Critical Infrastructure Protection VIII: 8th IFIP WG 11.10 International Conference, ICCIP 2014, Arlington, VA, USA, March 17-19, 2014, Revised Selected Papers
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Berlin, Heidelberg ; s.l.
Springer Berlin Heidelberg
2014
Imprint: Springer |
Schriftenreihe: | IFIP Advances in Information and Communication Technology
441 |
Schlagworte: | |
Online-Zugang: | DE-522 DE-634 DE-Aug4 DE-M347 DE-92 DE-859 DE-861 DE-473 DE-355 DE-703 DE-20 DE-29 DE-739 Volltext Inhaltsverzeichnis Abstract |
Beschreibung: | 1 Online-Ressource (XVIII, 276 p.) Ill. |
ISBN: | 9783662453551 |
DOI: | 10.1007/978-3-662-45355-1 |
Internformat
MARC
LEADER | 00000nmm a2200000 cb4500 | ||
---|---|---|---|
001 | BV042201980 | ||
003 | DE-604 | ||
007 | cr|uuu---uuuuu | ||
008 | 141121s2014 |||| o||u| ||||||eng d | ||
020 | |a 9783662453551 |c Online |9 978-3-662-45355-1 | ||
024 | 7 | |a 10.1007/978-3-662-45355-1 |2 doi | |
035 | |a (OCoLC)894703212 | ||
035 | |a (DE-599)BVBBV042201980 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-703 |a DE-20 |a DE-92 |a DE-859 |a DE-M347 |a DE-473 |a DE-522 |a DE-29 |a DE-861 |a DE-Aug4 |a DE-634 |a DE-739 |a DE-355 | ||
082 | 0 | |a 004 | |
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
100 | 1 | |a Butts, Jonathan |e Verfasser |4 aut | |
245 | 1 | 0 | |a Critical Infrastructure Protection VIII |b 8th IFIP WG 11.10 International Conference, ICCIP 2014, Arlington, VA, USA, March 17-19, 2014, Revised Selected Papers |c edited by Jonathan Butts, Sujeet Shenoi |
264 | 1 | |a Berlin, Heidelberg ; s.l. |b Springer Berlin Heidelberg |c 2014 | |
264 | 1 | |b Imprint: Springer | |
300 | |a 1 Online-Ressource (XVIII, 276 p.) |b Ill. | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a IFIP Advances in Information and Communication Technology |v 441 | |
533 | |a Online-Ausgabe |f Springer eBook Collection / Computer Science | ||
650 | 0 | 7 | |a Schwachstellenanalyse |0 (DE-588)4127497-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kritische Informationsinfrastruktur |0 (DE-588)7636254-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kritische Infrastruktur |0 (DE-588)7636249-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Softwareschwachstelle |0 (DE-588)4752508-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Internetkriminalität |0 (DE-588)7864395-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Kritische Informationsinfrastruktur |0 (DE-588)7636254-1 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 2 | |a Softwareschwachstelle |0 (DE-588)4752508-3 |D s |
689 | 0 | 3 | |a Internetkriminalität |0 (DE-588)7864395-8 |D s |
689 | 0 | 4 | |a Kritische Infrastruktur |0 (DE-588)7636249-8 |D s |
689 | 0 | 5 | |a Schwachstellenanalyse |0 (DE-588)4127497-0 |D s |
689 | 0 | 6 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Shenoi, Sujeet |e Sonstige |4 oth | |
776 | 0 | 8 | |i Reproduktion von |a Butts, Jonathan |t Critical Infrastructure Protection VIII |d 2014 |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 978-3-662-45354-4 |
830 | 0 | |a IFIP Advances in Information and Communication Technology |v 441 |w (DE-604)BV035839733 |9 441 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-662-45355-1 |x Verlag |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027640849&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027640849&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-SCS | ||
