liu.seSearch for publications in DiVA
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • oxford
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Anomaly Detection in Water Management Systems
Linköping University, Department of Computer and Information Science, Software and Systems. Linköping University, The Institute of Technology. (Real-time Systems Laboratory)
Linköping University, Department of Computer and Information Science, Software and Systems. Linköping University, The Institute of Technology. (Real-time Systems Laboratory)
Linköping University, Department of Computer and Information Science, Software and Systems. Linköping University, The Institute of Technology. (Real-time Systems Laboratory)
2012 (English)In: Critical Infrastructure Protection: Information Infrastructure Models, Analysis, and Defense / [ed] Javier Lopez, Roberto Setola, Stephen D. Wolthusen, Springer Berlin/Heidelberg, 2012, 98-119 p.Chapter in book (Refereed)
Abstract [en]

The present volume aims to provide an overview of the current understanding of the so-called Critical Infrastructure (CI), and particularly the Critical Information Infrastructure (CII), which not only forms one of the constituent sectors of the overall CI, but also is unique in providing an element of interconnectionbetween sectors as well as often also intra-sectoral control mechanisms.The 14 papers of this book present a collection of  pieces of scientific work in the areas of critical infrastructure protection. In combining elementary concepts and models with policy-related issues on one hand and placing an emphasis on the timely area of control systems, the book aims to highlight some of the key issues facing the research community.

Place, publisher, year, edition, pages
Springer Berlin/Heidelberg, 2012. 98-119 p.
Series
Lecture Notes in Computer Science, ISSN 0302-9743, E-ISSN 1611-3349 ; 7130
Keyword [en]
Computer science, Data protection, Data encryption, Computer software, Information Systems, Systems and Data Security, Management of Computing and Information Systems, Algorithm Analysis and Problem Complexity, Information Systems Applications
National Category
Computer and Information Science
Identifiers
URN: urn:nbn:se:liu:diva-72362DOI: 10.1007/978-3-642-28920-0_6ISBN: 978-3-642-28919-4 (print)ISBN: 978-3-642-28920-0 (print)OAI: oai:DiVA.org:liu-72362DiVA: diva2:537287
Available from: 2012-06-26 Created: 2011-11-25 Last updated: 2017-12-13Bibliographically approved

Open Access in DiVA

No full text

Other links

Publisher's full textFind book at a Swedish library/Hitta boken i ett svenskt bibliotekFind book in another country/Hitta boken i ett annat land

Authority records BETA

Raciti, MassimilianoCucurull, JordiNadjm-Tehrani, Simin

Search in DiVA

By author/editor
Raciti, MassimilianoCucurull, JordiNadjm-Tehrani, Simin
By organisation
Software and SystemsThe Institute of Technology
Computer and Information Science

Search outside of DiVA

GoogleGoogle Scholar

doi
isbn
urn-nbn

Altmetric score

doi
isbn
urn-nbn
Total: 74 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • oxford
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf