{"title":"Critical Infrastructure","authors":"","doi":"10.1002/9780470118955.ch2","DOIUrl":"https://doi.org/10.1002/9780470118955.ch2","url":null,"abstract":"The Commonwealth Fusion Center has a specialized unit assigned to critical infrastructure. Through access to a variety of intelligence and information sources, this unit works to maintain a real-time level of awareness relating to any and all current threat information, security updates and suspicious incidents relating to critical infrastructure by type and/or geographic locations. The Fusion Center seeks to become a central point for gathering threat related information, specifically in regard to suspicious incidents that may initially appear isolated but may actually be part of a larger criminal enterprise. The CFC also seeks to provide direct points of contact for personnel working with sites deemed to be critical infrastructure, who may have security related questions, or seek to provide information related to non-emergency suspicious incidents. This information will be collected and stored in a database that will assist analysts in producing intelligence products for public and private sector partners. The goal is to provide the tools to keep the Commonwealth better prepared to prevent a catastrophic incident and/or respond in the case of an emergency. Availability 24 hours a day/ 365 days a year","PeriodicalId":141746,"journal":{"name":"Advances in Information Security","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128711687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Roberto Di Pietro, Simone Raponi, Maurantonio Caprolu, S. Cresci
{"title":"Critical Infrastructure","authors":"Roberto Di Pietro, Simone Raponi, Maurantonio Caprolu, S. Cresci","doi":"10.1007/978-3-030-60618-3_5","DOIUrl":"https://doi.org/10.1007/978-3-030-60618-3_5","url":null,"abstract":"","PeriodicalId":141746,"journal":{"name":"Advances in Information Security","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114610754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Roberto Di Pietro, Simone Raponi, Maurantonio Caprolu, S. Cresci
{"title":"Information Disorder","authors":"Roberto Di Pietro, Simone Raponi, Maurantonio Caprolu, S. Cresci","doi":"10.1007/978-3-030-60618-3_2","DOIUrl":"https://doi.org/10.1007/978-3-030-60618-3_2","url":null,"abstract":"","PeriodicalId":141746,"journal":{"name":"Advances in Information Security","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123571052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Roberto Di Pietro, Simone Raponi, Maurantonio Caprolu, S. Cresci
{"title":"Business Entities","authors":"Roberto Di Pietro, Simone Raponi, Maurantonio Caprolu, S. Cresci","doi":"10.1007/978-3-030-60618-3_6","DOIUrl":"https://doi.org/10.1007/978-3-030-60618-3_6","url":null,"abstract":"","PeriodicalId":141746,"journal":{"name":"Advances in Information Security","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114403796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Roberto Di Pietro, Simone Raponi, Maurantonio Caprolu, S. Cresci
{"title":"FinTech","authors":"Roberto Di Pietro, Simone Raponi, Maurantonio Caprolu, S. Cresci","doi":"10.1007/978-3-030-60618-3_4","DOIUrl":"https://doi.org/10.1007/978-3-030-60618-3_4","url":null,"abstract":"","PeriodicalId":141746,"journal":{"name":"Advances in Information Security","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124910366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Roberto Di Pietro, Simone Raponi, Maurantonio Caprolu, S. Cresci
{"title":"Cryptocurrencies","authors":"Roberto Di Pietro, Simone Raponi, Maurantonio Caprolu, S. Cresci","doi":"10.1007/978-3-030-60618-3_3","DOIUrl":"https://doi.org/10.1007/978-3-030-60618-3_3","url":null,"abstract":"","PeriodicalId":141746,"journal":{"name":"Advances in Information Security","volume":"8 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123610643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jiaojiao Jiang, S. Wen, Shui Yu, B. Liu, Y. Xiang, Wanlei Zhou
{"title":"Malicious Attack Propagation and Source Identification","authors":"Jiaojiao Jiang, S. Wen, Shui Yu, B. Liu, Y. Xiang, Wanlei Zhou","doi":"10.1007/978-3-030-02179-5","DOIUrl":"https://doi.org/10.1007/978-3-030-02179-5","url":null,"abstract":"","PeriodicalId":141746,"journal":{"name":"Advances in Information Security","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116984902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Differential Privacy and Applications","authors":"Tianqing Zhu, Gang Li, Wanlei Zhou, Philip S. Yu","doi":"10.1007/978-3-319-62004-6","DOIUrl":"https://doi.org/10.1007/978-3-319-62004-6","url":null,"abstract":"","PeriodicalId":141746,"journal":{"name":"Advances in Information Security","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122869685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cyber Denial, Deception and Counter Deception","authors":"","doi":"10.1007/978-3-319-25133-2","DOIUrl":"https://doi.org/10.1007/978-3-319-25133-2","url":null,"abstract":"","PeriodicalId":141746,"journal":{"name":"Advances in Information Security","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132817754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cyber Warfare","authors":"Bobby Akart","doi":"10.1007/978-3-319-14039-1","DOIUrl":"https://doi.org/10.1007/978-3-319-14039-1","url":null,"abstract":"","PeriodicalId":141746,"journal":{"name":"Advances in Information Security","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129774744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}