Critical Information Infrastructures Security: 4th International Workshop, CRITIS 2009, Bonn, Germany, September 30 - October 2, 2009. Revised Papers

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the proceedings of the 4th International Workshop on Critical Information Infrastructures Security, CRITIS 2009, held in Bonn, Germany, during September 30 to October 2, 2009.

Author(s): Gregorio D’Agostino, Roberto Cannata (auth.), Erich Rome, Robin Bloomfield (eds.)
Series: Lecture Notes in Computer Science 6027 : Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2010

Language: English
Pages: 213
Tags: Performance and Reliability; Computer Communication Networks; Management of Computing and Information Systems; Data Encryption; Special Purpose and Application-Based Systems; System Performance and Evaluation

Front Matter....Pages -
On Modelling of Inter-dependent Network Infrastructures by Extended Leontief Models....Pages 1-13
Critical Infrastructure Protection in Brazil - Threat Identification and Analysis....Pages 14-21
Development of Information Security-Focused Incident Prevention Measures for Critical Information Infrastructure in Japan....Pages 22-33
Design of a Mobile Agent-Based Adaptive Communication Middleware for Federations of Critical Infrastructure Simulations....Pages 34-49
An Alternate Topology Generator for Joint Study of Power Grids and Communication Networks....Pages 50-61
Trouble Brewing: Using Observations of Invariant Behavior to Detect Malicious Agency in Distributed Control Systems....Pages 62-72
Optimisation of Critical Infrastructure Protection: The SiVe Project on Airport Security....Pages 73-84
Cyber-Critical Infrastructure Protection Using Real-Time Payload-Based Anomaly Detection....Pages 85-97
Decision Aid Tool and Ontology-Based Reasoning for Critical Infrastructure Vulnerabilities and Threats Analysis....Pages 98-110
Application Filters for TCP/IP Industrial Automation Protocols....Pages 111-123
Web Browser Security Update Effectiveness....Pages 124-137
State-Based Network Intrusion Detection Systems for SCADA Protocols: A Proof of Concept....Pages 138-150
Towards Early Warning Systems – Challenges, Technologies and Architecture....Pages 151-164
CII Protection - Lessons for Developing Countries: South Africa as a Case Study....Pages 165-175
Energy Theft in the Advanced Metering Infrastructure....Pages 176-187
Current Capabilities, Requirements and a Proposed Strategy for Interdependency Analysis in the UK....Pages 188-200
Stochastic Modelling of the Effects of Interdependencies between Critical Infrastructure....Pages 201-212
Back Matter....Pages -