Critical information infrastructures security: 6th international workshop, CRITIS 2011, Lucerne, Switzerland, September 8 - 9, 2011 ; revised selected papers
Gespeichert in:
Format: | Elektronisch Tagungsbericht E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2013
|
Schriftenreihe: | Lecture notes in computer science
6983 |
Schlagworte: | |
Online-Zugang: | Volltext Inhaltsverzeichnis Abstract |
Beschreibung: | 1 Online-Ressource (XII, 226 S.) graph. Darst. |
ISBN: | 9783642414756 9783642414763 |
DOI: | 10.1007/978-3-642-41476-3 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV041452024 | ||
003 | DE-604 | ||
005 | 20140217 | ||
007 | cr|uuu---uuuuu | ||
008 | 131129s2013 xx d||| o|||| 10||| eng d | ||
020 | |a 9783642414756 |9 978-3-642-41475-6 | ||
020 | |a 9783642414763 |c eISBN |9 978-3-642-41476-3 | ||
024 | 7 | |a 10.1007/978-3-642-41476-3 |2 doi | |
035 | |a (OCoLC)859272987 | ||
035 | |a (DE-599)BVBBV041452024 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-473 |a DE-M347 |a DE-20 |a DE-703 |a DE-Aug4 |a DE-92 |a DE-29 |a DE-739 |a DE-859 |a DE-91 |a DE-706 |a DE-384 |a DE-634 |a DE-355 | ||
082 | 0 | |a 005.8 | |
084 | |a DAT 460f |2 stub | ||
084 | |a DAT 000 |2 stub | ||
084 | |a DAT 465f |2 stub | ||
245 | 1 | 0 | |a Critical information infrastructures security |b 6th international workshop, CRITIS 2011, Lucerne, Switzerland, September 8 - 9, 2011 ; revised selected papers |c Sandro Bologna ... (eds.) |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2013 | |
300 | |a 1 Online-Ressource (XII, 226 S.) |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 6983 | |
650 | 0 | 7 | |a Kritische Informationsinfrastruktur |0 (DE-588)7636254-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheitskritisches System |0 (DE-588)4767762-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2011 |z Luzern |2 gnd-content | |
689 | 0 | 0 | |a Kritische Informationsinfrastruktur |0 (DE-588)7636254-1 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 2 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 3 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 0 | 4 | |a Sicherheitskritisches System |0 (DE-588)4767762-4 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Bologna, Sandro |d 1948- |e Sonstige |0 (DE-588)1043076689 |4 oth | |
711 | 2 | |a CRITIS |n 6. |d 2011 |c Luzern |j Sonstige |0 (DE-588)1043072497 |4 oth | |
830 | 0 | |a Lecture notes in computer science |v 6983 |w (DE-604)BV014880109 |9 6983 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-642-41476-3 |x Verlag |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026898577&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026898577&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-SCS | ||
912 | |a ZDB-2-LNC | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-026898577 |
Datensatz im Suchindex
_version_ | 1820875548040101888 |
---|---|
adam_text |
CRITICAL INFORMATION INFRASTRUCTURE SECURITY
/
: 2013
TABLE OF CONTENTS / INHALTSVERZEICHNIS
TEN NATIONAL CYBER SECURITY STRATEGIES: A COMPARISON
ANALYSIS OF DEPENDENCIES IN CRITICAL INFRASTRUCTURES
ASSURANCE AND TRUST INDICATORS TO EVALUATE ACCURACY OF ON-LINE RISK IN
CRITICAL INFRASTRUCTURES
AN INNOVATIVE APPROACH TO EMERGENCY MANAGEMENT IN LARGE INFRASTRUCTURES
DYNAMIC EVACUATION GUIDANCE AS SAFETY CRITICAL APPLICATION IN BUILDING
AUTOMATION
DEFEATING NODE BASED ATTACKS ON SCADA SYSTEMS USING PROBABILISTIC PACKET
OBSERVATION
SUB-OPTIMAL TOPOLOGICAL PROTECTION STRATEGY FROM ADVANCED MALWARE
THE INSIDER THREAT IN CLOUD COMPUTING
INTERDEPENDENCIES BETWEEN CRITICAL INFRASTRUCTURES: ANALYZING THE RISK
OF CASCADING EFFECTS
HOW TO PERFORM VERIFICATION AND VALIDATION OF CRITICAL INFRASTRUCTURE
MODELING TOOLS
PETRI NET MODELLING OF PHYSICAL VULNERABILITY
INVESTIGATING THE EFFECT OF NETWORK PARAMETERS ON COORDINATED CYBER
ATTACKS AGAINST A SIMULATED POWER PLANT
THE ROLE OF THE DNS IN THE SECURE AND RESILIENT OPERATION OF CIS, THE
ENERGY SYSTEM EXAMPLE
THE DEVELOPMENT OF WARNING, ADVICE AND REPORTING POINTS (WARPS) IN UK
NATIONAL INFRASTRUCTURE
THE CONTRIBUTION OF NEISAS TO EP3R
POLICIES TO IMPROVE RESILIENCE AGAINST MAJOR INDUSTRIAL ACCIDENTS
FUZZY INPUT-OUTPUT INOPERABILITY MODEL
DEPENDENCIES DISCOVERY AND ANALYSIS IN DISTRIBUTED SYSTEMS
PROTECTING CRITICAL INFRASTRUCTURES FROM STEALTH ATTACKS: A CLOSED-LOOP
APPROACH INVOLVING DETECTION AND REMEDIATION
