Security of industrial control systems and cyber-physical systems: Second International Workshop, CyberICPS 2016, Heraklion, Crete, Greece, September 26-30, 2016 : revised selected papers
Gespeichert in:
Körperschaft: | |
---|---|
Weitere Verfasser: | , , , |
Format: | Elektronisch Tagungsbericht E-Book |
Sprache: | English |
Veröffentlicht: |
Cham, Switzerland
Springer
[2017]
|
Schriftenreihe: | Lecture notes in computer science
10166 |
Schlagworte: | |
Online-Zugang: | DE-634 DE-Aug4 DE-573 DE-M347 DE-92 DE-898 DE-859 DE-860 DE-861 DE-863 DE-862 DE-523 DE-91 DE-384 DE-473 DE-19 DE-355 DE-703 DE-20 DE-706 DE-29 DE-739 Volltext |
Beschreibung: | 1 Online-Ressource Illustrationen, Diagramme |
ISBN: | 9783319614373 |
ISSN: | 0302-9743 |
DOI: | 10.1007/978-3-319-61437-3 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV044397048 | ||
003 | DE-604 | ||
005 | 20241031 | ||
006 | a |||| 10||| | ||
007 | cr|uuu---uuuuu | ||
008 | 170705s2017 |||| o||u| ||||||eng d | ||
020 | |a 9783319614373 |c Online |9 978-3-319-61437-3 | ||
024 | 7 | |a 10.1007/978-3-319-61437-3 |2 doi | |
035 | |a (ZDB-2-SCS)9783319614373 | ||
035 | |a (ZDB-2-LNC)9783319614373 | ||
035 | |a (OCoLC)1002240813 | ||
035 | |a (DE-599)BVBBV044397048 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-860 |a DE-91 |a DE-Aug4 |a DE-898 |a DE-861 |a DE-523 |a DE-859 |a DE-473 |a DE-29 |a DE-863 |a DE-20 |a DE-862 |a DE-92 |a DE-573 |a DE-M347 |a DE-703 |a DE-706 |a DE-739 |a DE-634 |a DE-384 |a DE-355 |a DE-188 |a DE-19 | ||
082 | 0 | |a 005.1015113 |2 23 | |
084 | |a SS 4800 |0 (DE-625)143528: |2 rvk | ||
084 | |a DAT 461 |2 stub | ||
111 | 2 | |a CyberICPS |n 2. |d 2016 |c Heraklion |j Verfasser |0 (DE-588)113609489X |4 aut | |
245 | 1 | 0 | |a Security of industrial control systems and cyber-physical systems |b Second International Workshop, CyberICPS 2016, Heraklion, Crete, Greece, September 26-30, 2016 : revised selected papers |c Nora Cuppens-Boulahia, Costas Lambrinoudakis, Frédéric Cuppens, Sokratis Katsikas (eds.) |
264 | 1 | |a Cham, Switzerland |b Springer |c [2017] | |
300 | |a 1 Online-Ressource |b Illustrationen, Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 10166 |a Security and cryptology |x 0302-9743 | |
650 | 4 | |a Computer science | |
650 | 4 | |a Computer organization | |
650 | 4 | |a Computer security | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Computer logic | |
650 | 4 | |a Management information systems | |
650 | 4 | |a Computer Science | |
650 | 4 | |a Logics and Meanings of Programs | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Data Encryption | |
650 | 4 | |a Computer Systems Organization and Communication Networks | |
650 | 4 | |a Information Systems Applications (incl. Internet) | |
650 | 4 | |a Management of Computing and Information Systems | |
650 | 4 | |a Informatik | |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Privatsphäre |0 (DE-588)4123980-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2016 |z Kreta |2 gnd-content | |
689 | 0 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 0 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 2 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 3 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Privatsphäre |0 (DE-588)4123980-5 |D s |
689 | 1 | 1 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |D s |
689 | 1 | 2 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 1 | |5 DE-604 | |
700 | 1 | |a Cuppens-Boulahia, Nora |0 (DE-588)1246786680 |4 edt | |
700 | 1 | |a Lambrinoudakis, Costas |0 (DE-588)133547922 |4 edt | |
700 | 1 | |a Cuppens, Frédéric |d 1962- |0 (DE-588)1246786532 |4 edt | |
700 | 1 | |a Katsikas, Sōkratēs K. |d 1960- |0 (DE-588)1047133342 |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-3-319-61436-6 |w (DE-604)BV044376172 |
830 | 0 | |a Lecture notes in computer science |v 10166 |w (DE-604)BV014880109 |9 10166 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-319-61437-3 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-2-SCS |a ZDB-2-LNC | ||
940 | 1 | |q ZDB-2-SCS_2017 | |
940 | 1 | |q ZDB-2-LNC_2017 | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-029799182 | |
966 | e | |u https://doi.org/10.1007/978-3-319-61437-3 |l DE-634 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-61437-3 |l DE-Aug4 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-61437-3 |l DE-573 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-61437-3 |l DE-M347 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-61437-3 |l DE-92 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-61437-3 |l DE-898 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-61437-3 |l DE-859 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-61437-3 |l DE-860 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-61437-3 |l DE-861 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-61437-3 |l DE-863 