Examining robustness and vulnerability of networked systems:
Gespeichert in:
Körperschaft: | |
---|---|
Weitere Verfasser: | , , |
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Amsterdam
IOS Press
2014
|
Schriftenreihe: | NATO science for peace and security series
vol. 37 |
Schlagworte: | |
Beschreibung: | "Proceedings of the NATO Advanced Research Workshop on Examining Robustness and Vulnerability of Critical Infrastructure Networks, Kiev, Ukraine, 3-5 June 2013.". - Includes indexes Online resource; title from PDF title page (IOS Press, viewed July 15, 2014) |
Beschreibung: | 1 online resource |
ISBN: | 9781614993919 1614993912 1614993904 9781614993902 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV045350788 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 181210s2014 |||| o||u| ||||||eng d | ||
020 | |a 9781614993919 |9 978-1-61499-391-9 | ||
020 | |a 1614993912 |9 1-61499-391-2 | ||
020 | |a 1614993904 |9 1-61499-390-4 | ||
020 | |a 9781614993902 |9 978-1-61499-390-2 | ||
035 | |a (ZDB-4-ITC)ocn883665971 | ||
035 | |a (OCoLC)883665971 | ||
035 | |a (DE-599)BVBBV045350788 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 004.6 |2 23 | |
110 | 2 | |a NATO Advanced Research Workshop on Examining Robustness and Vulnerability of Critical Infrastructure Networks <2013, Kiev, Ukraine> |e Verfasser |4 aut | |
245 | 1 | 0 | |a Examining robustness and vulnerability of networked systems |c edited by Sergiy Butenko, Eduardo L. Pasiliao, and Volodymyr Shylo |
264 | 1 | |a Amsterdam |b IOS Press |c 2014 | |
300 | |a 1 online resource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a NATO science for peace and security series |v vol. 37 | |
500 | |a "Proceedings of the NATO Advanced Research Workshop on Examining Robustness and Vulnerability of Critical Infrastructure Networks, Kiev, Ukraine, 3-5 June 2013.". - Includes indexes | ||
500 | |a Online resource; title from PDF title page (IOS Press, viewed July 15, 2014) | ||
505 | 8 | |a Modern critical infrastructure is characterized by complex, heterogeneous and dynamically evolving networks. But these can be vulnerable to component failure, and this is a problem which must be addressed by realistic mathematical models. This book presents papers from the NATO Advanced Research Workshop (ARW), Examining Robustness and Vulnerability of Critical Infrastructure Networks, held in Kiev, Ukraine, in June 2013. Contributions were from workshop participants as well as invited experts in the field, and cover topics including: mathematical models; probability-based risk measures; algor | |
650 | 7 | |a COMPUTERS / Computer Literacy |2 bisacsh | |
650 | 7 | |a COMPUTERS / Computer Science |2 bisacsh | |
650 | 7 | |a COMPUTERS / Data Processing |2 bisacsh | |
650 | 7 | |a COMPUTERS / Hardware / General |2 bisacsh | |
650 | 7 | |a COMPUTERS / Information Technology |2 bisacsh | |
650 | 7 | |a COMPUTERS / Machine Theory |2 bisacsh | |
650 | 7 | |a COMPUTERS / Reference |2 bisacsh | |
650 | 7 | |a Computer networks / Mathematical models |2 fast | |
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 4 | |a Computer networks |x Security measures |v Congresses |a Computer networks |x Mathematical models |v Congresses | |
655 | 7 | |8 1\p |0 (DE-588)1071861417 |a Konferenzschrift |2 gnd-content | |
700 | 1 | |a Butenko, Sergiy |4 edt | |
700 | 1 | |a Pasiliao, Eduardo L. |4 edt | |
700 | 1 | |a Shylo, Volodymyr |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |t Examining robustness and vulnerability of networked systems |d Amsterdam, Netherlands ; Fairfax, Virginia : IOS Press, c2014 |h viii, 309 pages |k NATO science for peace and security series. Sub-series D, Information and communication security ; Volume 37 |z 9781614993902 |
912 | |a ZDB-4-ITC | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-030737442 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804179175665303553 |
---|---|
any_adam_object | |
author2 | Butenko, Sergiy Pasiliao, Eduardo L. Shylo, Volodymyr |
author2_role | edt edt edt |
author2_variant | s b sb e l p el elp v s vs |
author_corporate | NATO Advanced Research Workshop on Examining Robustness and Vulnerability of Critical Infrastructure Networks <2013, Kiev, Ukraine> |
author_corporate_role | aut |
author_facet | Butenko, Sergiy Pasiliao, Eduardo L. Shylo, Volodymyr NATO Advanced Research Workshop on Examining Robustness and Vulnerability of Critical Infrastructure Networks <2013, Kiev, Ukraine> |
author_sort | NATO Advanced Research Workshop on Examining Robustness and Vulnerability of Critical Infrastructure Networks <2013, Kiev, Ukraine> |
building | Verbundindex |
bvnumber | BV045350788 |
collection | ZDB-4-ITC |
contents | Modern critical infrastructure is characterized by complex, heterogeneous and dynamically evolving networks. But these can be vulnerable to component failure, and this is a problem which must be addressed by realistic mathematical models. This book presents papers from the NATO Advanced Research Workshop (ARW), Examining Robustness and Vulnerability of Critical Infrastructure Networks, held in Kiev, Ukraine, in June 2013. Contributions were from workshop participants as well as invited experts in the field, and cover topics including: mathematical models; probability-based risk measures; algor |