966 | e | |u https://doi.org/10.1007/978-3-662-45355-1 |l DE-522 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-45355-1 |l DE-634 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-45355-1 |l DE-Aug4 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-45355-1 |l DE-M347 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-45355-1 |l DE-92 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-45355-1 |l DE-859 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-45355-1 |l DE-861 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-45355-1 |l DE-473 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-45355-1 |l DE-355 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-45355-1 |l DE-703 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-45355-1 |l DE-20 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-45355-1 |l DE-29 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-45355-1 |l DE-739 |p ZDB-2-SCS |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1805077167280750592 |
---|---|
adam_text |
CRITICAL INFRASTRUCTURE PROTECTION VIII
/
: 2014
TABLE OF CONTENTS / INHALTSVERZEICHNIS
DETECTING INTEGRITY ATTACKS ON INDUSTRIAL CONTROL SYSTEMS
DETECTING MALICIOUS SOFTWARE EXECUTION IN PROGRAMMABLE LOGIC CONTROLLERS
USING POWER FINGERPRINTING
TIMING OF CYBER-PHYSICAL ATTACKS ON PROCESS CONTROL SYSTEMS
RECOVERY OF STRUCTURAL CONTROLLABILITY FOR CONTROL SYSTEMS
INDUSTRIAL CONTROL SYSTEM TRAFFIC DATA SETS FOR INTRUSION DETECTION
RESEARCH
AN INDUSTRIAL CONTROL SYSTEM TESTBED BASED ON EMULATION, PHYSICAL
DEVICES AND SIMULATION
EVIDENCE THEORY FOR CYBER-PHYSICAL SYSTEMS
AN AUTOMATED DIALOG SYSTEM FOR CONDUCTING SECURITY INTERVIEWS FOR ACCESS
CONTROL
A SURVEY OF CRITICAL INFRASTRUCTURE SECURITY
A SYSTEM DYNAMICS FRAMEWORK FOR MODELING CRITICAL INFRASTRUCTURE
RESILIENCE
REINFORCEMENT LEARNING USING MONTE CARLO POLICY ESTIMATION FOR DISASTER
MITIGATION
ACCURACY OF SERVICE AREA ESTIMATION METHODS USED FOR CRITICAL
INFRASTRUCTURE RECOVERY
A DECISION SUPPORT TOOL FOR A UNIFIED HOMELAND SECURITY STRATEGY
ASSESSING THE IMPACT OF CYBER ATTACKS ON WIRELESS SENSOR NODES THAT
MONITOR INTERDEPENDENT PHYSICAL SYSTEMS
ASSESSING POTENTIAL CASUALTIES IN CRITICAL EVENTS
EVALUATION OF FORMAT-PRESERVING ENCRYPTION ALGORITHMS FOR CRITICAL
INFRASTRUCTURE PROTECTION
ASYNCHRONOUS BINARY BYZANTINE CONSENSUS OVER GRAPHS WITH POWER-LAW
DEGREE SEQUENCE
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
CRITICAL INFRASTRUCTURE PROTECTION VIII
/
: 2014
ABSTRACT / INHALTSTEXT
THE INFORMATION INFRASTRUCTURE - COMPRISING COMPUTERS, EMBEDDED DEVICES,
NETWORKS AND SOFTWARE SYSTEMS - IS VITAL TO DAY-TO-DAY OPERATIONS IN
EVERY SECTOR: INFORMATION AND TELECOMMUNICATIONS, BANKING AND FINANCE,
ENERGY, CHEMICALS AND HAZARDOUS MATERIALS, AGRICULTURE, FOOD, WATER,
PUBLIC HEALTH, EMERGENCY SERVICES, TRANSPORTATION, POSTAL AND SHIPPING,
GOVERNMENT AND DEFENSE. GLOBAL BUSINESS AND INDUSTRY, GOVERNMENTS,
INDEED SOCIETY ITSELF, CANNOT FUNCTION EFFECTIVELY IF MAJOR COMPONENTS
OF THE CRITICAL INFORMATION INFRASTRUCTURE ARE DEGRADED, DISABLED OR
DESTROYED. CRITICAL INFRASTRUCTURE PROTECTION VIII DESCRIBES ORIGINAL
RESEARCH RESULTS AND INNOVATIVE APPLICATIONS IN THE INTERDISCIPLINARY
FIELD OF CRITICAL INFRASTRUCTURE PROTECTION. ALSO, IT HIGHLIGHTS THE
IMPORTANCE OF WEAVING SCIENCE, TECHNOLOGY AND POLICY IN CRAFTING
SOPHISTICATED, YET PRACTICAL, SOLUTIONS THAT WILL HELP SECURE
INFORMATION, COMPUTER AND NETWORK ASSETS IN THE VARIOUS CRITICAL
INFRASTRUCTURE SECTORS. AREAS OF COVERAGE INCLUDE: CONTROL SYSTEMS
SECURITY, INFRASTRUCTURE SECURITY, INFRASTRUCTURE MODELING AND
SIMULATION, RISK AND IMPACT ASSESSMENT, AND ADVANCED TECHNIQUES. THIS
BOOK IS THE EIGHTH VOLUME IN THE ANNUAL SERIES PRODUCED BY THE
INTERNATIONAL FEDERATION FOR INFORMATION PROCESSING (IFIP) WORKING GROUP
11.10 ON CRITICAL INFRASTRUCTURE PROTECTION, AN INTERNATIONAL COMMUNITY
OF SCIENTISTS, ENGINEERS, PRACTITIONERS AND POLICY MAKERS DEDICATED TO
ADVANCING RESEARCH, DEVELOPMENT AND IMPLEMENTATION EFFORTS FOCUSED ON
INFRASTRUCTURE PROTECTION. THE BOOK CONTAINS A SELECTION OF SEVENTEEN
EDITED PAPERS FROM THE 8TH ANNUAL IFIP WG 11.10 INTERNATIONAL CONFERENCE
ON CRITICAL INFRASTRUCTURE PROTECTION, HELD AT SRI INTERNATIONAL,
ARLINGTON, VIRGINIA, DC, USA IN THE SPRING OF 2014. CRITICAL
