Critical information infrastructures security: 4th international workshop, CRITIS 2009, Bonn, Germany, September 30 - October 2, 2009 ; revised papers
Gespeichert in:
Format: | Tagungsbericht Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2010
|
Schriftenreihe: | Lecture notes in computer science
6027 |
Schlagworte: | |
Online-Zugang: | Inhaltstext Inhaltsverzeichnis |
Beschreibung: | XII, 212 S. Ill., graph. Darst. |
ISBN: | 3642143784 9783642143786 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV036599191 | ||
003 | DE-604 | ||
005 | 20100921 | ||
007 | t| | ||
008 | 100804s2010 xx ad|| |||| 10||| eng d | ||
015 | |a 10N24 |2 dnb | ||
016 | 7 | |a 1003339808 |2 DE-101 | |
020 | |a 3642143784 |c PB. : EUR 49.22 (freier Pr.), sfr 71.50 (freier Pr.) |9 3-642-14378-4 | ||
020 | |a 9783642143786 |c PB. : EUR 49.22 (freier Pr.), sfr 71.50 (freier Pr.) |9 978-3-642-14378-6 | ||
035 | |a (OCoLC)658236609 | ||
035 | |a (DE-599)DNB1003339808 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
049 | |a DE-706 |a DE-11 |a DE-91G |a DE-83 | ||
082 | 0 | |a 005.8 |2 22/ger | |
084 | |a 004 |2 sdnb | ||
084 | |a DAT 460f |2 stub | ||
084 | |a DAT 465f |2 stub | ||
245 | 1 | 0 | |a Critical information infrastructures security |b 4th international workshop, CRITIS 2009, Bonn, Germany, September 30 - October 2, 2009 ; revised papers |c Erich Rome ... (eds.) |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2010 | |
300 | |a XII, 212 S. |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 6027 | |
650 | 0 | 7 | |a Kritische Informationsinfrastruktur |0 (DE-588)7636254-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheitskritisches System |0 (DE-588)4767762-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2009 |z Bonn |2 gnd-content | |
689 | 0 | 0 | |a Kritische Informationsinfrastruktur |0 (DE-588)7636254-1 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 2 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 3 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 0 | 4 | |a Sicherheitskritisches System |0 (DE-588)4767762-4 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Rome, Erich |e Sonstige |4 oth | |
711 | 2 | |a CRITIS |n 4 |d 2009 |c Bonn |j Sonstige |0 (DE-588)16073487-3 |4 oth | |
830 | 0 | |a Lecture notes in computer science |v 6027 |w (DE-604)BV000000607 |9 6027 | |
856 | 4 | |q text/html |u http://deposit.dnb.de/cgi-bin/dokserv?id=3489768&prov=M&dok_var=1&dok_ext=htm |3 Inhaltstext | |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020519741&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-020519741 |
Datensatz im Suchindex
_version_ | 1820875246673068032 |
---|---|
adam_text |
TABLE OF CONTENTS ON MODELLING OF INTER-DEPENDENT NETWORK
INFRASTRUCTURES BY EXTENDED LEONTIEF MODELS 1 GREGORIO D'AGOSTINO,
ROBERTO CANNATA, AND VITTORIO ROSATO CRITICAL INFRASTRUCTURE PROTECTION
IN BRAZIL - THREAT IDENTIFICATION AND ANALYSIS 14 JOAEO H.A. FRANCO,
SERGIO L. RIBEIRO, SANDRA M.C. TOME, CHRISTIANE M.S. CUCULO, MARCOS B.
TRINDADE, LEONARDO M. LAGE, AND REGINA M. F. SOUZA DEVELOPMENT OF
INFORMATION SECURITY-FOCUSED INCIDENT PREVENTION MEASURES FOR CRITICAL
INFORMATION INFRASTRUCTURE IN JAPAN 22 HIDEAKI KOBAYASHI, KENJI
WATANABE, TAKAHITO WATANABE, AND YUKINOBU NAGAYASU DESIGN OF A MOBILE
AGENT-BASED ADAPTIVE COMMUNICATION MIDDLEWARE FOR FEDERATIONS OF
CRITICAL INFRASTRUCTURE SIMULATIONS 34 GOEKCE GOERBIL AND EROL GELENBE AN
ALTERNATE TOPOLOGY GENERATOR FOR JOINT STUDY OF POWER GRIDS AND
COMMUNICATION NETWORKS 50 ALPHA AMADOU DIALLO AND CLAUDE CHAUDET TROUBLE
BREWING: USING OBSERVATIONS OF INVARIANT BEHAVIOR TO DETECT MALICIOUS
AGENCY IN DISTRIBUTED CONTROL SYSTEMS 62 THOMAS RICHARD MCEVOY AND
STEPHEN D. WOLTHUSEN OPTIMISATION OF CRITICAL INFRASTRUCTURE PROTECTION:
THE SIVE PROJECT ON AIRPORT SECURITY 73 MARCUS BREIING, MARA COLE, JOHN
D'AVANZO, GEBHARD GEIGER, SASCHA GOLDNER, ANDREAS KUHLMANN, CLAUDIA
LORENZ, ALF PAPPROTH, ERHARD PETZEL, AND OLIVER SCHWETJE CYBER-CRITICA
BIBLIOGRAFISCHE INFORMATIONEN HTTP://D-NB.INFO/1003339808 DIGITALISIERT
DURCH 213 XII TABLE OF CONTENTS APPLICATION FILTERS FOR TCP/IP
INDUSTRIAL AUTOMATION PROTOCOLS ILL AGUINALDO B. BATISTA JR., TIAGO H.
