Critical information infrastructures security: 7th international workshop, CRITIS 2012, Lillehammer, Norway, September 17 - 18, 2012 ; revised selected papers
Gespeichert in:
Format: | Elektronisch Tagungsbericht E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2013
|
Schriftenreihe: | Lecture notes in computer science
7722 |
Schlagworte: | |
Online-Zugang: | Volltext Inhaltsverzeichnis Abstract |
Beschreibung: | 1 Online-Ressource (XIII, 275 S.) graph. Darst. |
ISBN: | 3642414842 9783642414855 |
DOI: | 10.1007/978-3-642-41485-5 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV041590398 | ||
003 | DE-604 | ||
005 | 20140214 | ||
007 | cr|uuu---uuuuu | ||
008 | 140127s2013 gw d||| o|||| 10||| eng d | ||
020 | |a 3642414842 |9 3-642-41484-2 | ||
020 | |a 9783642414855 |c Online |9 978-3-642-41485-5 | ||
024 | 7 | |a 10.1007/978-3-642-41485-5 |2 doi | |
024 | 3 | |a 9783642414848 | |
028 | 5 | 2 | |a Best.-Nr.: 86327513 |
035 | |a (OCoLC)862045620 | ||
035 | |a (DE-599)BVBBV041590398 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
044 | |a gw |c XA-DE-BE | ||
049 | |a DE-473 |a DE-M347 |a DE-20 |a DE-703 |a DE-Aug4 |a DE-92 |a DE-29 |a DE-859 |a DE-91 |a DE-706 |a DE-739 |a DE-384 |a DE-634 |a DE-355 | ||
082 | 0 | |a 005.8 | |
084 | |a DAT 460f |2 stub | ||
084 | |a DAT 000 |2 stub | ||
084 | |a DAT 465f |2 stub | ||
245 | 1 | 0 | |a Critical information infrastructures security |b 7th international workshop, CRITIS 2012, Lillehammer, Norway, September 17 - 18, 2012 ; revised selected papers |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2013 | |
300 | |a 1 Online-Ressource (XIII, 275 S.) |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 7722 | |
650 | 0 | 7 | |a Kritische Informationsinfrastruktur |0 (DE-588)7636254-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheitskritisches System |0 (DE-588)4767762-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2012 |z Lillehammer |2 gnd-content | |
689 | 0 | 0 | |a Kritische Informationsinfrastruktur |0 (DE-588)7636254-1 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 2 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 3 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 0 | 4 | |a Sicherheitskritisches System |0 (DE-588)4767762-4 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Hämmerli, Bernhard M. |d 1958- |e Sonstige |0 (DE-588)133407209 |4 oth | |
711 | 2 | |a CRITIS |n 7 |d 2012 |c Lillehammer |j Sonstige |0 (DE-588)1044674288 |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Paperback |z 978-3-642-41484-8 |
830 | 0 | |a Lecture notes in computer science |v 7722 |w (DE-604)BV014880109 |9 7722 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-642-41485-5 |x Verlag |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027035472&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027035472&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-SCS | ||
912 | |a ZDB-2-LNC | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-027035472 |
Datensatz im Suchindex
_version_ | 1820875557993185280 |
---|---|
adam_text |
CRITICAL INFORMATION INFRASTRUCTURES SECURITY
/
: 2013
TABLE OF CONTENTS / INHALTSVERZEICHNIS
INTRUSION MANAGEMENT
SMART METERING AND GRID
ANALYSIS AND MODELING
SCADA
CYBER ISSUES
CI ANALYSIS
CIP SECTORS
CI ASSESSMENT.-THREAT MODELING
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
CRITICAL INFORMATION INFRASTRUCTURES SECURITY
/
: 2013
ABSTRACT / INHALTSTEXT
THIS BOOK CONSTITUTES THE THOROUGHLY REFEREED POST-PROCEEDINGS OF THE
7TH INTERNATIONAL WORKSHOP ON CRITICAL INFORMATION INFRASTRUCTURES
SECURITY, CRITIS 2012, HELD IN LILLEHAMMER, NORWAY, IN SEPTEMBER 2012.
