Ehab Al-Shaer - Böcker
Visar alla böcker från författaren Ehab Al-Shaer. Handla med fri frakt och snabb leverans.
8 produkter
8 produkter
Autonomous Cyber Deception
Reasoning, Adaptive Planning, and Evaluation of HoneyThings
Inbunden, Engelska, 2019
769 kr
Skickas inom 10-15 vardagar
It features four major parts: cyber deception reasoning frameworks, dynamic decision-making for cyber deception, network-based deception, and malware deception. An important distinguishing characteristic of this book is its inclusion of student exercises at the end of each chapter.
552 kr
Skickas inom 10-15 vardagar
In this contributed volume, leading international researchers explore configuration modeling and checking, vulnerability and risk assessment, configuration analysis, and diagnostics and discovery.
1 096 kr
Skickas inom 10-15 vardagar
This book provides a comprehensive and in-depth study of automated firewall policy analysis for designing, configuring and managing distributed firewalls in large-scale enterpriser networks.
Del 67 - Advances in Information Security
Security and Resiliency Analytics for Smart Grids
Static and Dynamic Approaches
Inbunden, Engelska, 2016
1 096 kr
Skickas inom 10-15 vardagar
This book targets the key concern of protecting critical infrastructures such as smart grids. It explains various static and dynamic security analysis techniques that can automatically verify smart grid security and resiliency and identify potential attacks in a proactive manner. This book includes three main sections. The first presents the idea of formally verifying the compliance of smart grid configurations with the security and resiliency guidelines. It provides a formal framework that verifies the compliance of the advanced metering infrastructure (AMI) configurations with the security and resiliency requirements, and generates remediation plans for potential security violations. The second section covers the formal verification of the security and resiliency of smart grid control systems by using a formal model to analyze attack evasions on state estimation, a core control module of the supervisory control system in smart grids. The model identifies attack vectors that can compromise state estimation. This section also covers risk mitigation techniques that synthesize proactive security plans that make such attacks infeasible. The last part of the book discusses the dynamic security analysis for smart grids. It shows that AMI behavior can be modeled using event logs collected at smart collectors, which in turn can be verified using the specification invariants generated from the configurations of the AMI devices. Although the focus of this book is smart grid security and resiliency, the included formal analytics are generic enough to be extended to other cyber-physical systems, especially those related to industrial control systems (ICS). Therefore, industry professionals and academic researchers will find this book an exceptional resource to learn theoretical and practical aspects of applying formal methods for the protection of critical infrastructures.
733 kr
Skickas inom 5-8 vardagar
In this contributed volume, leading international researchers explore configuration modeling and checking, vulnerability and risk assessment, configuration analysis, and diagnostics and discovery.
1 096 kr
Skickas inom 10-15 vardagar
This book provides a comprehensive and in-depth study of automated firewall policy analysis for designing, configuring and managing distributed firewalls in large-scale enterpriser networks. It presents methodologies, techniques and tools for researchers as well as professionals to understand the challenges and improve the state-of-the-art of managing firewalls systematically in both research and application domains. Chapters explore set-theory, managing firewall configuration globally and consistently, access control list with encryption, and authentication such as IPSec policies. The author also reveals a high-level service-oriented firewall configuration language (called FLIP) and a methodology and framework for designing optimal distributed firewall architecture. The chapters illustrate the concepts, algorithms, implementations and case studies for each technique. Automated Firewall Analytics: Design, Configuration and Optimization is appropriate for researchers and professionals working with firewalls. Advanced-level students in computer science will find this material suitable as a secondary textbook or reference.
Del 67 - Advances in Information Security
Security and Resiliency Analytics for Smart Grids
Static and Dynamic Approaches
Häftad, Engelska, 2018
1 096 kr
Skickas inom 10-15 vardagar
The second section covers the formal verification of the security and resiliency of smart grid control systems by using a formal model to analyze attack evasions on state estimation, a core control module of the supervisory control system in smart grids.
Autonomic Networking
First International IFIP TC6 Conference, AN 2006, Paris, France, September 27-29, 2006, Proceedings
Häftad, Engelska, 2006
552 kr
Skickas inom 10-15 vardagar
The autonomic communication paradigm has been defined mainly through the Autonomic Communications Forum (ACF) and particularly as follows: Autonomic communication is centered on selfware – an innovative approach to perform known and emerging tasks of a network control plane, both end-to-end and middle box communication-based. Selfware assures the capacity to evolve; however, it requires generic network instrumentation. Selfware principles and technologies borrow largely from well-established research on distributed systems, fault tolerance among others, from emerging research on non-conventional networking (multihop ad hoc, sensor, peer-to-peer, group communication, etc. ), and from similar initiatives, such as Autonomic Computing of IBM, Cognitive Network of DARPA, Harmonious Computing of Hitachi, Resonant Networking of NTT, etc. A visionary network would be able to (a) configure and re-configure itself, (b) identify its operational state and take actions to drive itself to a desired stable state and finally (c) organize the allocation and distribution of its resources. To build such a network, it is necessary to go beyond the improvement of techniques and algorithms by using a new concept, the knowledge plane. The knowledge plane is able to collect information available in the network to provide other elements of the network with services and advice and make the network perform what it is supposed to. There are many objectives to the configuration and reconfiguration of the network, from the optimization of resources to the use of best available techniques in order to offer the most appropriate service, best adapted to the t- minal capabilities.