KOBAYASHI, JOAEO PAULO S. MEDEIROS, AGOSTINHO M. BRITO JR., AND PAULO S.
MOTTA PIRES WEB BROWSER SECURITY UPDATE EFFECTIVENESS 124 THOMAS
DUEBENDORFER AND STEFAN FREI STATE-BASED NETWORK INTRUSION DETECTION
SYSTEMS FOR SCADA PROTOCOLS: A PROOF OF CONCEPT 138 ANDREA CARCANO, IGOR
NAI FOVINO, MARCELO MASERA, AND ALBERTO TROMBETTA TOWARDS EARLY WARNING
SYSTEMS - CHALLENGES, TECHNOLOGIES AND ARCHITECTURE 151 MARTIN APEL,
JOACHIM BISKUP, ULRICH FLEGEL, AND MICHAEL MEIER CII PROTECTION -
LESSONS FOR DEVELOPING COUNTRIES: SOUTH AFRICA AS A CASE STUDY 165
MBONELI NDLANGISA AND DEON HERBST ENERGY THEFT IN THE ADVANCED METERING
INFRASTRUCTURE 176 STEPHEN MCLAUGHLIN, DMITRY PODKUIKO, AND PATRICK
MCDANIEL CURRENT CAPABILITIES, REQUIREMENTS AND A PROPOSED STRATEGY FOR
INTERDEPENDENCY ANALYSIS IN THE UK 188 ROBIN BLOOMFIELD, NICK CHOZOS,
AND KIZITO SALAKO STOCHASTIC MODELLING OF THE EFFECTS OF
INTERDEPENDENCIES BETWEEN CRITICAL INFRASTRUCTURE 201 ROBIN BLOOMFIELD,
LUBOS BUZNA, PETER POPOV, KIZITO SALAKO, AND DAVID WRIGHT AUTHOR INDEX |
any_adam_object | 1 |
building | Verbundindex |
bvnumber | BV036599191 |
classification_rvk | SS 4800 |
classification_tum | DAT 460f DAT 465f |
ctrlnum | (OCoLC)658236609 (DE-599)DNB1003339808 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV036599191</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20100921</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">100804s2010 xx ad|| |||| 10||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">10N24</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1003339808</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3642143784</subfield><subfield code="c">PB. : EUR 49.22 (freier Pr.), sfr 71.50 (freier Pr.)</subfield><subfield code="9">3-642-14378-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642143786</subfield><subfield code="c">PB. : EUR 49.22 (freier Pr.), sfr 71.50 (freier Pr.)</subfield><subfield code="9">978-3-642-14378-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)658236609</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1003339808</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-11</subfield><subfield code="a">DE-91G</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 460f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Critical information infrastructures security</subfield><subfield code="b">4th international workshop, CRITIS 2009, Bonn, Germany, September 30 - October 2, 2009 ; revised papers</subfield><subfield code="c">Erich Rome ... (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2010</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XII, 212 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">6027</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kritische Informationsinfrastruktur</subfield><subfield code="0">(DE-588)7636254-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitskritisches System</subfield><subfield code="0">(DE-588)4767762-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2009</subfield><subfield code="z">Bonn</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kritische Informationsinfrastruktur</subfield><subfield code="0">(DE-588)7636254-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Sicherheitskritisches System</subfield><subfield code="0">(DE-588)4767762-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Rome, Erich</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">CRITIS</subfield><subfield code="n">4</subfield><subfield code="d">2009</subfield><subfield code="c">Bonn</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)16073487-3</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">6027</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">6027</subfield></datafield><datafield tag="856" ind1="4" ind2=" "><subfield code="q">text/html</subfield><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=3489768&prov=M&dok_var=1&dok_ext=htm</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020519741&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-020519741</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2009 Bonn gnd-content |
genre_facet | Konferenzschrift 2009 Bonn |
id | DE-604.BV036599191 |
illustrated | Illustrated |
indexdate | 2025-01-10T15:12:35Z |
institution | BVB |
institution_GND | (DE-588)16073487-3 |