INFRASTRUCTURE PROTECTION VIII IS AN IMPORTANT RESOURCE FOR RESEARCHERS,
FACULTY MEMBERS AND GRADUATE STUDENTS, AS WELL AS FOR POLICY MAKERS,
PRACTITIONERS AND OTHER INDIVIDUALS WITH INTERESTS IN HOMELAND SECURITY
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT. |
any_adam_object | 1 |
author | Butts, Jonathan |
author_facet | Butts, Jonathan |
author_role | aut |
author_sort | Butts, Jonathan |
author_variant | j b jb |
building | Verbundindex |
bvnumber | BV042201980 |
classification_rvk | ST 277 |
collection | ZDB-2-SCS |
ctrlnum | (OCoLC)894703212 (DE-599)BVBBV042201980 |
dewey-full | 004 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004 |
dewey-search | 004 |
dewey-sort | 14 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-662-45355-1 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nmm a2200000 cb4500</leader><controlfield tag="001">BV042201980</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">141121s2014 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783662453551</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-662-45355-1</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-662-45355-1</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)894703212</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042201980</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-703</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-522</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Butts, Jonathan</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Critical Infrastructure Protection VIII</subfield><subfield code="b">8th IFIP WG 11.10 International Conference, ICCIP 2014, Arlington, VA, USA, March 17-19, 2014, Revised Selected Papers</subfield><subfield code="c">edited by Jonathan Butts, Sujeet Shenoi</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin, Heidelberg ; s.l.</subfield><subfield code="b">Springer Berlin Heidelberg</subfield><subfield code="c">2014</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="b">Imprint: Springer</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XVIII, 276 p.)</subfield><subfield code="b">Ill.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">IFIP Advances in Information and Communication Technology</subfield><subfield code="v">441</subfield></datafield><datafield tag="533" ind1=" " ind2=" "><subfield code="a">Online-Ausgabe</subfield><subfield code="f">Springer eBook Collection / Computer Science</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Schwachstellenanalyse</subfield><subfield code="0">(DE-588)4127497-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kritische Informationsinfrastruktur</subfield><subfield code="0">(DE-588)7636254-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kritische Infrastruktur</subfield><subfield code="0">(DE-588)7636249-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Softwareschwachstelle</subfield><subfield code="0">(DE-588)4752508-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internetkriminalität</subfield><subfield code="0">(DE-588)7864395-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kritische Informationsinfrastruktur</subfield><subfield code="0">(DE-588)7636254-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Softwareschwachstelle</subfield><subfield code="0">(DE-588)4752508-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Internetkriminalität</subfield><subfield code="0">(DE-588)7864395-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Kritische Infrastruktur</subfield><subfield code="0">(DE-588)7636249-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="5"><subfield code="a">Schwachstellenanalyse</subfield><subfield code="0">(DE-588)4127497-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="6"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Shenoi, Sujeet</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Reproduktion