↓ Skip to main content

Critical Infrastructure Protection II

Overview of attention for book
Cover of 'Critical Infrastructure Protection II'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Emergent Risks In Critical Infrastructures
  3. Altmetric Badge
    Chapter 2 Cyberspace Policy For Critical Infrastructures
  4. Altmetric Badge
    Chapter 3 Security Assessment Of A Turbo-Gas Power Plant
  5. Altmetric Badge
    Chapter 4 Detecting Cyber Attacks On Nuclear Power Plants
  6. Altmetric Badge
    Chapter 5 Applying Trusted Network Technology To Process Control Systems
  7. Altmetric Badge
    Chapter 6 Towards A Taxonomy Of Attacks Against Energy Control Systems
  8. Altmetric Badge
    Chapter 7 Attribution Of Cyber Attacks On Process Control Systems
  9. Altmetric Badge
    Chapter 8 Modeling And Detecting Anomalies In Scada Systems
  10. Altmetric Badge
    Chapter 9 Assessing The Integrity Of Field Devices In Modbus Networks
  11. Altmetric Badge
    Chapter 10 Designing Security-Hardened Microkernels For Field Devices
  12. Altmetric Badge
    Chapter 11 Combating Memory Corruption Attacks On Scada Devices
  13. Altmetric Badge
    Chapter 12 Mitigating Accidents In Oil And Gas Production Facilities
  14. Altmetric Badge
    Chapter 13 Automated Assessment Of Compliance With Security Best Practices
  15. Altmetric Badge
    Chapter 14 Collaborative Access Control For Critical Infrastructures
  16. Altmetric Badge
    Chapter 15 Modeling Dependencies In Critical Infrastructures
  17. Altmetric Badge
    Chapter 16 Metrics For Quantifying Interdependencies
  18. Altmetric Badge
    Chapter 17 An Integrated Approach For Simulating Interdependencies
  19. Altmetric Badge
    Chapter 18 Simulation Of Advanced Train Control Systems
  20. Altmetric Badge
    Chapter 19 An Integrated Methodology For Critical Infrastructure Modeling And Simulation
  21. Altmetric Badge
    Chapter 20 Using 3D Models And Discrete Simulations In Infrastructure Security Applications
Attention for Chapter 5: Applying Trusted Network Technology To Process Control Systems
Altmetric Badge

Citations

dimensions_citation
7 Dimensions

Readers on

mendeley
9 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Applying Trusted Network Technology To Process Control Systems
Chapter number 5
Book title
Critical Infrastructure Protection II
Published in
ADS, March 2008
DOI 10.1007/978-0-387-88523-0_5
Book ISBNs
978-0-387-88522-3, 978-0-387-88523-0
Authors

Hamed Okhravi, David Nicol

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 9 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 9 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 3 33%
Student > Master 2 22%
Professor 1 11%
Unspecified 1 11%
Unknown 2 22%
Readers by discipline Count As %
Computer Science 4 44%
Unspecified 1 11%
Social Sciences 1 11%
Engineering 1 11%
Unknown 2 22%