ctrlnum | (ZDB-4-ITC)ocn883665971 (OCoLC)883665971 (DE-599)BVBBV045350788 |
dewey-full | 004.6 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.6 |
dewey-search | 004.6 |
dewey-sort | 14.6 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03288nmm a2200553zcb4500</leader><controlfield tag="001">BV045350788</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">181210s2014 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781614993919</subfield><subfield code="9">978-1-61499-391-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1614993912</subfield><subfield code="9">1-61499-391-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1614993904</subfield><subfield code="9">1-61499-390-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781614993902</subfield><subfield code="9">978-1-61499-390-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-4-ITC)ocn883665971</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)883665971</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045350788</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004.6</subfield><subfield code="2">23</subfield></datafield><datafield tag="110" ind1="2" ind2=" "><subfield code="a">NATO Advanced Research Workshop on Examining Robustness and Vulnerability of Critical Infrastructure Networks <2013, Kiev, Ukraine></subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Examining robustness and vulnerability of networked systems</subfield><subfield code="c">edited by Sergiy Butenko, Eduardo L. Pasiliao, and Volodymyr Shylo</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Amsterdam</subfield><subfield code="b">IOS Press</subfield><subfield code="c">2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">NATO science for peace and security series</subfield><subfield code="v">vol. 37</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"Proceedings of the NATO Advanced Research Workshop on Examining Robustness and Vulnerability of Critical Infrastructure Networks, Kiev, Ukraine, 3-5 June 2013.". - Includes indexes</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Online resource; title from PDF title page (IOS Press, viewed July 15, 2014)</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Modern critical infrastructure is characterized by complex, heterogeneous and dynamically evolving networks. But these can be vulnerable to component failure, and this is a problem which must be addressed by realistic mathematical models. This book presents papers from the NATO Advanced Research Workshop (ARW), Examining Robustness and Vulnerability of Critical Infrastructure Networks, held in Kiev, Ukraine, in June 2013. Contributions were from workshop participants as well as invited experts in the field, and cover topics including: mathematical models; probability-based risk measures; algor</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Computer Literacy</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Computer Science</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Data Processing</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Hardware / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Information Technology</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Machine Theory</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Reference</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Mathematical models</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="v">Congresses</subfield><subfield code="a">Computer networks</subfield><subfield code="x">Mathematical models</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="8">1\p</subfield><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Butenko, Sergiy</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Pasiliao, Eduardo L.</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Shylo, Volodymyr</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="t">Examining robustness and vulnerability of networked systems</subfield><subfield code="d">Amsterdam, Netherlands ; Fairfax, Virginia : IOS Press, c2014</subfield><subfield code="h">viii, 309 pages</subfield><subfield code="k">NATO science for peace and security series. Sub-series D, Information and communication security ; Volume 37</subfield><subfield code="z">9781614993902</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-ITC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030737442</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
genre | 1\p (DE-588)1071861417 Konferenzschrift gnd-content |
genre_facet | Konferenzschrift |
id | DE-604.BV045350788 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T08:15:42Z |
institution | BVB |
isbn | 9781614993919 1614993912 1614993904 9781614993902 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030737442 |
oclc_num | 883665971 |
open_access_boolean | |
physical | 1 online resource |
psigel | ZDB-4-ITC |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | IOS Press |
record_format | marc |
series2 | NATO science for peace and security series |
