Securing Industrial Control Systems

Advanced Strategies and Technologies

de

Éditeur :

Springer


Paru le : 2026-01-21



eBook Téléchargement , DRM LCP 🛈 DRM Adobe 🛈
Lecture en ligne (streaming)
58,01

Téléchargement immédiat
Dès validation de votre commande
Ajouter à ma liste d'envies
Image Louise Reader présentation

Louise Reader

Lisez ce titre sur l'application Louise Reader.

Description
Comprehensive Overview of Industrial Control Systems (ICS): Evolution, Components, and Security Challenges SCADA Systems in Industrial Control: Cloud Connectivity, Security Protocols, and Architectural Design Understanding Communication and Protocols in ICS: Securing Network Infrastructure and Data Exchange Exploring Industrial Automation Systems: Security Strategies, Optimization of Control Mechanisms, and AI Integration Mitigating the ICS Attack Surface: Identifying Attack Vectors, Reducing Vulnerabilities, and Security Mapping Techniques Network Segmentation in Industrial Operations: Enhancing ICS Security through Threat Mitigation and DNS Leak Prevention Comprehensive Overview of Field Devices in ICS: Protocol Management, Security Challenges, and Lifecycle Optimization Supervisory Systems Security Threats Part-1: Legacy SCADA Vulnerabilities, Communication Protocols, and System Security Strategies Supervisory Systems Security Threats Part-2: Assessing Sectoral Risks, Insider Threats, and Human-Centric Security Solutions Controller Security Threats: Mitigating Advanced Persistent Threats (APTs), Enhancing Authentication, and Securing Control Architectures ICS Cyber Resilience Part-1: AI and Machine Learning Strategies, System Hygiene Practices, and Secure Smart Grid Frameworks ICS Attack Resiliency Analysis Part-2: Advanced Incident Response, Threat Intelligence, and Cyber-Physical Systems Monitoring ICS Security Requirements: Cybersecurity Frameworks, Incident Response Strategies, and IoT Device Compliance Static Defense Strategies for ICS: Prioritizing Patch Management, Defense-in-Depth Approaches, and Regulatory Compliance Intrusion Detection Systems (IDS) in ICS: Supervisory Frameworks, Signature vs Anomaly-Based Detection, and Architectural Design Attack Recovery Mechanisms for ICSs: Common Cyber Attacks, Cryptographic Key Management, and Host-Based Mitigation Strategies Case studies: Industrial Control Systems Security Challenges and Mitigations
Pages
544 pages
Collection
n.c
Parution
2026-01-21
Marque
Springer
EAN papier
9783032030177
EAN PDF
9783032030184

Informations sur l'ebook
Nombre pages copiables
5
Nombre pages imprimables
54
Taille du fichier
17183 Ko
Prix
58,01 €
EAN EPUB
9783032030184

Informations sur l'ebook
Nombre pages copiables
5
Nombre pages imprimables
54
Taille du fichier
18616 Ko
Prix
58,01 €

Dr. Mohammad Ashiqur Rahman is an Associate Professor at Florida International University (FIU) in the Department of Electrical and Computer Engineering. He leads the Analytics of Cyber Defense (ACyD) Lab at FIU and holds a secondary appointment in the Knight Foundation School of Computing and Information Sciences. Dr. Rahman earned his Ph.D. in Computing and Information Systems from the University of North Carolina at Charlotte. He has published extensively in the areas of cybersecurity and systems analysis. He is a senior member of IEEE and a member of ACM.

Dr. Syed Bahauddin Alam is an Assistant Professor of Nuclear, Plasma and Radiological Engineering at the University of Illinois Urbana-Champaign (UIUC). He leads the MARTIANS (Machine Learning & ARTficial Intelligence for Advancing Nuclear Systems) Lab. Dr. Alam has received several awards for his research and teaching, including the Outstanding Teaching Award from Missouri S&T in 2021 and the Most Exemplary Graduate Fellow Award on “Nuclear Nonproliferation Fellowship 2017” by KAIST. His notable achievements include the ANS Best Student Paper Award (ICAPP 2016), and he has been nominated for various awards including the Young Generation/Student Award (ICAPP 2017).

Dr. Kishor Datta Gupta (Senior Member, IEEE) received his Ph.D. from the University of Memphis. He is currently an Assistant Professor in the Cyber-Physical Department at Clark Atlanta University. His research interests include bio-inspired algorithms, computer security, and computer vision. He has one patent and several peer-reviewed publications related to adversarial machine learning and cybersecurity. He also serves as a Program Committee Member for the AAAI-23 Conference.

Dr. Roy George received his B.Sc. in electronics and telecommunication engineering from Kerala University, India, and his Ph.D. in computer science from Tulane University, New Orleans, LA, USA. He is currently a Professor and Chair of the Department of Cyber-Physical Systems at Clark Atlanta University. His expertise includes machine learning, cybersecurity, and network science. He has authored over 60 articles and a book on Data Modeling. Dr. George has directed multiple Research Centers of Excellence and has received funding from various U.S. Government agencies and private corporations. He was recognized as an Atlanta Top Technology Leader by the Atlanta Business Chronicle in 2015.

Sunzida Siddique is a researcher at Daffodil International University. Her research interests encompass Machine Learning (ML), Deep Learning, Natural Language Processing (NLP), Computer Vision, Digital Twin technologies, and Cybersecurity. She earned her post-graduate degree from Jahangir Nagar University and completed her undergraduate studies at Daffodil International University. Sunzida has contributed to the field with several peer-reviewed publications, focusing on machine learning and cybersecurity.

Kazuma Kobayashi is a Ph.D. student at the University of Illinois Urbana-Champaign, specializing in Nuclear Engineering. His research focuses on digital twin enabling technologies, machine learning, and signal processing. Kazuma holds a Master of Science in Nuclear Engineering from Missouri University of Science and Technology and a Bachelor of Science in Physics from Rikkyo University. His work is recognized for its contributions to advancing technologies in nuclear systems and related fields.

Suggestions personnalisées