TY - GEN AU - Maglaras,Leandros AU - Kantzavelou,Ioanna AU - Ferrag,Mohamed Amine AU - Maglaras,Leandros AU - Kantzavelou,Ioanna AU - Ferrag,Mohamed Amine TI - Cyber Security of Critical Infrastructures SN - books978-3-0365-2727-7 PY - 2021/// CY - Basel, Switzerland PB - MDPI - Multidisciplinary Digital Publishing Institute KW - Technology: general issues KW - bicssc KW - crypto-ransomware KW - locker-ransomware KW - static analysis KW - dynamic analysis KW - machine learning KW - assessment framework KW - cybersecurity KW - GDPR KW - PCI-DSS KW - DSPT KW - NISD KW - cyber-ranges KW - security training KW - security modelling KW - serious games KW - dynamic adaptation KW - training programmes KW - computers in education KW - bloom KW - STRIDE KW - smart shipping KW - military KW - VMF KW - hash chain KW - T-OTP KW - lightweight secure hash (LSH) KW - CNR KW - web application KW - security vulnerability KW - analysis security testing KW - static analysis security testing KW - dynamic analysis security testing KW - interactive analysis security testing KW - assessment methodology KW - false positive KW - false negative KW - tools combination KW - deep learning KW - image classification KW - transfer learning KW - industrial control system KW - fine-tuning KW - testbeds KW - cyber ranges KW - cyber exercises KW - education KW - training KW - research KW - lattice cryptography KW - code cryptography KW - post quantum cryptography KW - physical unclonable function KW - public key infrastructure KW - high performance computing KW - malware analysis KW - static malware analysis KW - dynamic malware analysis KW - malware classification KW - random forest KW - support vector machines KW - smart grid KW - risk assessment KW - threat modeling KW - formal verification KW - probabilistic model checking KW - cloud robotics KW - image face recognition KW - deep learning algorithms KW - security KW - encryption algorithms KW - cybercrime KW - Hasse diagram KW - interval-valued complex intuitionistic fuzzy relations KW - interval-valued complex intuitionistic fuzzy sets KW - offensive cybersecurity KW - cyber-attacks KW - scoring model KW - offensive cybersecurity framework KW - n/a N1 - Open Access N2 - Critical infrastructures are vital assets for public safety, economic welfare, and the national security of countries. The vulnerabilities of critical infrastructures have increased with the widespread use of information technologies. As Critical National Infrastructures are becoming more vulnerable to cyber-attacks, their protection becomes a significant issue for organizations as well as nations. The risks to continued operations, from failing to upgrade aging infrastructure or not meeting mandated regulatory regimes, are considered highly significant, given the demonstrable impact of such circumstances. Due to the rapid increase of sophisticated cyber threats targeting critical infrastructures with significant destructive effects, the cybersecurity of critical infrastructures has become an agenda item for academics, practitioners, and policy makers. A holistic view which covers technical, policy, human, and behavioural aspects is essential to handle cyber security of critical infrastructures effectively. Moreover, the ability to attribute crimes to criminals is a vital element of avoiding impunity in cyberspace. In this book, both research and practical aspects of cyber security considerations in critical infrastructures are presented. Aligned with the interdisciplinary nature of cyber security, authors from academia, government, and industry have contributed 13 chapters. The issues that are discussed and analysed include cybersecurity training, maturity assessment frameworks, malware analysis techniques, ransomware attacks, security solutions for industrial control systems, and privacy preservation methods UR - https://mdpi.com/books/pdfview/book/4750 UR - https://directory.doabooks.org/handle/20.500.12854/77132 ER -