spelling | NATO Advanced Research Workshop on Examining Robustness and Vulnerability of Critical Infrastructure Networks <2013, Kiev, Ukraine> Verfasser aut Examining robustness and vulnerability of networked systems edited by Sergiy Butenko, Eduardo L. Pasiliao, and Volodymyr Shylo Amsterdam IOS Press 2014 1 online resource txt rdacontent c rdamedia cr rdacarrier NATO science for peace and security series vol. 37 "Proceedings of the NATO Advanced Research Workshop on Examining Robustness and Vulnerability of Critical Infrastructure Networks, Kiev, Ukraine, 3-5 June 2013.". - Includes indexes Online resource; title from PDF title page (IOS Press, viewed July 15, 2014) Modern critical infrastructure is characterized by complex, heterogeneous and dynamically evolving networks. But these can be vulnerable to component failure, and this is a problem which must be addressed by realistic mathematical models. This book presents papers from the NATO Advanced Research Workshop (ARW), Examining Robustness and Vulnerability of Critical Infrastructure Networks, held in Kiev, Ukraine, in June 2013. Contributions were from workshop participants as well as invited experts in the field, and cover topics including: mathematical models; probability-based risk measures; algor COMPUTERS / Computer Literacy bisacsh COMPUTERS / Computer Science bisacsh COMPUTERS / Data Processing bisacsh COMPUTERS / Hardware / General bisacsh COMPUTERS / Information Technology bisacsh COMPUTERS / Machine Theory bisacsh COMPUTERS / Reference bisacsh Computer networks / Mathematical models fast Computer networks / Security measures fast Computer networks Security measures Congresses Computer networks Mathematical models Congresses 1\p (DE-588)1071861417 Konferenzschrift gnd-content Butenko, Sergiy edt Pasiliao, Eduardo L. edt Shylo, Volodymyr edt Erscheint auch als Druck-Ausgabe Examining robustness and vulnerability of networked systems Amsterdam, Netherlands ; Fairfax, Virginia : IOS Press, c2014 viii, 309 pages NATO science for peace and security series. Sub-series D, Information and communication security ; Volume 37 9781614993902 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Examining robustness and vulnerability of networked systems Modern critical infrastructure is characterized by complex, heterogeneous and dynamically evolving networks. But these can be vulnerable to component failure, and this is a problem which must be addressed by realistic mathematical models. This book presents papers from the NATO Advanced Research Workshop (ARW), Examining Robustness and Vulnerability of Critical Infrastructure Networks, held in Kiev, Ukraine, in June 2013. Contributions were from workshop participants as well as invited experts in the field, and cover topics including: mathematical models; probability-based risk measures; algor COMPUTERS / Computer Literacy bisacsh COMPUTERS / Computer Science bisacsh COMPUTERS / Data Processing bisacsh COMPUTERS / Hardware / General bisacsh COMPUTERS / Information Technology bisacsh COMPUTERS / Machine Theory bisacsh COMPUTERS / Reference bisacsh Computer networks / Mathematical models fast Computer networks / Security measures fast Computer networks Security measures Congresses Computer networks Mathematical models Congresses |
subject_GND | (DE-588)1071861417 |
title | Examining robustness and vulnerability of networked systems |
title_auth | Examining robustness and vulnerability of networked systems |
title_exact_search | Examining robustness and vulnerability of networked systems |
title_full | Examining robustness and vulnerability of networked systems edited by Sergiy Butenko, Eduardo L. Pasiliao, and Volodymyr Shylo |
title_fullStr | Examining robustness and vulnerability of networked systems edited by Sergiy Butenko, Eduardo L. Pasiliao, and Volodymyr Shylo |
title_full_unstemmed | Examining robustness and vulnerability of networked systems edited by Sergiy Butenko, Eduardo L. Pasiliao, and Volodymyr Shylo |
title_short | Examining robustness and vulnerability of networked systems |
title_sort | examining robustness and vulnerability of networked systems |
topic | COMPUTERS / Computer Literacy bisacsh COMPUTERS / Computer Science bisacsh COMPUTERS / Data Processing bisacsh COMPUTERS / Hardware / General bisacsh COMPUTERS / Information Technology bisacsh COMPUTERS / Machine Theory bisacsh COMPUTERS / Reference bisacsh Computer networks / Mathematical models fast Computer networks / Security measures fast Computer networks Security measures Congresses Computer networks Mathematical models Congresses |
topic_facet | COMPUTERS / Computer Literacy COMPUTERS / Computer Science COMPUTERS / Data Processing COMPUTERS / Hardware / General COMPUTERS / Information Technology COMPUTERS / Machine Theory COMPUTERS / Reference Computer networks / Mathematical models Computer networks / Security measures Computer networks Security measures Congresses Computer networks Mathematical models Congresses Konferenzschrift |
work_keys_str_mv | AT natoadvancedresearchworkshoponexaminingrobustnessandvulnerabilityofcriticalinfrastructurenetworks2013kievukraine examiningrobustnessandvulnerabilityofnetworkedsystems AT butenkosergiy examiningrobustnessandvulnerabilityofnetworkedsystems AT pasiliaoeduardol examiningrobustnessandvulnerabilityofnetworkedsystems AT shylovolodymyr examiningrobustnessandvulnerabilityofnetworkedsystems |