THE 23 REVISED FULL PAPERS WERE THOROUGHLY REVIEWED AND SELECTED FROM 67
SUBMISSIONS. THE PAPERS ARE STRUCTURED IN THE FOLLOWING TOPICAL
SECTIONS: INTRUSION MANAGEMENT; SMART METERING AND GRID, ANALYSIS AND
MODELING; SCADA; CYBER ISSUES; CI ANALYSIS; CIP SECTORS; CI ASSESSMENT;
AND THREAT MODELING
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT. |
any_adam_object | 1 |
author_GND | (DE-588)133407209 |
building | Verbundindex |
bvnumber | BV041590398 |
classification_rvk | SS 4800 |
classification_tum | DAT 460f DAT 000 DAT 465f |
collection | ZDB-2-SCS ZDB-2-LNC |
ctrlnum | (OCoLC)862045620 (DE-599)BVBBV041590398 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-642-41485-5 |
format | Electronic Conference Proceeding eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV041590398</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20140214</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">140127s2013 gw d||| o|||| 10||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3642414842</subfield><subfield code="9">3-642-41484-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642414855</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-642-41485-5</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-642-41485-5</subfield><subfield code="2">doi</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783642414848</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">Best.-Nr.: 86327513</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)862045620</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV041590398</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-BE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-473</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 460f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Critical information infrastructures security</subfield><subfield code="b">7th international workshop, CRITIS 2012, Lillehammer, Norway, September 17 - 18, 2012 ; revised selected papers</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XIII, 275 S.)</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">7722</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kritische Informationsinfrastruktur</subfield><subfield code="0">(DE-588)7636254-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitskritisches System</subfield><subfield code="0">(DE-588)4767762-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2012</subfield><subfield code="z">Lillehammer</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kritische Informationsinfrastruktur</subfield><subfield code="0">(DE-588)7636254-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Sicherheitskritisches System</subfield><subfield code="0">(DE-588)4767762-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Hämmerli, Bernhard M.</subfield><subfield code="d">1958-</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)133407209</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">CRITIS</subfield><subfield code="n">7</subfield><subfield code="d">2012</subfield><subfield code="c">Lillehammer</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)1044674288</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Paperback</subfield><subfield code="z">978-3-642-41484-8</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">7722</subfield><subfield code="w">(DE-604)BV014880109</subfield><subfield code="9">7722</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-642-41485-5</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027035472&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027035472&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-LNC</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027035472</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2012 Lillehammer gnd-content |
genre_facet | Konferenzschrift 2012 Lillehammer |
id | DE-604.BV041590398 |
illustrated | Illustrated |
indexdate | 2025-01-10T15:17:31Z |
institution | BVB |
institution_GND | (DE-588)1044674288 |
isbn | 3642414842 9783642414855 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027035472 |
oclc_num | 862045620 |
open_access_boolean | |
owner | DE-473 DE-BY-UBG DE-M347 DE-20 DE-703 DE-Aug4 DE-92 DE-29 DE-859 DE-91 DE-BY-TUM DE-706 DE-739 DE-384 DE-634 DE-355 DE-BY-UBR |
owner_facet | DE-473 DE-BY-UBG DE-M347 DE-20 DE-703 DE-Aug4 DE-92 DE-29 DE-859 DE-91 DE-BY-TUM DE-706 DE-739 DE-384 DE-634 DE-355 DE-BY-UBR |