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-61437-3 |l DE-862 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-61437-3 |l DE-523 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-61437-3 |l DE-91 |p ZDB-2-LNC |q ZDB-2-LNC_2017 |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-61437-3 |l DE-384 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-61437-3 |l DE-473 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-61437-3 |l DE-19 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-61437-3 |l DE-355 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-61437-3 |l DE-703 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-61437-3 |l DE-20 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-61437-3 |l DE-706 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-61437-3 |l DE-29 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-61437-3 |l DE-739 |p ZDB-2-LNC |x Verlag |3 Volltext |
Datensatz im Suchindex
DE-BY-FWS_katkey | 651609 |
---|---|
_version_ | 1814487391237308416 |
adam_text | |
any_adam_object | |
author2 | Cuppens-Boulahia, Nora Lambrinoudakis, Costas Cuppens, Frédéric 1962- Katsikas, Sōkratēs K. 1960- |
author2_role | edt edt edt edt |
author2_variant | n c b ncb c l cl f c fc s k k sk skk |
author_GND | (DE-588)1246786680 (DE-588)133547922 (DE-588)1246786532 (DE-588)1047133342 |
author_corporate | CyberICPS Heraklion |
author_corporate_role | aut |
author_facet | Cuppens-Boulahia, Nora Lambrinoudakis, Costas Cuppens, Frédéric 1962- Katsikas, Sōkratēs K. 1960- CyberICPS Heraklion |
author_sort | CyberICPS Heraklion |
building | Verbundindex |
bvnumber | BV044397048 |
classification_rvk | SS 4800 |
classification_tum | DAT 461 |
collection | ZDB-2-SCS ZDB-2-LNC |
ctrlnum | (ZDB-2-SCS)9783319614373 (ZDB-2-LNC)9783319614373 (OCoLC)1002240813 (DE-599)BVBBV044397048 |
dewey-full | 005.1015113 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.1015113 |
dewey-search | 005.1015113 |
dewey-sort | 15.1015113 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-319-61437-3 |
format | Electronic Conference Proceeding eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nmm a2200000zcb4500</leader><controlfield tag="001">BV044397048</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20241031</controlfield><controlfield tag="006">a |||| 10|||</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">170705s2017 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319614373</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-319-61437-3</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-319-61437-3</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SCS)9783319614373</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-LNC)9783319614373</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1002240813</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV044397048</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-860</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-523</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-355</subfield><subfield code="a">DE-188</subfield><subfield code="a">DE-19</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.1015113</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SS 4800</subfield><subfield code="0">(DE-625)143528:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 461</subfield><subfield code="2">stub</subfield></datafield><datafield tag="111" ind1="2" ind2=" "><subfield code="a">CyberICPS</subfield><subfield code="n">2.</subfield><subfield code="d">2016</subfield><subfield code="c">Heraklion</subfield><subfield code="j">Verfasser</subfield><subfield code="0">(DE-588)113609489X</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security of industrial control systems and cyber-physical systems</subfield><subfield code="b">Second International Workshop, CyberICPS 2016, Heraklion, Crete, Greece, September 26-30, 2016 : revised selected papers</subfield><subfield code="c">Nora Cuppens-Boulahia, Costas Lambrinoudakis, Frédéric Cuppens, Sokratis Katsikas (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham, Switzerland</subfield><subfield code="b">Springer</subfield><subfield code="c">[2017]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">10166</subfield><subfield code="a">Security and cryptology</subfield><subfield code="x">0302-9743</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer organization</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer logic</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management information systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Logics and Meanings of Programs</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Encryption</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Systems Organization and Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information Systems Applications (incl. Internet)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management of Computing and Information Systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2016</subfield><subfield code="z">Kreta</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Cuppens-Boulahia, Nora</subfield><subfield code="0">(DE-588)1246786680</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lambrinoudakis, Costas</subfield><subfield code="0">(DE-588)133547922</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Cuppens, Frédéric</subfield><subfield code="d">1962-</subfield><subfield code="0">(DE-588)1246786532</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Katsikas, Sōkratēs K.