von</subfield><subfield code="a">Butts, Jonathan</subfield><subfield code="t">Critical Infrastructure Protection VIII</subfield><subfield code="d">2014</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-3-662-45354-4</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">IFIP Advances in Information and Communication Technology</subfield><subfield code="v">441</subfield><subfield code="w">(DE-604)BV035839733</subfield><subfield code="9">441</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-662-45355-1</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027640849&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027640849&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-45355-1</subfield><subfield code="l">DE-522</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-45355-1</subfield><subfield code="l">DE-634</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-45355-1</subfield><subfield code="l">DE-Aug4</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-45355-1</subfield><subfield code="l">DE-M347</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-45355-1</subfield><subfield code="l">DE-92</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-45355-1</subfield><subfield code="l">DE-859</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-45355-1</subfield><subfield code="l">DE-861</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-45355-1</subfield><subfield code="l">DE-473</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-45355-1</subfield><subfield code="l">DE-355</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-45355-1</subfield><subfield code="l">DE-703</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-45355-1</subfield><subfield code="l">DE-20</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-45355-1</subfield><subfield code="l">DE-29</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-45355-1</subfield><subfield code="l">DE-739</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV042201980 |
illustrated | Illustrated |
indexdate | 2024-07-20T06:08:53Z |
institution | BVB |
isbn | 9783662453551 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027640849 |
oclc_num | 894703212 |
open_access_boolean | |
owner | DE-703 DE-20 DE-92 DE-859 DE-M347 DE-473 DE-BY-UBG DE-522 DE-29 DE-861 DE-Aug4 DE-634 DE-739 DE-355 DE-BY-UBR |
owner_facet | DE-703 DE-20 DE-92 DE-859 DE-M347 DE-473 DE-BY-UBG DE-522 DE-29 DE-861 DE-Aug4 DE-634 DE-739 DE-355 DE-BY-UBR |
physical | 1 Online-Ressource (XVIII, 276 p.) Ill. |
psigel | ZDB-2-SCS |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Springer Berlin Heidelberg Imprint: Springer |
record_format | marc |
series | IFIP Advances in Information and Communication Technology |
series2 | IFIP Advances in Information and Communication Technology |
spelling | Butts, Jonathan Verfasser aut Critical Infrastructure Protection VIII 8th IFIP WG 11.10 International Conference, ICCIP 2014, Arlington, VA, USA, March 17-19, 2014, Revised Selected Papers edited by Jonathan Butts, Sujeet Shenoi Berlin, Heidelberg ; s.l. Springer Berlin Heidelberg 2014 Imprint: Springer 1 Online-Ressource (XVIII, 276 p.) Ill. txt rdacontent c rdamedia cr rdacarrier IFIP Advances in Information and Communication Technology 441 Online-Ausgabe Springer eBook Collection / Computer Science Schwachstellenanalyse (DE-588)4127497-0 gnd rswk-swf Kritische Informationsinfrastruktur (DE-588)7636254-1 gnd rswk-swf Kritische Infrastruktur (DE-588)7636249-8 gnd rswk-swf Softwareschwachstelle (DE-588)4752508-3 gnd rswk-swf Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Internetkriminalität (DE-588)7864395-8 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Kritische Informationsinfrastruktur (DE-588)7636254-1 s Computersicherheit (DE-588)4274324-2 s Softwareschwachstelle (DE-588)4752508-3 s Internetkriminalität (DE-588)7864395-8 s Kritische