Model-Based Risk Analysis Approach for Network Vulnerability and Security of the Critical Railway Infrastructure (Englisch)
- Neue Suche nach: Neema, Himanshu
- Weitere Informationen zu Neema, Himanshu:
- https://orcid.org/http://orcid.org/0000-0003-4908-1596
- Neue Suche nach: Wang, Leqiang
- Neue Suche nach: Koutsoukos, Xenofon
- Neue Suche nach: Tang, CheeYee
- Neue Suche nach: Stouffer, Keith
- Neue Suche nach: Percia David, Dimitri
- Weitere Informationen zu Percia David, Dimitri:
- https://orcid.org/https://orcid.org/0000-0002-9393-1490
- Neue Suche nach: Mermoud, Alain
- Weitere Informationen zu Mermoud, Alain:
- https://orcid.org/https://orcid.org/0000-0001-6471-772X
- Neue Suche nach: Maillart, Thomas
- Weitere Informationen zu Maillart, Thomas:
- https://orcid.org/https://orcid.org/0000-0002-5747-9927
- Neue Suche nach: Neema, Himanshu
- Weitere Informationen zu Neema, Himanshu:
- https://orcid.org/http://orcid.org/0000-0003-4908-1596
- Neue Suche nach: Wang, Leqiang
- Neue Suche nach: Koutsoukos, Xenofon
- Neue Suche nach: Tang, CheeYee
- Neue Suche nach: Stouffer, Keith
In:
Critical Information Infrastructures Security
: 16th International Conference, CRITIS 2021, Lausanne, Switzerland, September 27–29, 2021, Revised Selected Papers
;
Kapitel: 5
;
79-98
;
2022
- Aufsatz/Kapitel (Buch) / Elektronische Ressource
-
Titel:Model-Based Risk Analysis Approach for Network Vulnerability and Security of the Critical Railway Infrastructure
-
Weitere Titelangaben:Lect.Notes Computer
-
Beteiligte:Percia David, Dimitri ( Herausgeber:in ) / Mermoud, Alain ( Herausgeber:in ) / Maillart, Thomas ( Herausgeber:in ) / Neema, Himanshu ( Autor:in ) / Wang, Leqiang ( Autor:in ) / Koutsoukos, Xenofon ( Autor:in ) / Tang, CheeYee ( Autor:in ) / Stouffer, Keith ( Autor:in )
-
Kongress:International Conference on Critical Information Infrastructures Security ; 2021 ; Lausanne, Switzerland
-
Erschienen in:Critical Information Infrastructures Security : 16th International Conference, CRITIS 2021, Lausanne, Switzerland, September 27–29, 2021, Revised Selected Papers ; Kapitel: 5 ; 79-98Lecture Notes in Computer Science ; 13139 ; 79-98Security and Cryptology ; 79-98
-
Verlag:
- Neue Suche nach: Springer International Publishing
-
Erscheinungsort:Cham
-
Erscheinungsdatum:01.01.2022
-
Format / Umfang:20 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz/Kapitel (Buch)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis E-Book
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Bank of Models: Sensor Attack Detection and Isolation in Industrial Control SystemsAhmed, Chuadhry Mujeeb / Zhou, Jianying et al. | 2022
- 2
-
Super Detector: An Ensemble Approach for Anomaly Detection in Industrial Control SystemsBalaji, Madhumitha / Shrivastava, Siddhant / Adepu, Sridhar / Mathur, Aditya et al. | 2022
- 3
-
Optimal Man-In-The-Middle Stealth AttackFaramondi, Luca / Oliva, Gabriele / Setola, Roberto et al. | 2022
- 4
-
GNSS Positioning Security: Automatic Anomaly Detection on Reference StationsLebrun, Stéphanie / Kaloustian, Stéphane / Rollier, Raphaël / Barschel, Colin et al. | 2022
- 5
-
Model-Based Risk Analysis Approach for Network Vulnerability and Security of the Critical Railway InfrastructureNeema, Himanshu / Wang, Leqiang / Koutsoukos, Xenofon / Tang, CheeYee / Stouffer, Keith et al. | 2022
- 6
-
A Survey on Applications of Formal Methods in Analysis of SCADA SystemsMarović, Mihael / Derek, Ante / Groš, Stjepan et al. | 2022
- 7
-
The Cost of Incidents in Essential Services—Data from Swedish NIS ReportingFranke, Ulrik / Turell, Johan / Johansson, Ivar et al. | 2022
- 8
-
Impact Analysis of PLC Performance When Applying Cyber Security Solutions Using Active Information GatheringChang, Yeop / Kim, Taeyeon / Kim, Woonyon et al. | 2022
- 9
-
Multi-categorical Risk Assessment for Urban Critical InfrastructuresKönig, Sandra / Schauer, Stefan / Rass, Stefan et al. | 2022
- 10
-
Use-Case Informed Task Analysis for Secure and Usable Design Solutions in RailAltaf, Amna / Faily, Shamal / Dogan, Huseyin / Mylonas, Alexios / Thron, Eylem et al. | 2022
- 11
-
Studying Neutrality in Cyber-Space: a Comparative Geographical Analysis of Honeypot ResponsesStrohmeier, Martin / Pavur, James / Martinovic, Ivan / Lenders, Vincent et al. | 2022
- 12
-
Tableau: Future-Proof Zoning for OT NetworksDe Vaere, Piet / Hähni, Claude / Monti, Franco / Perrig, Adrian et al. | 2022
- 13
-
Link Prediction for Cybersecurity Companies and Technologies: Towards a Survivability ScoreAnton Moreno, Santiago / Mezzetti, Anita / Lacube, William et al. | 2022