Handbook on Securing Cyber-Physical Critical Infrastructure

Handbook on Securing Cyber-Physical Critical Infrastructure, 1st Edition

Handbook on Securing Cyber-Physical Critical Infrastructure, 1st Edition,Sajal Das,Krishna Kant,Nan Zhang,ISBN9780124158153

  &      &      

Morgan Kaufmann




240 X 197

The most up-to-date and comprehensive coverage of the theoretical foundations and practical techniques for securing critical cyber control and physical systems infrastructure.

Print Book + eBook

USD 119.94
USD 199.90

Buy both together and save 40%

Print Book


In Stock

Estimated Delivery Time
USD 99.95

eBook Overview

VST (VitalSource Bookshelf) format

DRM-free included formats : EPUB, Mobi (for Kindle), PDF

USD 99.95
Add to Cart

Key Features

*Addresses the technical challenges facing design of secure infrastructures by providing examples of problems and solutions from a wide variety of internal and external attack scenarios

*Includes contributions from leading researchers and practitioners in relevant application areas such as smart power grid, intelligent transportation systems, healthcare industry and so on.

*Loaded with examples of real world problems and pathways to solutions utilizing specific tools and techniques described in detail throughout


The worldwide reach of the Internet allows malicious cyber criminals to coordinate and launch attacks on both cyber and cyber-physical infrastructure from anywhere in the world. This purpose of this handbook is to introduce the theoretical foundations and practical solution techniques for securing critical cyber and physical infrastructures as well as their underlying computing and communication architectures and systems. Examples of such infrastructures include utility networks (e.g., electrical power grids), ground transportation systems (automotives, roads, bridges and tunnels), airports and air traffic control systems, wired and wireless communication and sensor networks, systems for storing and distributing water and food supplies, medical and healthcare delivery systems, as well as financial, banking and commercial transaction assets. The handbook focus mostly on the scientific foundations and engineering techniques - while also addressing the proper integration of policies and access control mechanisms, for example, how human-developed policies can be properly enforced by an automated system.


Researchers and security practitioners in relevant application areas such as smart power grid, transportation systems, communication networks, etc. The handbook is also intended to be suitable for advanced courses and seminars as well as graduate students working on various facets of security in cyber and physical systems.

Sajal Das

Sajal K. Das is a University Distinguished Scholar Professor of Computer Science and Engineering and the Founding Director of the Center for Research in Wireless Mobility and Networking (CReWMaN) at the University of Texas at Arlington (UTA).

Affiliations and Expertise

University of Texas at Arlington (UTA).

Krishna Kant

Krishna Kant is currently with George Mason University and on leave of absence from Intel Corporation where he has worked since 1997. His current areas of research include robustness in the Internet, cloud computing security, and sustainable computing.

Affiliations and Expertise

George Mason University

Nan Zhang

Nan Zhang is an Assistant Professor of Computer Science at the George Washington University, Washington, DC, USA. Prior to joining GWU, he was an assistant professor of Computer Science and Engineering at the University of Texas at Arlington from 2006 to 2008. His current research interests span security and privacy issues in databases, data mining, and computer networks.

Affiliations and Expertise

George Washington University

Handbook on Securing Cyber-Physical Critical Infrastructure, 1st Edition

Introduction: Securing Cyber-Physical Infrastructures--An Overview
Part 1: Theoretical Foundations of Security
Chapter 1: Security and Vulnerability of Cyber-Physical Infrastructure Networks:  A Control-Theoretic Approach
Chapter 2: Game Theory for Infrastructure Security - The Power of Intent-Based Adversary Models
Chapter 3: An Analytical Framework for Cyber-Physical Networks
Chapter 4: Evolution of Widely Spreading Worms and Countermeasures : Epidemic Theory and Application
Part 2: Security for Wireless Mobile Networks
Chapter 5: Mobile Wireless Network Security
Chapter 6: Robust Wireless Infrastructure against Jamming Attacks
Chapter 7: Security for Mobile Ad Hoc Networks
Chapter 8: Defending against Identity-Based Attacks in Wireless Networks
Part 3: Security for Sensor Networks
Chapter 9: Efficient and Distributed Access Control for Sensor Networks
Chapter 10: Defending against Physical Attacks in Wireless Sensor Networks
Chapter 11: Node Compromise Detection in Wireless Sensor Networks
Part 4: Platform Security
Chapter 12: Hardware and Security: Vulnerabilities and Solutions
Chapter 13: Languages and Security: Safer Software Through Language and Compiler Techniques
Part 5: Cloud Computing and Data Security
Chapter 14: Protecting Data in Outsourcing Scenarios
Chapter 15: Data Security in Cloud Computing
Chapter 16: Secure Mobile Cloud Computing
Chapter 17: Relation Privacy Preservation in  Online Social Networks
Part 6: Event Monitoring and Situation Awareness
Chapter 18: Distributed Network and System Monitoring for Securing Cyber-Physical Infrastructure
Chapter 19: Discovering and Tracking Patterns of Interest in Security Sensor Streams
Chapter 20: Pervasive Sensing and Monitoring for Situational Awareness
Chapter 21: Sense and Response Systems for Crisis Management
Part 7. Policy Issues in Security Management
Chapter 22: Managing and Securing Critical Infrastructure -- A Semantic Policy and Trust-Driven Approach
Chapter 23: Policies, Access Control, and Formal Methods
Chapter 24: Formal Analysis of Policy based Security Configurations in Enterprise Networks
Part 8: Security Issues in Real-World Systems
Chapter 25: Security and Privacy in the Smart Grid
Chapter 26: Cyber-physical Security of Automotive Information Technology
Chapter 27: Security and Privacy for Mobile Healthcare (m-Health) Systems
Chapter 28: Security and Robustness in the Internet Infrastructure
Chapter 29: Emergency Vehicular Networks
Chapter 30: Security Issues in VoIP Telecommunication Networks

Quotes and reviews

"This impressive collection presents different viewpoints on the security of cyber-physical infrastructure. With more than 40 different contributors and 30 chapters organized in eight parts, the authors provide a unique introduction to the current state of the art in this field. The recent rise in both security awareness and the criticality of cyber-physical systems justifies the publishing of such a comprehensive book."--ComputingReviews.com, March 29, 2013


Cyber Week Pre-Sale | Use Code CYBOOK15

Shop with Confidence

Free Shipping around the world
▪ Broad range of products
▪ 30 days return policy

Contact Us