RISK ASSESSMENT IN CRITICAL INFRASTRUCTURE SECURITY MODELLING BASED ON
DEPENDENCY ANALYSIS
COUNTERMEASURES SELECTION VIA EVIDENCE THEORY
THE ROBUSTNESS OF ASSORTATIVITY
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
CRITICAL INFORMATION INFRASTRUCTURE SECURITY
/
: 2013
ABSTRACT / INHALTSTEXT
THIS BOOK CONSTITUTES REVISED SELECTED PAPERS FROM THE 6TH INTERNATIONAL
WORKSHOP ON CRITICAL INFORMATION INFRASTRUCTURE SECURITY, CRITIS 2011,
HELD IN LUCERNE, SWITZERLAND, IN SEPTEMBER 2011. THE 16 FULL PAPERS AND
6 SHORT PAPERS PRESENTED IN THIS VOLUME WERE CAREFULLY REVIEWED AND
SELECTED FROM 38 SUBMISSIONS. THEY DEAL WITH ALL AREAS OF CRITICAL
INFRASTRUCTURE PROTECTION RESEARCH
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT. |
any_adam_object | 1 |
author_GND | (DE-588)1043076689 |
building | Verbundindex |
bvnumber | BV041452024 |
classification_rvk | SS 4800 |
classification_tum | DAT 460f DAT 000 DAT 465f |
collection | ZDB-2-SCS ZDB-2-LNC |
ctrlnum | (OCoLC)859272987 (DE-599)BVBBV041452024 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-642-41476-3 |
format | Electronic Conference Proceeding eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV041452024</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20140217</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">131129s2013 xx d||| o|||| 10||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642414756</subfield><subfield code="9">978-3-642-41475-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642414763</subfield><subfield code="c">eISBN</subfield><subfield code="9">978-3-642-41476-3</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-642-41476-3</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)859272987</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV041452024</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-473</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 460f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Critical information infrastructures security</subfield><subfield code="b">6th international workshop, CRITIS 2011, Lucerne, Switzerland, September 8 - 9, 2011 ; revised selected papers</subfield><subfield code="c">Sandro Bologna ... (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XII, 226 S.)</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">6983</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kritische Informationsinfrastruktur</subfield><subfield code="0">(DE-588)7636254-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitskritisches System</subfield><subfield code="0">(DE-588)4767762-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2011</subfield><subfield code="z">Luzern</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kritische Informationsinfrastruktur</subfield><subfield code="0">(DE-588)7636254-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Sicherheitskritisches System</subfield><subfield code="0">(DE-588)4767762-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bologna, Sandro</subfield><subfield code="d">1948-</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)1043076689</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">CRITIS</subfield><subfield code="n">6.</subfield><subfield code="d">2011</subfield><subfield code="c">Luzern</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)1043072497</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">6983</subfield><subfield code="w">(DE-604)BV014880109</subfield><subfield code="9">6983</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-642-41476-3</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026898577&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026898577&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-LNC</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-026898577</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2011 Luzern gnd-content |
genre_facet | Konferenzschrift 2011 Luzern |
id | DE-604.BV041452024 |
illustrated | Illustrated |
indexdate | 2025-01-10T15:17:22Z |
institution | BVB |
institution_GND | (DE-588)1043072497 |
isbn | 9783642414756 9783642414763 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-026898577 |
oclc_num | 859272987 |
open_access_boolean | |
owner | DE-473 DE-BY-UBG DE-M347 DE-20 DE-703 DE-Aug4 DE-92 DE-29 DE-739 DE-859 DE-91 DE-BY-TUM DE-706 DE-384 DE-634 DE-355 DE-BY-UBR |