</subfield><subfield code="d">1960-</subfield><subfield code="0">(DE-588)1047133342</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-319-61436-6</subfield><subfield code="w">(DE-604)BV044376172</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">10166</subfield><subfield code="w">(DE-604)BV014880109</subfield><subfield code="9">10166</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-319-61437-3</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield><subfield code="a">ZDB-2-LNC</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2017</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-LNC_2017</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029799182</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-61437-3</subfield><subfield code="l">DE-634</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-61437-3</subfield><subfield code="l">DE-Aug4</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-61437-3</subfield><subfield code="l">DE-573</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-61437-3</subfield><subfield code="l">DE-M347</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-61437-3</subfield><subfield code="l">DE-92</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-61437-3</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-61437-3</subfield><subfield code="l">DE-859</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-61437-3</subfield><subfield code="l">DE-860</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-61437-3</subfield><subfield code="l">DE-861</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-61437-3</subfield><subfield code="l">DE-863</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-61437-3</subfield><subfield code="l">DE-862</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-61437-3</subfield><subfield code="l">DE-523</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-61437-3</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="q">ZDB-2-LNC_2017</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-61437-3</subfield><subfield code="l">DE-384</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-61437-3</subfield><subfield code="l">DE-473</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-61437-3</subfield><subfield code="l">DE-19</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-61437-3</subfield><subfield code="l">DE-355</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-61437-3</subfield><subfield code="l">DE-703</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-61437-3</subfield><subfield code="l">DE-20</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-61437-3</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-61437-3</subfield><subfield code="l">DE-29</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-61437-3</subfield><subfield code="l">DE-739</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2016 Kreta gnd-content |
genre_facet | Konferenzschrift 2016 Kreta |
id | DE-604.BV044397048 |
illustrated | Not Illustrated |
indexdate | 2024-11-01T04:00:22Z |
institution | BVB |
institution_GND | (DE-588)113609489X |
isbn | 9783319614373 |
issn | 0302-9743 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029799182 |
oclc_num | 1002240813 |
open_access_boolean | |
owner | DE-860 DE-91 DE-BY-TUM DE-Aug4 DE-898 DE-BY-UBR DE-861 DE-523 DE-859 DE-473 DE-BY-UBG DE-29 DE-863 DE-BY-FWS DE-20 DE-862 DE-BY-FWS DE-92 DE-573 DE-M347 DE-703 DE-706 DE-739 DE-634 DE-384 DE-355 DE-BY-UBR DE-188 DE-19 DE-BY-UBM |
owner_facet | DE-860 DE-91 DE-BY-TUM DE-Aug4 DE-898 DE-BY-UBR DE-861 DE-523 DE-859 DE-473 DE-BY-UBG DE-29 DE-863 DE-BY-FWS DE-20 DE-862 DE-BY-FWS DE-92 DE-573 DE-M347 DE-703 DE-706 DE-739 DE-634 DE-384 DE-355 DE-BY-UBR DE-188 DE-19 DE-BY-UBM |
physical | 1 Online-Ressource Illustrationen, Diagramme |
psigel | ZDB-2-SCS ZDB-2-LNC ZDB-2-SCS_2017 ZDB-2-LNC_2017 ZDB-2-LNC ZDB-2-LNC_2017 |
publishDate | 2017 |
publishDateSearch | 2017 |
publishDateSort | 2017 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science Security and cryptology |
