and security information sharing, based on leading edge technologies.

Securing Critical Infrastructures and Critical Control Systems: Approaches for Threat Protection

Автор: Christopher Laing, Atta Badii, Paul Vickers
Название: Securing Critical Infrastructures and Critical Control Systems: Approaches for Threat Protection
ISBN: 1466626593 ISBN-13(EAN): 9781466626591
Издательство: Mare Nostrum (Eurospan)
Рейтинг:
Цена: 28413.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: The increased use of technology is necessary in order for industrial control systems to maintain and monitor industrial, infrastructural, or environmental processes. The need to secure and identify threats to the system is equally critical. <br><br><em>Securing Critical Infrastructures and Critical Control Systems: Approaches for Threat Protection</em> provides a full and detailed understanding of the vulnerabilities and security threats that exist within an industrial control system. This collection of research defines and analyses the technical, procedural, and managerial responses to securing these systems.

Critical Information Infrastructures Security

Автор: Awais Rashid; Peter Popov
Название: Critical Information Infrastructures Security
ISBN: 3030582949 ISBN-13(EAN): 9783030582944
Издательство: Springer
Рейтинг:
Цена: 8384.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Chapter "A Systematic Literature Review of Information Sources for Threat Modeling in the Power Systems Domain" is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.

Critical Information Infrastructures Security

Автор: Eric Luiijf; Inga ?utautait?; Bernhard M. H?mmerli
Название: Critical Information Infrastructures Security
ISBN: 3030058484 ISBN-13(EAN): 9783030058487
Издательство: Springer
Рейтинг:
Цена: 6986.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: This book constitutes revised selected papers from the 13th International Conference on Critical Information Infrastructures Security, CRITIS 2018, held in Kaunas, Lithuania, in September 2018.The 16 full papers and 3 short papers presented were carefully reviewed and selected from 61 submissions.

Introduction to Public Key Infrastructures

Автор: Johannes A. Buchmann; Evangelos Karatsiolis; Alexa
Название: Introduction to Public Key Infrastructures
ISBN: 3662524503 ISBN-13(EAN): 9783662524503
Издательство: Springer
Рейтинг:
Цена: 7685.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: This book explains the most important concepts, standards, implementations, and applications of public key infrastructures (PKIs). All chapters contain exercises, with solutions provided in an appendix.

Data protection and privacy: (in)visibilities and infrastructures

Название: Data protection and privacy: (in)visibilities and infrastructures
ISBN: 3319507958 ISBN-13(EAN): 9783319507958
Издательство: Springer
Рейтинг:
Цена: 20962.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Written during the process of the fundamental revision of revision of EU data protection law (the 1995 Data Protection Directive), this volume is highly topical. Since the European Parliament has adopted the General Data Protection Regulation (Regulation 2016/679), which will apply from 25 May 2018, there are many details to be sorted out.

Auditing it infrastructures for compliance

Автор: Weiss, Martin Solomon, Michael G.
Название: Auditing it infrastructures for compliance
ISBN: 1284090701 ISBN-13(EAN): 9781284090703
Издательство: Jones & Bartlett
Рейтинг:
Цена: 17527.00 р.
Наличие на складе: Поставка под заказ.

Описание: "Auditing IT Infrastructures for Compliance, Second Edition provides a unique, in-depth look at U.S. based Information systems and IT infrastructures compliance laws in the public and private sector. This book provides a comprehensive explanation of how to audit IT infrastructures for compliance based on the laws and the need to protect and secure business and consumer privacy data"--

Cross-Layer Design for Secure and Resilient Cyber-Physical Systems: A Decision and Game Theoretic Approach

Автор: Zhu Quanyan, Xu Zhiheng
Название: Cross-Layer Design for Secure and Resilient Cyber-Physical Systems: A Decision and Game Theoretic Approach
ISBN: 3030602508 ISBN-13(EAN): 9783030602505
Издательство: Springer
Цена: 25155.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание:

