Cyber Security and Critical Infrastructures
dc.contributor.editor | Maglaras, Leandros | |
dc.contributor.editor | Janicke, Helge | |
dc.contributor.editor | Ferrag, Mohamed Amine | |
dc.date.accessioned | 2023-02-20T16:43:37Z | |
dc.date.available | 2023-02-20T16:43:37Z | |
dc.date.issued | 2022 | |
dc.identifier | ONIX_20230220_9783036548456_24 | |
dc.identifier.uri | https://directory.doabooks.org/handle/20.500.12854/97421 | |
dc.description.abstract | This book contains the manuscripts that were accepted for publication in the MDPI Special Topic "Cyber Security and Critical Infrastructure" after a rigorous peer-review process. Authors from academia, government and industry contributed their innovative solutions, consistent with the interdisciplinary nature of cybersecurity. The book contains 16 articles: an editorial explaining current challenges, innovative solutions, real-world experiences including critical infrastructure, 15 original papers that present state-of-the-art innovative solutions to attacks on critical systems, and a review of cloud, edge computing, and fog's security and privacy issues. | |
dc.language | English | |
dc.subject.classification | thema EDItEUR::T Technology, Engineering, Agriculture, Industrial processes::TB Technology: general issues::TBX History of engineering and technology | en_US |
dc.subject.other | cybersecurity | |
dc.subject.other | critical Infrastructures | |
dc.subject.other | privacy preservation | |
dc.subject.other | risk management | |
dc.subject.other | big data | |
dc.subject.other | Internet of Things | |
dc.subject.other | blockchain | |
dc.subject.other | cyber threats | |
dc.subject.other | cyber security and privacy policy | |
dc.subject.other | hybrid war | |
dc.subject.other | cybercrime | |
dc.subject.other | COVID-19 pandemic | |
dc.subject.other | coronavirus | |
dc.subject.other | smart grids | |
dc.subject.other | cyber security modeling and simulation | |
dc.subject.other | cyber–physical systems | |
dc.subject.other | industrial control systems | |
dc.subject.other | network security and protocols | |
dc.subject.other | cyber threat intelligence | |
dc.subject.other | resiliency and security of cyber systems | |
dc.subject.other | hardware security solutions | |
dc.subject.other | intrusion detection | |
dc.subject.other | secure communication protocols | |
dc.subject.other | malware analysis | |
dc.subject.other | attribution of cyber attacks | |
dc.subject.other | simulation and test beds for security evaluation of critical infrastructures | |
dc.title | Cyber Security and Critical Infrastructures | |
dc.type | book | |
oapen.identifier.doi | 10.3390/books978-3-0365-4846-3 | |
oapen.relation.isPublishedBy | 46cabcaa-dd94-4bfe-87b4-55023c1b36d0 | |
oapen.relation.isbn | 9783036548456 | |
oapen.relation.isbn | 9783036548463 | |
oapen.pages | 326 | |
oapen.place.publication | Basel |
Files in this item
Files | Size | Format | View |
---|---|---|---|
There are no files associated with this item. |