owner_facet | DE-473 DE-BY-UBG DE-M347 DE-20 DE-703 DE-Aug4 DE-92 DE-29 DE-739 DE-859 DE-91 DE-BY-TUM DE-706 DE-384 DE-634 DE-355 DE-BY-UBR |
physical | 1 Online-Ressource (XII, 226 S.) graph. Darst. |
psigel | ZDB-2-SCS ZDB-2-LNC |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | Critical information infrastructures security 6th international workshop, CRITIS 2011, Lucerne, Switzerland, September 8 - 9, 2011 ; revised selected papers Sandro Bologna ... (eds.) Berlin [u.a.] Springer 2013 1 Online-Ressource (XII, 226 S.) graph. Darst. txt rdacontent c rdamedia cr rdacarrier Lecture notes in computer science 6983 Kritische Informationsinfrastruktur (DE-588)7636254-1 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Sicherheitskritisches System (DE-588)4767762-4 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2011 Luzern gnd-content Kritische Informationsinfrastruktur (DE-588)7636254-1 s Computersicherheit (DE-588)4274324-2 s Datensicherung (DE-588)4011144-1 s Kryptoanalyse (DE-588)4830502-9 s Sicherheitskritisches System (DE-588)4767762-4 s DE-604 Bologna, Sandro 1948- Sonstige (DE-588)1043076689 oth CRITIS 6. 2011 Luzern Sonstige (DE-588)1043072497 oth Lecture notes in computer science 6983 (DE-604)BV014880109 6983 https://doi.org/10.1007/978-3-642-41476-3 Verlag Volltext Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026898577&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026898577&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Abstract |
spellingShingle | Critical information infrastructures security 6th international workshop, CRITIS 2011, Lucerne, Switzerland, September 8 - 9, 2011 ; revised selected papers Lecture notes in computer science Kritische Informationsinfrastruktur (DE-588)7636254-1 gnd Datensicherung (DE-588)4011144-1 gnd Kryptoanalyse (DE-588)4830502-9 gnd Sicherheitskritisches System (DE-588)4767762-4 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)7636254-1 (DE-588)4011144-1 (DE-588)4830502-9 (DE-588)4767762-4 (DE-588)4274324-2 (DE-588)1071861417 |
title | Critical information infrastructures security 6th international workshop, CRITIS 2011, Lucerne, Switzerland, September 8 - 9, 2011 ; revised selected papers |
title_auth | Critical information infrastructures security 6th international workshop, CRITIS 2011, Lucerne, Switzerland, September 8 - 9, 2011 ; revised selected papers |
title_exact_search | Critical information infrastructures security 6th international workshop, CRITIS 2011, Lucerne, Switzerland, September 8 - 9, 2011 ; revised selected papers |
title_full | Critical information infrastructures security 6th international workshop, CRITIS 2011, Lucerne, Switzerland, September 8 - 9, 2011 ; revised selected papers Sandro Bologna ... (eds.) |
title_fullStr | Critical information infrastructures security 6th international workshop, CRITIS 2011, Lucerne, Switzerland, September 8 - 9, 2011 ; revised selected papers Sandro Bologna ... (eds.) |
title_full_unstemmed | Critical information infrastructures security 6th international workshop, CRITIS 2011, Lucerne, Switzerland, September 8 - 9, 2011 ; revised selected papers Sandro Bologna ... (eds.) |
title_short | Critical information infrastructures security |
title_sort | critical information infrastructures security 6th international workshop critis 2011 lucerne switzerland september 8 9 2011 revised selected papers |
title_sub | 6th international workshop, CRITIS 2011, Lucerne, Switzerland, September 8 - 9, 2011 ; revised selected papers |
topic | Kritische Informationsinfrastruktur (DE-588)7636254-1 gnd Datensicherung (DE-588)4011144-1 gnd Kryptoanalyse (DE-588)4830502-9 gnd Sicherheitskritisches System (DE-588)4767762-4 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Kritische Informationsinfrastruktur Datensicherung Kryptoanalyse Sicherheitskritisches System Computersicherheit Konferenzschrift 2011 Luzern |
url | https://doi.org/10.1007/978-3-642-41476-3 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026898577&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026898577&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV014880109 |
work_keys_str_mv | AT bolognasandro criticalinformationinfrastructuressecurity6thinternationalworkshopcritis2011lucerneswitzerlandseptember892011revisedselectedpapers AT critisluzern criticalinformationinfrastructuressecurity6thinternationalworkshopcritis2011lucerneswitzerlandseptember892011revisedselectedpapers |