Critical information infrastructures security: 7th international workshop, CRITIS 2012, Lillehammer, Norway, September 17 - 18, 2012 ; revised selected papers
Gespeichert in:
Format: | Tagungsbericht Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2013
|
Schriftenreihe: | Lecture notes in computer science
7722 |
Schlagworte: | |
Online-Zugang: | Inhaltstext Inhaltsverzeichnis |
Beschreibung: | XIII, 275 S. graph. Darst. 235 mm x 155 mm |
ISBN: | 9783642414848 3642414842 9783642414855 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV041447697 | ||
003 | DE-604 | ||
005 | 20140214 | ||
007 | t| | ||
008 | 131127s2013 gw d||| |||| 10||| eng d | ||
015 | |a 13,N38 |2 dnb | ||
016 | 7 | |a 1041797966 |2 DE-101 | |
020 | |a 9783642414848 |c Pb. : ca. EUR 49.22 (DE) (freier Pr.), ca. EUR 50.60 (AT) (freier Pr.), ca. sfr 61.50 (freier Pr.) |9 978-3-642-41484-8 | ||
020 | |a 3642414842 |9 3-642-41484-2 | ||
020 | |a 9783642414855 |9 978-3-642-41485-5 | ||
024 | 3 | |a 9783642414848 | |
028 | 5 | 2 | |a Best.-Nr.: 86327513 |
035 | |a (OCoLC)864560075 | ||
035 | |a (DE-599)DNB1041797966 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
044 | |a gw |c XA-DE-BE | ||
049 | |a DE-83 |a DE-11 |a DE-91G | ||
082 | 0 | |a 004 | |
084 | |a DAT 460f |2 stub | ||
084 | |a DAT 465f |2 stub | ||
245 | 1 | 0 | |a Critical information infrastructures security |b 7th international workshop, CRITIS 2012, Lillehammer, Norway, September 17 - 18, 2012 ; revised selected papers |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2013 | |
300 | |a XIII, 275 S. |b graph. Darst. |c 235 mm x 155 mm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 7722 | |
650 | 0 | 7 | |a Kritische Informationsinfrastruktur |0 (DE-588)7636254-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheitskritisches System |0 (DE-588)4767762-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2012 |z Lillehammer |2 gnd-content | |
689 | 0 | 0 | |a Kritische Informationsinfrastruktur |0 (DE-588)7636254-1 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 2 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 3 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 0 | 4 | |a Sicherheitskritisches System |0 (DE-588)4767762-4 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Hämmerli, Bernhard M. |d 1958- |e Sonstige |0 (DE-588)133407209 |4 oth | |
711 | 2 | |a CRITIS |n 7 |d 2012 |c Lillehammer |j Sonstige |0 (DE-588)1044674288 |4 oth | |
830 | 0 | |a Lecture notes in computer science |v 7722 |w (DE-604)BV000000607 |9 7722 | |
856 | 4 | 2 | |m X:MVB |q text/html |u http://deposit.dnb.de/cgi-bin/dokserv?id=4443048&prov=M&dok_var=1&dok_ext=htm |3 Inhaltstext |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026894334&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-026894334 |
Datensatz im Suchindex
_version_ | 1820875543837409280 |
---|---|
adam_text |
TABLE OF CONTENTS
SESSION 1: INTRUSION MANAGEMENT
APPROACH TO ENHANCE THE EFFICIENCY OF SECURITY OPERATION CENTERS
TO HETEROGENEOUS IDS LANDSCAPES 1
BJORN-C. BOSCH
ENHANCING SIEM TECHNOLOGY TO PROTECT CRITICAL INFRASTRUCTURES 10
LUIGI COPPOLINO, SALVATORE D'ANTONIO, VALERIO FORMICOLA, AND
LUIGI ROMANO
PDR,: A PREVENTION, DETECTION AND RESPONSE MECHANISM FOR ANOMALIES
IN ENERGY CONTROL SYSTEMS 22
CRISTINA ALCARAZ AND MELTERN SONMEZ TURAN
SESSION 2: SMART METERING AND GRID
EMBEDDED CYBER-PHYSICAL ANOMALY DETECTION IN SMART METERS 34
MASSIRNILIANO B.ACITI AND SIMIN NADJM-TEHRANI
IMPROVING CONTROL SYSTEM CYBER-STATE AWARENESS USING KNOWN SECURE
SENSOR MEASUREMENTS 46
ONDREJ LINDA, MILOS MANIC, AND MILES MCQUEEN
THE EFFECTS OF NETWORK LINK UNRELIABILITY FOR LEADER ELECTION ALGORITHM
