Búsqueda

Cybersecurity of critical infrastructures: challenges and solutions

<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd">
  <record>
    <leader>00000cab a22000004b 4500</leader>
    <controlfield tag="001">MAP20230004166</controlfield>
    <controlfield tag="003">MAP</controlfield>
    <controlfield tag="005">20231214133530.0</controlfield>
    <controlfield tag="008">220830e20220331che|| p      |0|||||eng d</controlfield>
    <datafield tag="040" ind1=" " ind2=" ">
      <subfield code="a">MAP</subfield>
      <subfield code="b">spa</subfield>
      <subfield code="d">MAP</subfield>
    </datafield>
    <datafield tag="084" ind1=" " ind2=" ">
      <subfield code="a">861</subfield>
    </datafield>
    <datafield tag="245" ind1="1" ind2="0">
      <subfield code="a">Cybersecurity of critical infrastructures: challenges and solutions</subfield>
      <subfield code="c">Leandros Maglaras... [et al.]</subfield>
    </datafield>
    <datafield tag="500" ind1=" " ind2=" ">
      <subfield code="a">This editorial presents the manuscripts accepted, after a careful peer-review process, for publication in the topic "Cyber Security and Critical Infrastructures" of the MDPI journals Applied Sciences, Electronics, Future Internet, Sensors and Smart Cities. The first volume includes sixteen articles: one editorial article, fifteen original research papers describing current challenges, innovative solutions, and real-world experiences involving critical infrastructures and one review paper focusing on the security and privacy challenges on Cloud, Edge, and Fog computing </subfield>
    </datafield>
    <datafield tag="520" ind1=" " ind2=" ">
      <subfield code="a">Digital technology creates an avenue for communication and networking, which is characterized by the exchange of data, some of which are considered sensitive or private. There have been many reports recently of data being hijacked or leaked, often for malicious purposes. Maintaining security and privacy of information and systems has become a her culean task. It is therefore imperative to understand how an individual's or organization's personal data can be protected. Moreover, critical infrastructures are vital resources for the public safety, economic well-being and national security. The major target of cyber attacks can be a country's Critical National Infrastructures (CNIs) like ports, hospitals, water, gas or electricity producers, that use and rely on Indus trial Control Systems but are affected by threats to any part of the supply chain</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20140022700</subfield>
      <subfield code="a">Ciberseguridad</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20140023066</subfield>
      <subfield code="a">Ciberataques</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20110029791</subfield>
      <subfield code="a">Infraestructuras críticas</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080622251</subfield>
      <subfield code="a">Seguridad de la información</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20170014157</subfield>
      <subfield code="a">Tecnología en la nube </subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080586546</subfield>
      <subfield code="a">Nuevas tecnologías</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20150019967</subfield>
      <subfield code="a">Vehículos autónomos</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20150010735</subfield>
      <subfield code="a">Internet de las cosas</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20160001631</subfield>
      <subfield code="a">Ciudades inteligentes</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20160013733</subfield>
      <subfield code="a">Salud Digital</subfield>
    </datafield>
    <datafield tag="700" ind1="1" ind2=" ">
      <subfield code="0">MAPA20220007955</subfield>
      <subfield code="a">Bousdekis,  Alexandros</subfield>
    </datafield>
    <datafield tag="773" ind1="0" ind2=" ">
      <subfield code="t">Sensors.- Basel, Switzerland : MDPI, A.G.</subfield>
      <subfield code="g">7 July 2022;  4 p.</subfield>
    </datafield>
    <datafield tag="787" ind1="0" ind2=" ">
      <subfield code="6">https://www.mdpi.com/topics/Cyber_Security_Critical_Infrastructures</subfield>
    </datafield>
    <datafield tag="856" ind1=" " ind2=" ">
      <subfield code="q">application/pdf</subfield>
      <subfield code="w">1119161</subfield>
      <subfield code="y">Acceso al documento/ Access the document</subfield>
    </datafield>
    <datafield tag="856" ind1="0" ind2="0">
      <subfield code="y">MÁS INFORMACIÓN</subfield>
      <subfield code="u">
mailto:centrodocumentacion@fundacionmapfre.org?subject=Consulta%20de%20una%20publicaci%C3%B3n%20&body=Necesito%20m%C3%A1s%20informaci%C3%B3n%20sobre%20este%20documento%3A%20%0A%0A%5Banote%20aqu%C3%AD%20el%20titulo%20completo%20del%20documento%20del%20que%20desea%20informaci%C3%B3n%20y%20nos%20pondremos%20en%20contacto%20con%20usted%5D%20%0A%0AGracias%20%0A
</subfield>
    </datafield>
  </record>
</collection>