What is included with this book?
About the Authors | p. vi |
Contributors | p. xi |
Foreword | p. xvii |
Securing Cyber-Physical Infrastructure | p. xxi |
Theoretical Foundations | |
Security and Vulnerability of Cyber-Physical Infrastructure Networks: A Control-Theoretic Approach | p. 5 |
Game Theory for Infrastructure Security: The Power of Intent-Based Adversary Models | p. 31 |
An Analytical Framework for Cyber-Physical Networks | p. 55 |
Evolution of Widely Spreading Worms and Countermeasures: Epidemic Theory and Application | p. 73 |
Security for Wireless Mobile Networks | |
Mobile Wireless Network Security | p. 99 |
Robust Wireless Infrastructure against Jamming Attacks | p. 123 |
Security for Mobile Ad Hoc Networks | p. 147 |
Defending Against Identity-Based Attacks in Wireless Networks | p. 191 |
Security for Sensor Networks | |
Efficient and Distributed Access Control for Sensor Networks | p. 227 |
Defending Against Physical Attacks in Wireless Sensor Networks | p. 251 |
Node Compromise Detection in Wireless Sensor Networks | p. 281 |
Platform Security | |
Hardware and Security: Vulnerabilities and Solutions | p. 305 |
Languages and Security: Safer Software Through Language and Compiler Techniques | p. 333 |
Cloud Computing and Data Security | |
Protecting Data in Outsourcing Scenarios | p. 361 |
Data Security in Cloud Computing | p. 389 |
Secure Mobile Cloud Computing | p. 411 |
Relation Privacy Preservation in Publishing Online Social Networks | p. 431 |
Event Monitoring and Situation Awareness | |
Distributed Network and System Monitoring for Securing Cyber-Physical Infrastructure | p. 455 |
Discovering and Tracking Patterns of Interest in Security Sensor Streams | p. 481 |
Pervasive Sensing and Monitoring for Situational Awareness | p. 505 |
Sense and Response Systems for Crisis Management | p. 537 |
Policy Issues in Security Management | |
Managing and Securing Critical Infrastructure - A Semantic Policy- and Trust-Driven Approach | p. 551 |
Policies, Access Control, and Formal Methods | p. 573 |
Formal Analysis of Policy-Based Security Configurations in Enterprise Networks | p. 595 |
Security in Real-World Systems | |
Security and Privacy in the Smart Grid | p. 637 |
Cyber-Physical Security of Automotive Information Technology | p. 655 |
Security and Privacy for Mobile Health-Care (m-Health) Systems | p. 677 |
Security and Robustness in the Internet Infrastructure | p. 705 |
Emergency Vehicular Networks | p. 735 |
Security Issues in VoIP Telecommunication Networks | p. 763 |
Index | p. 791 |
Table of Contents provided by Ingram. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.