IN A SMART GRID SYSTEM 59
STEPHEN JACKSON AND BRUCE M. MCMILLIN
DISTRIBUTED GENERATION AND RESILIENCE IN POWER GRIDS 71
ANTONIO SCALA, MARIO MUREDDU, ALESSANDRO CHESSA,
GUIDO CALDARELLI, AND ALFONSO DAMIANO
BREAKING NONDEDUCIBLE ATTACKS ON THE SMART GRID 80
THOMAS ROTH AND BRUCE M. MCMILLIN
SESSION 3: ANALYSIS AND MODELING
CPS-CSH CYBER-PHYSICAL ANALYSIS AND DESIGN 92
DALE FITCH, SAHRA SEDIGH, BRUCE M. MCMILLIN, AND RAVI AKELLA
MODELING EMERGENCY RESPONSE PLANS WITH COLOURED PETRI NETS 106
MANUEL CHEMINOD, IVAN CIBRARIO BERTOLOTTI, LUCA DURANTE, AND
ADRIANO VALENZANO
HTTP://D-NB.INFO/1041797966
XII TABLE OF CONTENTS
SESSION 4: SCADA
DISTRIBUTED IDENTITY BASED PRIVATE KEY GENERATION FOR SCADA
SYSTEMS 118
GORKEM KTHNG AND IGOR NAI FOVINO
A TRUSTED COMPUTING ARCHITECTURE FOR SECURE SUBSTATION
AUTOMATION 130
DAAID GUIDRY, MIKE BURMESTER, XIUWEN LIU, JONATHAN JENKINS,
SEAN EASTON, AND XIN YUAN
SESSION 5: CYBER ISSUES
PROBABILISTIC MODEL CHECKING OF CAPTCHA ADMISSION CONTROL
FOR DOS RESISTANT ANTI-SPIT PROTECTION 143
EMMANOUELA STACHTIARI, YANNIS SOUPIONIS, PANAGIOTIS KATSAROS,
ANAKREONTAS MENTIS, AND DIMITRIS GRITZALIS
REASONING ABOUT VULNERABILITIES IN DEPENDENT INFORMATION
INFRASTRUCTURES: A CYBER RANGE EXPERIMENT 155
ADEDAYO 0. ADETOYE, SADIE CREESE, AND MICHAEL H. GOLDSMITH
SESSION 6: CI ANALYSIS
ALGEBRAIC ANALYSIS OF ATTACK IMPACTS AND COUNTERMEASURES IN CRITICAL
INFRASTRUCTURES 168
THOMAS RICHARD MCEVOY AND STEPHEN D. WOLTHUSEN
EVALUATION OF RESILIENCE OF INTERCONNECTED SYSTEMS BASED ON STABILITY
ANALYSIS 180
ANGELO ALESSANDRI AND ROBERTO FILIPPINI
SESSION 7: CIP SECTORS
SYSTEM DYNAMICS FOR R,AILWAY INFRASTRUCTURE PROTECTION 191
MARIA CARLA DE MAGGIO AND ROBERTO SETOLA
CONTAMINANT DETECTION IN URBAN WATER DISTRIBUTION NETWORKS USING
CHLORINE MEASUREMENTS 203
DEMETRIOS G. ELIADES AND MARIOS M. POLYCARPOU
COLLABORATION BETWEEN COMPETING MOBILE NETWORK OPERATORS
TO IMPROVE CUP 215
PETER SCHOO, MANFRED SCHAFER, ANDRE EGNERS, HANS HOFINGER,
SASCHA WESSEL, MARIAN KUEHNEL, SASCHA TODT, AND MICHAEL MONTAG
TABLE OF CONTENTS XIII
SESSION 8: CI ASSESSMENT
AMICI: AN ASSESSMENT PLATFORM FOR MULTI-DOMAIN SECURITY
EXPERIMENTATION ON CRITICAL INFRASTRUCTURES 228
BELA GENGE, CHRISTOS SIATERLIS, AND MARC HOHENADEL
ASSESSMENT OF SOCIAL IMPACT COSTS AND SOCIAL IMPACT MAGNITUDE
FROM BREAKDOWNS IN CRITICAL INFRASTRUCTURES 240
MATS B-0 LARSSON, GUNNAR BJDRKMAN, AND MATHIAS EKSTEDT
SESSION 9: THREAT MODELING
HIDDEN VULNERABILITIES DUE TO INTERDEPENDENCIES BETWEEN TWO
SYSTEMS 252
GEN NAN, IRENE EUSGELD, AND WOLFGANG KROGER
THREAT MODELING OF AMI 264
INGER ANNE T0NDEL, MARTIN GILJE JAATUN, AND MARIA BARTNES LINE
AUTHOR INDEX 277 |
any_adam_object | 1 |
author_GND | (DE-588)133407209 |
building | Verbundindex |
bvnumber | BV041447697 |
classification_rvk | SS 4800 |
classification_tum | DAT 460f DAT 465f |
ctrlnum | (OCoLC)864560075 (DE-599)DNB1041797966 |
dewey-full | 004 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004 |
dewey-search | 004 |
dewey-sort | 14 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV041447697</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20140214</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">131127s2013 gw d||| |||| 10||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">13,N38</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1041797966</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642414848</subfield><subfield code="c">Pb. : ca. EUR 49.22 (DE) (freier Pr.), ca. EUR 50.60 (AT) (freier Pr.), ca. sfr 61.50 (freier Pr.)