找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Cyber-security of SCADA and Other Industrial Control Systems; Edward J. M. Colbert,Alexander Kott Book 2016 Springer International Publish

[复制链接]
查看: 22858|回复: 59
发表于 2025-3-21 16:59:00 | 显示全部楼层 |阅读模式
书目名称Cyber-security of SCADA and Other Industrial Control Systems
编辑Edward J. M. Colbert,Alexander Kott
视频video
概述Offers academic, industrial and government perspective from international experts in the security field.Provides comprehensive structured treatment of the subject and easy-to-read tutorial information
丛书名称Advances in Information Security
图书封面Titlebook: Cyber-security of SCADA and Other Industrial Control Systems;  Edward J. M. Colbert,Alexander Kott Book 2016 Springer International Publish
描述This book provides a comprehensive overview of the fundamental security of Industrial Control Systems (ICSs), including Supervisory Control and Data Acquisition (SCADA) systems and touching on cyber-physical systems in general. Careful attention is given to providing the reader with clear and comprehensive background and reference material for each topic pertinent to ICS security. This book offers answers to such questions as: Which specific operating and security issues may lead to a loss of efficiency and operation? What methods can be used to monitor and protect my system? How can I design my system to reduce threats?This book offers chapters on ICS cyber threats, attacks, metrics, risk, situational awareness, intrusion detection, and security testing, providing an advantageous reference set for current system owners who wish to securely configure and operate their ICSs. This book is appropriate for non-specialists as well. Tutorial information is provided in two initial chapters and in the beginnings of other chapters as needed. The book concludes with advanced topics on ICS governance, responses to attacks on ICS, and future security of the Internet of Things..
出版日期Book 2016
关键词Cyber defense; Cyber security; ICS; Industrial Control Systems (ICS); Supervisory Control and Data Acqui
版次1
doihttps://doi.org/10.1007/978-3-319-32125-7
isbn_softcover978-3-319-81203-8
isbn_ebook978-3-319-32125-7Series ISSN 1568-2633 Series E-ISSN 2512-2193
issn_series 1568-2633
copyrightSpringer International Publishing Switzerland 2016
The information of publication is updating

书目名称Cyber-security of SCADA and Other Industrial Control Systems影响因子(影响力)




书目名称Cyber-security of SCADA and Other Industrial Control Systems影响因子(影响力)学科排名




书目名称Cyber-security of SCADA and Other Industrial Control Systems网络公开度




书目名称Cyber-security of SCADA and Other Industrial Control Systems网络公开度学科排名




书目名称Cyber-security of SCADA and Other Industrial Control Systems被引频次




书目名称Cyber-security of SCADA and Other Industrial Control Systems被引频次学科排名




书目名称Cyber-security of SCADA and Other Industrial Control Systems年度引用




书目名称Cyber-security of SCADA and Other Industrial Control Systems年度引用学科排名




书目名称Cyber-security of SCADA and Other Industrial Control Systems读者反馈




书目名称Cyber-security of SCADA and Other Industrial Control Systems读者反馈学科排名




单选投票, 共有 1 人参与投票
 

0票 0.00%

Perfect with Aesthetics

 

0票 0.00%

Better Implies Difficulty

 

1票 100.00%

Good and Satisfactory

 

0票 0.00%

Adverse Performance

 

0票 0.00%

Disdainful Garbage

您所在的用户组没有投票权限
发表于 2025-3-21 20:17:08 | 显示全部楼层
发表于 2025-3-22 03:30:07 | 显示全部楼层
Operational Technology and Information Technology in Industrial Control Systems, of the managerial, administrative, and regulatory responsibilities associated with this task. The heart of ICSs are . which supports availability and safety of critical processes. Modern-day ICSs have incorporated . based on the system functions desired in the overall system. For reference, definit
发表于 2025-3-22 06:03:20 | 显示全部楼层
发表于 2025-3-22 12:11:19 | 显示全部楼层
Attacks on Industrial Control Systems,es and examples of attacks on such systems. The nature and efficacy of these attacks are largely determined by a complex mix of security deficiencies in ICS systems that aggregate architectures and approaches from several epochs of technological history. For example, SCADA systems of the second gene
发表于 2025-3-22 15:36:31 | 显示全部楼层
发表于 2025-3-22 19:58:24 | 显示全部楼层
Cyber Risk in Industrial Control Systems,mputing and communications infrastructure. Practitioners in the cyber security field often identify three modes of failure: (1) breach of confidentiality, which is a failure to protect sensitive system information from unauthorized disclosure, (2) loss of availability, which is a failure to provide
发表于 2025-3-22 23:01:43 | 显示全部楼层
发表于 2025-3-23 05:18:50 | 显示全部楼层
发表于 2025-3-23 09:04:29 | 显示全部楼层
Intrusion Detection in Industrial Control Systems,determined adversary will have non-negligible probability of successful penetration of the ICS. In this chapter we use the word “intrusion” to refer to a broad range of processes and effects associated with the presence and actions of malicious software in an ICS. Once an intrusion has occurred, the
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-7-5 23:33
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表