001441415 000__ 05075cam\a2200685Ii\4500 001441415 001__ 1441415 001441415 003__ OCoLC 001441415 005__ 20230309004737.0 001441415 006__ m\\\\\o\\d\\\\\\\\ 001441415 007__ cr\un\nnnunnun 001441415 008__ 220104s2021\\\\sz\a\\\\o\\\\\101\0\eng\d 001441415 019__ $$a1292518029$$a1294353319 001441415 020__ $$a9783030932008$$q(electronic bk.) 001441415 020__ $$a3030932001$$q(electronic bk.) 001441415 020__ $$z9783030931995$$q(print) 001441415 0247_ $$a10.1007/978-3-030-93200-8$$2doi 001441415 035__ $$aSP(OCoLC)1290718818 001441415 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dEBLCP$$dDKU$$dOCLCO$$dDCT$$dOCLCF$$dOCLCO$$dCOM$$dOCLCO$$dOCLCQ 001441415 049__ $$aISEA 001441415 050_4 $$aQA76.9.A25$$bC75 2021eb 001441415 08204 $$a005.8$$223 001441415 1112_ $$aCRITIS (Conference)$$n(16th :$$d2021 :$$cLausanne, Switzerland ; Online) 001441415 24510 $$aCritical information infrastructures security :$$b16th International Conference, CRITIS 2021, Lausanne, Switzerland, September 27-29, 2021, Revised selected papers /$$cDimitri Percia David, Alain Mermoud, Thomas Maillart (eds.). 001441415 2463_ $$aCRITIS 2021 001441415 264_1 $$aCham, Switzerland :$$bSpringer,$$c2021. 001441415 300__ $$a1 online resource (xii, 235 pages) :$$billustrations (some color). 001441415 336__ $$atext$$btxt$$2rdacontent 001441415 337__ $$acomputer$$bc$$2rdamedia 001441415 338__ $$aonline resource$$bcr$$2rdacarrier 001441415 347__ $$atext file$$bPDF$$2rda 001441415 4901_ $$aLecture notes in computer science ;$$v13139 001441415 4901_ $$aLNCS sublibrary, SL 4, Security and cryptology 001441415 500__ $$aIncludes author index. 001441415 5050_ $$aProtection of Cyber-Physical Systems and Industrial Control Systems (ICS) Bank Of Models: Sensor Attack Detection and Isolation in Industrial Control Systems -- Super Detector: An Ensemble Approach for Anomaly Detection in Industrial Control Systems -- Optimal Man-In-The-Middle Covert Attack -- GNSS Positioning Security: Automatic Anomaly Detection on Reference Stations -- C(I)IP Organisation, (Strategic) Management and Legal Aspects -- Model-Based Risk Analysis Approach for Network Vulnerability and Security of the Critical Railway Infrastructure -- A Survey on Applications of Formal Methods in Analysis of SCADA Systems -- The Cost of Incidents in Essential Services: Data from Swedish NIS Reporting -- Human Factor, Security Awareness and Crisis Management for C(I)IP and Critical Services -- Impact Analysis of PLC Performance when Applying Cyber Security Solutions Using Active Information Gathering -- Multi-Categorical Risk Assessment for Urban Critical Infrastructures -- Use-Case Informed Task Analysis for Secure and Usable Design Solutions in Rail -- Studying Neutrality in Cyber-Space: A Comparative Geographical Analysis of Honeypot Responses -- Future, TechWatch & Forecast for C(I)IP and Critical Services -- Tableau: Future-Proof Zoning for OT Networks -- Link Prediction for Cybersecurity Companies and Technologies: Towards a Survivability Score. . 001441415 506__ $$aAccess limited to authorized users. 001441415 520__ $$aThis book constitutes the refereed proceedings of the 16th International Conference on Critical Information Infrastructures Security, CRITIS 2021, which took place in Lausanne, Switzerland, during September 27-29, 2021. The 12 full papers included in this volume were carefully reviewed and selected from 42 submissions. They were organized in topical sections as follows: protection of cyber-physical systems and industrial control systems (ICS); C(I)IP organization, (strategic) management and legal aspects; human factor, security awareness and crisis management for C(I)IP and critical services; and future, TechWatch and forecast for C(I)IP and critical services. 001441415 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed January 4, 2022). 001441415 650_0 $$aComputer security$$vCongresses. 001441415 650_0 $$aData encryption (Computer science)$$vCongresses. 001441415 650_0 $$aComputer networks$$xSecurity measures$$vCongresses. 001441415 650_6 $$aSécurité informatique$$vCongrès. 001441415 650_6 $$aChiffrement (Informatique)$$vCongrès. 001441415 650_6 $$aRéseaux d'ordinateurs$$xSécurité$$xMesures$$vCongrès. 001441415 655_7 $$aConference papers and proceedings.$$2fast$$0(OCoLC)fst01423772 001441415 655_7 $$aConference papers and proceedings.$$2lcgft 001441415 655_7 $$aActes de congrès.$$2rvmgf 001441415 655_0 $$aElectronic books. 001441415 7001_ $$aPercia David, Dimitri,$$eeditor.$$0(orcid)0000-0002-9393-1490$$1https://orcid.org/0000-0002-9393-1490 001441415 7001_ $$aMermoud, Alain,$$eeditor.$$0(orcid)0000-0001-6471-772X$$1https://orcid.org/0000-0001-6471-772X 001441415 7001_ $$aMaillart, Thomas,$$eeditor.$$0(orcid)0000-0002-5747-9927$$1https://orcid.org/0000-0002-5747-9927 001441415 77608 $$iPrint version: $$z9783030931995 001441415 77608 $$iPrint version: $$z9783030932015 001441415 830_0 $$aLecture notes in computer science ;$$v13139. 001441415 830_0 $$aLNCS sublibrary.$$nSL 4,$$pSecurity and cryptology. 001441415 852__ $$bebk 001441415 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-030-93200-8$$zOnline Access$$91397441.1 001441415 909CO $$ooai:library.usi.edu:1441415$$pGLOBAL_SET 001441415 980__ $$aBIB 001441415 980__ $$aEBOOK 001441415 982__ $$aEbook 001441415 983__ $$aOnline 001441415 994__ $$a92$$bISE