</subfield><subfield code="9">978-3-642-41484-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3642414842</subfield><subfield code="9">3-642-41484-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642414855</subfield><subfield code="9">978-3-642-41485-5</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783642414848</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">Best.-Nr.: 86327513</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)864560075</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1041797966</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-BE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-83</subfield><subfield code="a">DE-11</subfield><subfield code="a">DE-91G</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 460f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Critical information infrastructures security</subfield><subfield code="b">7th international workshop, CRITIS 2012, Lillehammer, Norway, September 17 - 18, 2012 ; revised selected papers</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XIII, 275 S.</subfield><subfield code="b">graph. Darst.</subfield><subfield code="c">235 mm x 155 mm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">7722</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kritische Informationsinfrastruktur</subfield><subfield code="0">(DE-588)7636254-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitskritisches System</subfield><subfield code="0">(DE-588)4767762-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2012</subfield><subfield code="z">Lillehammer</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kritische Informationsinfrastruktur</subfield><subfield code="0">(DE-588)7636254-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Sicherheitskritisches System</subfield><subfield code="0">(DE-588)4767762-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Hämmerli, Bernhard M.</subfield><subfield code="d">1958-</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)133407209</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">CRITIS</subfield><subfield code="n">7</subfield><subfield code="d">2012</subfield><subfield code="c">Lillehammer</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)1044674288</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">7722</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">7722</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">X:MVB</subfield><subfield code="q">text/html</subfield><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=4443048&prov=M&dok_var=1&dok_ext=htm</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026894334&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-026894334</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2012 Lillehammer gnd-content |
genre_facet | Konferenzschrift 2012 Lillehammer |
id | DE-604.BV041447697 |
illustrated | Illustrated |
indexdate | 2025-01-10T15:17:18Z |
institution | BVB |
institution_GND | (DE-588)1044674288 |
isbn | 9783642414848 3642414842 9783642414855 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-026894334 |
oclc_num | 864560075 |
open_access_boolean | |
owner | DE-83 DE-11 DE-91G DE-BY-TUM |
owner_facet | DE-83 DE-11 DE-91G DE-BY-TUM |