spellingShingle | Security of industrial control systems and cyber-physical systems Second International Workshop, CyberICPS 2016, Heraklion, Crete, Greece, September 26-30, 2016 : revised selected papers Lecture notes in computer science Computer science Computer organization Computer security Data encryption (Computer science) Computer logic Management information systems Computer Science Logics and Meanings of Programs Systems and Data Security Data Encryption Computer Systems Organization and Communication Networks Information Systems Applications (incl. Internet) Management of Computing and Information Systems Informatik Datensicherung (DE-588)4011144-1 gnd Zugriffskontrolle (DE-588)4293034-0 gnd Rechnernetz (DE-588)4070085-9 gnd Privatsphäre (DE-588)4123980-5 gnd Kryptoanalyse (DE-588)4830502-9 gnd Computersicherheit (DE-588)4274324-2 gnd Kryptologie (DE-588)4033329-2 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)4293034-0 (DE-588)4070085-9 (DE-588)4123980-5 (DE-588)4830502-9 (DE-588)4274324-2 (DE-588)4033329-2 (DE-588)1071861417 |
title | Security of industrial control systems and cyber-physical systems Second International Workshop, CyberICPS 2016, Heraklion, Crete, Greece, September 26-30, 2016 : revised selected papers |
title_auth | Security of industrial control systems and cyber-physical systems Second International Workshop, CyberICPS 2016, Heraklion, Crete, Greece, September 26-30, 2016 : revised selected papers |
title_exact_search | Security of industrial control systems and cyber-physical systems Second International Workshop, CyberICPS 2016, Heraklion, Crete, Greece, September 26-30, 2016 : revised selected papers |
title_full | Security of industrial control systems and cyber-physical systems Second International Workshop, CyberICPS 2016, Heraklion, Crete, Greece, September 26-30, 2016 : revised selected papers Nora Cuppens-Boulahia, Costas Lambrinoudakis, Frédéric Cuppens, Sokratis Katsikas (eds.) |
title_fullStr | Security of industrial control systems and cyber-physical systems Second International Workshop, CyberICPS 2016, Heraklion, Crete, Greece, September 26-30, 2016 : revised selected papers Nora Cuppens-Boulahia, Costas Lambrinoudakis, Frédéric Cuppens, Sokratis Katsikas (eds.) |
title_full_unstemmed | Security of industrial control systems and cyber-physical systems Second International Workshop, CyberICPS 2016, Heraklion, Crete, Greece, September 26-30, 2016 : revised selected papers Nora Cuppens-Boulahia, Costas Lambrinoudakis, Frédéric Cuppens, Sokratis Katsikas (eds.) |
title_short | Security of industrial control systems and cyber-physical systems |
title_sort | security of industrial control systems and cyber physical systems second international workshop cybericps 2016 heraklion crete greece september 26 30 2016 revised selected papers |
title_sub | Second International Workshop, CyberICPS 2016, Heraklion, Crete, Greece, September 26-30, 2016 : revised selected papers |
topic | Computer science Computer organization Computer security Data encryption (Computer science) Computer logic Management information systems Computer Science Logics and Meanings of Programs Systems and Data Security Data Encryption Computer Systems Organization and Communication Networks Information Systems Applications (incl. Internet) Management of Computing and Information Systems Informatik Datensicherung (DE-588)4011144-1 gnd Zugriffskontrolle (DE-588)4293034-0 gnd Rechnernetz (DE-588)4070085-9 gnd Privatsphäre (DE-588)4123980-5 gnd Kryptoanalyse (DE-588)4830502-9 gnd Computersicherheit (DE-588)4274324-2 gnd Kryptologie (DE-588)4033329-2 gnd |
topic_facet | Computer science Computer organization Computer security Data encryption (Computer science) Computer logic Management information systems Computer Science Logics and Meanings of Programs Systems and Data Security Data Encryption Computer Systems Organization and Communication Networks Information Systems Applications (incl. Internet) Management of Computing and Information Systems Informatik Datensicherung Zugriffskontrolle Rechnernetz Privatsphäre Kryptoanalyse Computersicherheit Kryptologie Konferenzschrift 2016 Kreta |
url | https://doi.org/10.1007/978-3-319-61437-3 |
volume_link | (DE-604)BV014880109 |
work_keys_str_mv | AT cybericpsheraklion securityofindustrialcontrolsystemsandcyberphysicalsystemssecondinternationalworkshopcybericps2016heraklioncretegreeceseptember26302016revisedselectedpapers AT cuppensboulahianora securityofindustrialcontrolsystemsandcyberphysicalsystemssecondinternationalworkshopcybericps2016heraklioncretegreeceseptember26302016revisedselectedpapers AT lambrinoudakiscostas securityofindustrialcontrolsystemsandcyberphysicalsystemssecondinternationalworkshopcybericps2016heraklioncretegreeceseptember26302016revisedselectedpapers AT cuppensfrederic securityofindustrialcontrolsystemsandcyberphysicalsystemssecondinternationalworkshopcybericps2016heraklioncretegreeceseptember26302016revisedselectedpapers AT katsikassokratesk securityofindustrialcontrolsystemsandcyberphysicalsystemssecondinternationalworkshopcybericps2016heraklioncretegreeceseptember26302016revisedselectedpapers |