Part I Motivation and Framework

1 Introduction

1.1 Cyber-Physical Systems and Smart Cities

1.2 New Challenges in CPS

1.3 Overview and Related Works

1.4 Outline of the book

2 Cross-Layer Framework for CPSs

2.1 Introduction to Cross-Layer Design

2.2 Cross-Layer Design: Connecting Cryptography and Control Theory

2.3 Cross-Layer Design: Connecting Game Theory with Control Theory

2.4 Cross-Layer Design under Incomplete Information

2.5 Conclusions

Part II Secure Outsourcing Computations of CPS

3 New Architecture: Cloud-Enabled CPS

3.1 Promising Applications of CE-CPSs

3.1.1 Cloud-Enabled Robotics

3.1.2 Cloud-Enabled Smart Grids

3.1.3 Cloud-Enabled Transport Systems

3.1.4 Cloud-Enabled Manufacturing

3.2 New Security Requirements of CE-CPSs

3.3 Conclusion

4 Secure and Resilient Design of Could-Enabled CPS

4.1 New Challenges and Proposed Solutions of CE-CPS

4.2 Problem Statements

4.3 System Dynamics and MPC Algorithm

4.4 The Standard form of Quadratic Problem

4.4.1 Cloud Attack Models

4.4.2 The Framework of the proposed mechanism

4.5 Confidentiality and Integrity

4.5.1 Encryption Methods

4.5.2 Verification Methods

4.6 Availability Issues

4.6.1 Switching Mode Mechanism

4.6.2 Buffer Mode and Switching Condition

4.6.3 The Local Controller for the Safe Mode

4 4.7 Analysis and Experiments

4.8 Conclusions and Notes

5 Secure Data Assimilation of Cloud Sensor Networks

5.1 Introduction to CE-LSNs

5.2 Problem Formulation

5.2.1 System Model and the Outsourcing Kalman Filter

5.2.2 Challenges and Design Objectives

5.3 The Secure Outsourcing Data Assimilation

5.3.1 The Additive Homomorphic Encryption

5.3.2 The Homomorphic Observer

5.3.3 Customized Encryption for Outsourcing Computation

5.4 Analysis of the Efficiency and Security

5.4.1 Efficiency Analysis

5.4.2 Security Analysis

5.5 Analysis of Quantization Errors

5.6 Experimental Results

5.6.1 The Output of the Encrypted Information

5.6.2 The Impact of the Quantization Errors

5.7 Conclusions and Notes

Part III Game-Theoretic Approach for CPS

6 Review of Game Theory

6.1 Introduction to Game Theory

6.2 Two-Person Zero-Sum Game Model

6.2.1 Formulation of the Zero-sum Game

6.3 Stackelberg Game Model

6.3.1 Formulation of the Stackelberg Game

6.3.2 Security Design based on Stackelberg Game

6.4 FlipIt Game Model

6.4.1 Formulation of FlipIt Game

6.4.2 Analysis of the FlipIt Game

6.5 Signaling Game with Evidence

6.6 Conclusion and Notes70

7 A Game-Theoretic Approach to Secure Control of 3D Printers

7.1 New Challenges in Networked 3D Printers

7.2 Problem Formulation

7.2.1 The Dynamic Model of 3D Printing Systems

7.2.2 Physical Zero-Sum Game Framework

7.2.3 A Cyber-Physical Attack Model for 3D-printing Systems

7.2.4 The Cyber FlipIt Game Model

7.2.5 A Cyber-physical Stackelberg Game Model

7.3 Analysis of the Cyber-Physical Games

7.3.1 Analysis of the Physical Zero-Sum Game Equilibrium

7.3.2 Analysis of the Cyber FlipIt Game Equilibrium

7.3.3 Analysis of the Cyber-Physical Stackelberg Game Equilibrium

7.4 Numerical Results

7.5 Conclusion and Notes

8 A Game Framework to Secure Control of CBTC Systems

8.1 Introduction to CBTC systems

8.2 Problem Formulation

8.2.1 The Physical Model of a Train System

8.2.2 Communication Model and Attack Model

8.3 Estimation Approach and Security Criterion

8.3.1 Physical Estimation Problem

Game theoretic analysis of congestion, safety and security

Название: Game theoretic analysis of congestion, safety and security
ISBN: 3319116738 ISBN-13(EAN): 9783319116730
Издательство: Springer
Рейтинг:
Цена: 19591.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание:

Maximizing reader insights into the interactions between game theory, excessive crowding and safety and security elements, this book establishes a new research angle by illustrating linkages between different research approaches and through laying the foundations for subsequent analysis.

Congestion (excessive crowding) is defined in this work as all kinds of flows; e.g., road/sea/air traffic, people, data, information, water, electricity, and organisms. Analysing systems where congestion occurs - which may be in parallel, series, interlinked, or interdependent, with flows one way or both ways - this book puts forward new congestion models, breaking new ground by introducing game theory and safety/security into proceedings.

Addressing the multiple actors who may hold different concerns regarding system reliability; e.g. one or several terrorists, a government, various local or regional government agencies, or others with stakes for or against system reliability, this book describes how governments and authorities may have the tools to handle congestion, but that these tools need to be improved whilst additionally ensuring safety and security against various threats.

This game-theoretic analysis sets this book apart from the current congestion literature and ensures that the book will be of use to postgraduates, researchers, 3rd/4th-year undergraduates, policy makers, and practitioners.


ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru
   В Контакте     В Контакте Мед  Мобильная версия