physical | XIII, 275 S. graph. Darst. 235 mm x 155 mm |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | Critical information infrastructures security 7th international workshop, CRITIS 2012, Lillehammer, Norway, September 17 - 18, 2012 ; revised selected papers Berlin [u.a.] Springer 2013 XIII, 275 S. graph. Darst. 235 mm x 155 mm txt rdacontent n rdamedia nc rdacarrier Lecture notes in computer science 7722 Kritische Informationsinfrastruktur (DE-588)7636254-1 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Sicherheitskritisches System (DE-588)4767762-4 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2012 Lillehammer gnd-content Kritische Informationsinfrastruktur (DE-588)7636254-1 s Computersicherheit (DE-588)4274324-2 s Datensicherung (DE-588)4011144-1 s Kryptoanalyse (DE-588)4830502-9 s Sicherheitskritisches System (DE-588)4767762-4 s DE-604 Hämmerli, Bernhard M. 1958- Sonstige (DE-588)133407209 oth CRITIS 7 2012 Lillehammer Sonstige (DE-588)1044674288 oth Lecture notes in computer science 7722 (DE-604)BV000000607 7722 X:MVB text/html http://deposit.dnb.de/cgi-bin/dokserv?id=4443048&prov=M&dok_var=1&dok_ext=htm Inhaltstext DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026894334&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Critical information infrastructures security 7th international workshop, CRITIS 2012, Lillehammer, Norway, September 17 - 18, 2012 ; revised selected papers Lecture notes in computer science Kritische Informationsinfrastruktur (DE-588)7636254-1 gnd Datensicherung (DE-588)4011144-1 gnd Kryptoanalyse (DE-588)4830502-9 gnd Sicherheitskritisches System (DE-588)4767762-4 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)7636254-1 (DE-588)4011144-1 (DE-588)4830502-9 (DE-588)4767762-4 (DE-588)4274324-2 (DE-588)1071861417 |
title | Critical information infrastructures security 7th international workshop, CRITIS 2012, Lillehammer, Norway, September 17 - 18, 2012 ; revised selected papers |
title_auth | Critical information infrastructures security 7th international workshop, CRITIS 2012, Lillehammer, Norway, September 17 - 18, 2012 ; revised selected papers |
title_exact_search | Critical information infrastructures security 7th international workshop, CRITIS 2012, Lillehammer, Norway, September 17 - 18, 2012 ; revised selected papers |
title_full | Critical information infrastructures security 7th international workshop, CRITIS 2012, Lillehammer, Norway, September 17 - 18, 2012 ; revised selected papers |
title_fullStr | Critical information infrastructures security 7th international workshop, CRITIS 2012, Lillehammer, Norway, September 17 - 18, 2012 ; revised selected papers |
title_full_unstemmed | Critical information infrastructures security 7th international workshop, CRITIS 2012, Lillehammer, Norway, September 17 - 18, 2012 ; revised selected papers |
title_short | Critical information infrastructures security |
title_sort | critical information infrastructures security 7th international workshop critis 2012 lillehammer norway september 17 18 2012 revised selected papers |
title_sub | 7th international workshop, CRITIS 2012, Lillehammer, Norway, September 17 - 18, 2012 ; revised selected papers |
topic | Kritische Informationsinfrastruktur (DE-588)7636254-1 gnd Datensicherung (DE-588)4011144-1 gnd Kryptoanalyse (DE-588)4830502-9 gnd Sicherheitskritisches System (DE-588)4767762-4 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Kritische Informationsinfrastruktur Datensicherung Kryptoanalyse Sicherheitskritisches System Computersicherheit Konferenzschrift 2012 Lillehammer |
url | http://deposit.dnb.de/cgi-bin/dokserv?id=4443048&prov=M&dok_var=1&dok_ext=htm http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026894334&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT hammerlibernhardm criticalinformationinfrastructuressecurity7thinternationalworkshopcritis2012lillehammernorwayseptember17182012revisedselectedpapers AT critislillehammer criticalinformationinfrastructuressecurity7thinternationalworkshopcritis2012lillehammernorwayseptember17182012revisedselectedpapers |