Infrastruktur (DE-588)7636249-8 s Schwachstellenanalyse (DE-588)4127497-0 s Kryptoanalyse (DE-588)4830502-9 s DE-604 Shenoi, Sujeet Sonstige oth Reproduktion von Butts, Jonathan Critical Infrastructure Protection VIII 2014 Erscheint auch als Druckausgabe 978-3-662-45354-4 IFIP Advances in Information and Communication Technology 441 (DE-604)BV035839733 441 https://doi.org/10.1007/978-3-662-45355-1 Verlag Volltext Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027640849&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027640849&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Abstract |
spellingShingle | Butts, Jonathan Critical Infrastructure Protection VIII 8th IFIP WG 11.10 International Conference, ICCIP 2014, Arlington, VA, USA, March 17-19, 2014, Revised Selected Papers IFIP Advances in Information and Communication Technology Schwachstellenanalyse (DE-588)4127497-0 gnd Kritische Informationsinfrastruktur (DE-588)7636254-1 gnd Kritische Infrastruktur (DE-588)7636249-8 gnd Softwareschwachstelle (DE-588)4752508-3 gnd Kryptoanalyse (DE-588)4830502-9 gnd Internetkriminalität (DE-588)7864395-8 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4127497-0 (DE-588)7636254-1 (DE-588)7636249-8 (DE-588)4752508-3 (DE-588)4830502-9 (DE-588)7864395-8 (DE-588)4274324-2 |
title | Critical Infrastructure Protection VIII 8th IFIP WG 11.10 International Conference, ICCIP 2014, Arlington, VA, USA, March 17-19, 2014, Revised Selected Papers |
title_auth | Critical Infrastructure Protection VIII 8th IFIP WG 11.10 International Conference, ICCIP 2014, Arlington, VA, USA, March 17-19, 2014, Revised Selected Papers |
title_exact_search | Critical Infrastructure Protection VIII 8th IFIP WG 11.10 International Conference, ICCIP 2014, Arlington, VA, USA, March 17-19, 2014, Revised Selected Papers |
title_full | Critical Infrastructure Protection VIII 8th IFIP WG 11.10 International Conference, ICCIP 2014, Arlington, VA, USA, March 17-19, 2014, Revised Selected Papers edited by Jonathan Butts, Sujeet Shenoi |
title_fullStr | Critical Infrastructure Protection VIII 8th IFIP WG 11.10 International Conference, ICCIP 2014, Arlington, VA, USA, March 17-19, 2014, Revised Selected Papers edited by Jonathan Butts, Sujeet Shenoi |
title_full_unstemmed | Critical Infrastructure Protection VIII 8th IFIP WG 11.10 International Conference, ICCIP 2014, Arlington, VA, USA, March 17-19, 2014, Revised Selected Papers edited by Jonathan Butts, Sujeet Shenoi |
title_short | Critical Infrastructure Protection VIII |
title_sort | critical infrastructure protection viii 8th ifip wg 11 10 international conference iccip 2014 arlington va usa march 17 19 2014 revised selected papers |
title_sub | 8th IFIP WG 11.10 International Conference, ICCIP 2014, Arlington, VA, USA, March 17-19, 2014, Revised Selected Papers |
topic | Schwachstellenanalyse (DE-588)4127497-0 gnd Kritische Informationsinfrastruktur (DE-588)7636254-1 gnd Kritische Infrastruktur (DE-588)7636249-8 gnd Softwareschwachstelle (DE-588)4752508-3 gnd Kryptoanalyse (DE-588)4830502-9 gnd Internetkriminalität (DE-588)7864395-8 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Schwachstellenanalyse Kritische Informationsinfrastruktur Kritische Infrastruktur Softwareschwachstelle Kryptoanalyse Internetkriminalität Computersicherheit |
url | https://doi.org/10.1007/978-3-662-45355-1 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027640849&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027640849&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV035839733 |
work_keys_str_mv | AT buttsjonathan criticalinfrastructureprotectionviii8thifipwg1110internationalconferenceiccip2014arlingtonvausamarch17192014revisedselectedpapers AT shenoisujeet criticalinfrastructureprotectionviii8thifipwg1110internationalconferenceiccip2014arlingtonvausamarch17192014revisedselectedpapers |