Collaborative Approaches for Cyber Security in Cyber-Physical Systems [electronic resource] / edited by Theo Dimitrakos, Javier Lopez, Fabio Martinelli.

1st ed. 2023.
Cham : Springer International Publishing : Imprint: Springer, 2023.
1 online resource (XII, 226 p. 65 illus., 48 illus. in color.)


Summary note
This book describes cyber-security issues underpinning several cyber-physical systems and several application domains, proposing a common perspective able to collect similarities as well as depict divergences and specific solution methods. Special attention is given to those approaches and technologies that unleash the power of collaboration among stakeholders, in a field based often developed in isolation and segregation of information. Given the pervasively growing dependency of society on IT technology, and the corresponding proliferation of cyber-threats, there is both an imperative need and opportunity to develop a coherent set of techniques to cope with the changing nature of the upcoming cyber-security challenges. These include evolving threats and new technological means to exploit vulnerabilities of cyber-physical systems that have direct socio-technical, societal and economic consequences for Europe and the world. We witness cyber-attacks on large scale infrastructures for energy, transport, healthcare systems and smart systems. The interplay between security and safety issues is now paramount and will be even more relevant in the future. The book collects contributions from a number of scientists in Europe and presents the results of several European Projects, as NeCS, SPARTA, E-CORRIDOR and C3ISP. It will be of value to industrial researchers, practitioners and engineers developing cyber-physical solutions, as well as academics and students in cyber-security, ICT, and smart technologies in general. .
  • 1. Collaborative and confidential architectures for information sharing and analytics
  • 2. Secure Interconnection of large-scale CPS-based frameworks and middleware
  • 3. Virtualized security-awareness systems and digital twins
  • 4. Empirical evaluation of system vulnerabilities
  • 5. Collaborative physical and cyber defense requirements
  • 6. Heterogeneous data centric security policies specification and enforcement
  • 7. Big data for anomaly and advanced threats detection
  • 8. Collaborative identification and ranking of malware
  • 9. Visual analytics techniques for cyber security
  • 10. Collaborative mitigation methodologies against advanced and persistent attacks.
  • 10.1007/978-3-031-16088-2
Statement on language in description
Princeton University Library aims to describe library materials in a manner that is respectful to the individuals and communities who create, use, and are represented in the collections we manage. Read more...
Other views
Staff view

Supplementary Information