isbn | 3642143784 9783642143786 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-020519741 |
oclc_num | 658236609 |
open_access_boolean | |
owner | DE-706 DE-11 DE-91G DE-BY-TUM DE-83 |
owner_facet | DE-706 DE-11 DE-91G DE-BY-TUM DE-83 |
physical | XII, 212 S. Ill., graph. Darst. |
publishDate | 2010 |
publishDateSearch | 2010 |
publishDateSort | 2010 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | Critical information infrastructures security 4th international workshop, CRITIS 2009, Bonn, Germany, September 30 - October 2, 2009 ; revised papers Erich Rome ... (eds.) Berlin [u.a.] Springer 2010 XII, 212 S. Ill., graph. Darst. txt rdacontent n rdamedia nc rdacarrier Lecture notes in computer science 6027 Kritische Informationsinfrastruktur (DE-588)7636254-1 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Sicherheitskritisches System (DE-588)4767762-4 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2009 Bonn gnd-content Kritische Informationsinfrastruktur (DE-588)7636254-1 s Computersicherheit (DE-588)4274324-2 s Datensicherung (DE-588)4011144-1 s Kryptoanalyse (DE-588)4830502-9 s Sicherheitskritisches System (DE-588)4767762-4 s DE-604 Rome, Erich Sonstige oth CRITIS 4 2009 Bonn Sonstige (DE-588)16073487-3 oth Lecture notes in computer science 6027 (DE-604)BV000000607 6027 text/html http://deposit.dnb.de/cgi-bin/dokserv?id=3489768&prov=M&dok_var=1&dok_ext=htm Inhaltstext DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020519741&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Critical information infrastructures security 4th international workshop, CRITIS 2009, Bonn, Germany, September 30 - October 2, 2009 ; revised papers Lecture notes in computer science Kritische Informationsinfrastruktur (DE-588)7636254-1 gnd Datensicherung (DE-588)4011144-1 gnd Kryptoanalyse (DE-588)4830502-9 gnd Sicherheitskritisches System (DE-588)4767762-4 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)7636254-1 (DE-588)4011144-1 (DE-588)4830502-9 (DE-588)4767762-4 (DE-588)4274324-2 (DE-588)1071861417 |
title | Critical information infrastructures security 4th international workshop, CRITIS 2009, Bonn, Germany, September 30 - October 2, 2009 ; revised papers |
title_auth | Critical information infrastructures security 4th international workshop, CRITIS 2009, Bonn, Germany, September 30 - October 2, 2009 ; revised papers |
title_exact_search | Critical information infrastructures security 4th international workshop, CRITIS 2009, Bonn, Germany, September 30 - October 2, 2009 ; revised papers |
title_full | Critical information infrastructures security 4th international workshop, CRITIS 2009, Bonn, Germany, September 30 - October 2, 2009 ; revised papers Erich Rome ... (eds.) |
title_fullStr | Critical information infrastructures security 4th international workshop, CRITIS 2009, Bonn, Germany, September 30 - October 2, 2009 ; revised papers Erich Rome ... (eds.) |
title_full_unstemmed | Critical information infrastructures security 4th international workshop, CRITIS 2009, Bonn, Germany, September 30 - October 2, 2009 ; revised papers Erich Rome ... (eds.) |
title_short | Critical information infrastructures security |
title_sort | critical information infrastructures security 4th international workshop critis 2009 bonn germany september 30 october 2 2009 revised papers |
title_sub | 4th international workshop, CRITIS 2009, Bonn, Germany, September 30 - October 2, 2009 ; revised papers |
topic | Kritische Informationsinfrastruktur (DE-588)7636254-1 gnd Datensicherung (DE-588)4011144-1 gnd Kryptoanalyse (DE-588)4830502-9 gnd Sicherheitskritisches System (DE-588)4767762-4 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Kritische Informationsinfrastruktur Datensicherung Kryptoanalyse Sicherheitskritisches System Computersicherheit Konferenzschrift 2009 Bonn |
url | http://deposit.dnb.de/cgi-bin/dokserv?id=3489768&prov=M&dok_var=1&dok_ext=htm http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020519741&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT romeerich criticalinformationinfrastructuressecurity4thinternationalworkshopcritis2009bonngermanyseptember30october22009revisedpapers AT critisbonn criticalinformationinfrastructuressecurity4thinternationalworkshopcritis2009bonngermanyseptember30october22009revisedpapers |