physical | 1 Online-Ressource (XIII, 275 S.) graph. Darst. |
psigel | ZDB-2-SCS ZDB-2-LNC |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | Critical information infrastructures security 7th international workshop, CRITIS 2012, Lillehammer, Norway, September 17 - 18, 2012 ; revised selected papers Berlin [u.a.] Springer 2013 1 Online-Ressource (XIII, 275 S.) graph. Darst. txt rdacontent c rdamedia cr rdacarrier Lecture notes in computer science 7722 Kritische Informationsinfrastruktur (DE-588)7636254-1 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Sicherheitskritisches System (DE-588)4767762-4 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2012 Lillehammer gnd-content Kritische Informationsinfrastruktur (DE-588)7636254-1 s Computersicherheit (DE-588)4274324-2 s Datensicherung (DE-588)4011144-1 s Kryptoanalyse (DE-588)4830502-9 s Sicherheitskritisches System (DE-588)4767762-4 s DE-604 Hämmerli, Bernhard M. 1958- Sonstige (DE-588)133407209 oth CRITIS 7 2012 Lillehammer Sonstige (DE-588)1044674288 oth Erscheint auch als Druck-Ausgabe, Paperback 978-3-642-41484-8 Lecture notes in computer science 7722 (DE-604)BV014880109 7722 https://doi.org/10.1007/978-3-642-41485-5 Verlag Volltext Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027035472&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027035472&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Abstract |
spellingShingle | Critical information infrastructures security 7th international workshop, CRITIS 2012, Lillehammer, Norway, September 17 - 18, 2012 ; revised selected papers Lecture notes in computer science Kritische Informationsinfrastruktur (DE-588)7636254-1 gnd Datensicherung (DE-588)4011144-1 gnd Kryptoanalyse (DE-588)4830502-9 gnd Sicherheitskritisches System (DE-588)4767762-4 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)7636254-1 (DE-588)4011144-1 (DE-588)4830502-9 (DE-588)4767762-4 (DE-588)4274324-2 (DE-588)1071861417 |
title | Critical information infrastructures security 7th international workshop, CRITIS 2012, Lillehammer, Norway, September 17 - 18, 2012 ; revised selected papers |
title_auth | Critical information infrastructures security 7th international workshop, CRITIS 2012, Lillehammer, Norway, September 17 - 18, 2012 ; revised selected papers |
title_exact_search | Critical information infrastructures security 7th international workshop, CRITIS 2012, Lillehammer, Norway, September 17 - 18, 2012 ; revised selected papers |
title_full | Critical information infrastructures security 7th international workshop, CRITIS 2012, Lillehammer, Norway, September 17 - 18, 2012 ; revised selected papers |
title_fullStr | Critical information infrastructures security 7th international workshop, CRITIS 2012, Lillehammer, Norway, September 17 - 18, 2012 ; revised selected papers |
title_full_unstemmed | Critical information infrastructures security 7th international workshop, CRITIS 2012, Lillehammer, Norway, September 17 - 18, 2012 ; revised selected papers |
title_short | Critical information infrastructures security |
title_sort | critical information infrastructures security 7th international workshop critis 2012 lillehammer norway september 17 18 2012 revised selected papers |
title_sub | 7th international workshop, CRITIS 2012, Lillehammer, Norway, September 17 - 18, 2012 ; revised selected papers |
topic | Kritische Informationsinfrastruktur (DE-588)7636254-1 gnd Datensicherung (DE-588)4011144-1 gnd Kryptoanalyse (DE-588)4830502-9 gnd Sicherheitskritisches System (DE-588)4767762-4 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Kritische Informationsinfrastruktur Datensicherung Kryptoanalyse Sicherheitskritisches System Computersicherheit Konferenzschrift 2012 Lillehammer |
url | https://doi.org/10.1007/978-3-642-41485-5 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027035472&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027035472&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV014880109 |
work_keys_str_mv | AT hammerlibernhardm criticalinformationinfrastructuressecurity7thinternationalworkshopcritis2012lillehammernorwayseptember17182012revisedselectedpapers AT critislillehammer criticalinformationinfrastructuressecurity7thinternationalworkshopcritis2012lillehammernorwayseptember17182012revisedselectedpapers |