@inbook{1d850b2d75e643dcaa25fc3241d45b03,
title = "Critical Infrastructures",
abstract = "This chapter refines the introduction of security in critical infrastructures by going into deeper details about how threats and countermeasures differ and are specific for the physical domain, the cyber domain and intermediate areas. Gaining an understanding of these differences is crucial for the design of effective countermeasures against the diverse nature of today{\textquoteright}s advanced persistent threats (APTs). As even local incidents may have far-reaching consequences beyond the logical or physical boundaries of a critical infrastructure, we devote parts of the chapter to a discussion and overview of simulation methods that help to model and estimate possible effects of security incidents across interwoven infrastructures. Such simulation models form an invaluable source of information and data for the subsequent construction of game-theoretic security models discussed in the rest of the book.",
author = "Stefan Rass and Stefan Schauer and Sandra K{\"o}nig and Quanyan Zhu",
note = "Publisher Copyright: {\textcopyright} 2020, Springer Nature Switzerland AG.",
year = "2020",
doi = "10.1007/978-3-030-46908-5_2",
language = "English (US)",
series = "Advanced Sciences and Technologies for Security Applications",
publisher = "Springer",
pages = "21--42",
booktitle = "Advanced Sciences and Technologies for Security Applications",
}