Examining robustness and vulnerability of networked systems /:
Modern critical infrastructure is characterized by complex, heterogeneous and dynamically evolving networks. But these can be vulnerable to component failure, and this is a problem which must be addressed by realistic mathematical models. This book presents papers from the NATO Advanced Research Wor...
Gespeichert in:
Körperschaften: | , |
---|---|
Weitere Verfasser: | , , |
Format: | Elektronisch Tagungsbericht E-Book |
Sprache: | English |
Veröffentlicht: |
Amsterdam :
IOS Press,
2014.
|
Schriftenreihe: | NATO science for peace and security series. Information and communication security ;
vol. 37. |
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | Modern critical infrastructure is characterized by complex, heterogeneous and dynamically evolving networks. But these can be vulnerable to component failure, and this is a problem which must be addressed by realistic mathematical models. This book presents papers from the NATO Advanced Research Workshop (ARW), Examining Robustness and Vulnerability of Critical Infrastructure Networks, held in Kiev, Ukraine, in June 2013. Contributions were from workshop participants as well as invited experts in the field, and cover topics including: mathematical models; probability-based risk measures; algor. |
Beschreibung: | "Proceedings of the NATO Advanced Research Workshop on Examining Robustness and Vulnerability of Critical Infrastructure Networks, Kiev, Ukraine, 3-5 June 2013." Includes indexes. |
Beschreibung: | 1 online resource |
Bibliographie: | Includes bibliographical references at the end of each chapters and indexes. |
ISBN: | 9781614993919 1614993912 1614993904 9781614993902 |
ISSN: | 1879-8292 |
Internformat
MARC
LEADER | 00000cam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn883665971 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 140715s2014 ne ob 101 0 eng d | ||
010 | |a 2014937624 | ||
040 | |a IOSPR |b eng |e rda |e pn |c IOSPR |d N$T |d E7B |d YDXCP |d OCLCQ |d OCLCF |d OCL |d OCLCO |d AZK |d IDEBK |d COCUF |d AGLDB |d CCO |d PIFBY |d OCLCQ |d VTS |d VT2 |d AU@ |d REC |d OCLCQ |d WYU |d STF |d OCLCQ |d AJS |d OCLCQ |d OCLCO |d OCLCQ |d QGK |d OCLCO |d OCLCL | ||
016 | 7 | |a 016859616 |2 Uk | |
019 | |a 961586241 |a 962645162 |a 1055378269 |a 1066691605 |a 1081233631 |a 1228571670 |a 1259193341 | ||
020 | |a 9781614993919 |q (electronic bk.) | ||
020 | |a 1614993912 |q (electronic bk.) | ||
020 | |a 1614993904 | ||
020 | |a 9781614993902 | ||
020 | |z 9781614993902 | ||
035 | |a (OCoLC)883665971 |z (OCoLC)961586241 |z (OCoLC)962645162 |z (OCoLC)1055378269 |z (OCoLC)1066691605 |z (OCoLC)1081233631 |z (OCoLC)1228571670 |z (OCoLC)1259193341 | ||
037 | |a 9781614993919 |b IOS Press |n http://www.iospress.nl | ||
050 | 4 | |a TK5105.59 | |
072 | 7 | |a COM |x COM053000 |2 bisacsh | |
072 | 7 | |a COM |x 013000 |2 bisacsh | |
072 | 7 | |a COM |x 014000 |2 bisacsh | |
072 | 7 | |a COM |x 018000 |2 bisacsh | |
072 | 7 | |a COM |x 067000 |2 bisacsh | |
072 | 7 | |a COM |x 032000 |2 bisacsh | |
072 | 7 | |a COM |x 037000 |2 bisacsh | |
072 | 7 | |a COM |x 052000 |2 bisacsh | |
082 | 7 | |a 004.6 |2 23 | |
049 | |a MAIN | ||
111 | 2 | |a NATO Advanced Research Workshop on Examining Robustness and Vulnerability of Critical Infrastructure Networks |d (2013 : |c Kiev, Ukraine) | |
245 | 1 | 0 | |a Examining robustness and vulnerability of networked systems / |c edited by Sergiy Butenko, Eduardo L. Pasiliao, and Volodymyr Shylo. |
264 | 1 | |a Amsterdam : |b IOS Press, |c 2014. | |
300 | |a 1 online resource | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a NATO Science for Peace and Security. Series D, Information and Communication Security ; |v vol. 37 | |
500 | |a "Proceedings of the NATO Advanced Research Workshop on Examining Robustness and Vulnerability of Critical Infrastructure Networks, Kiev, Ukraine, 3-5 June 2013." | ||
500 | |a Includes indexes. | ||
588 | 0 | |a Online resource; title from PDF title page (IOS Press, viewed July 15, 2014). | |
504 | |a Includes bibliographical references at the end of each chapters and indexes. | ||
505 | 0 | |a EXAMINING ROBUSTNESS AND VULNERABILITY OF NETWORKED SYSTEMS; Preface; Contents; A Survey of Interdependency Models for Critical Infrastructure Networks; Using GRASP for the Cover by s-Defective Independent Sets Problem; Local Search for Hop-Constrained Directed Steiner Tree Problem with Application to UAV-Based Multi-Target Surveillance; Variable Neighborhood Search for Edge-Ratio Network Clustering; On Data Clustering: Exact and Approximate Solutions; A Hybrid Metaheuristic for the Maximum k-Plex Problem; Monotonic and Non-Monotonic Infections on Networks. | |
505 | 8 | |a Distributed Computer Attack Detection System for Corporate NetworksOptimal Balanced Packing Using Phi-Function Technique; Security in Wireless Networks: A Tutorial; Approximation Algorithms for Detecting Critical Nodes; Subject Index; Author Index. | |
520 | |a Modern critical infrastructure is characterized by complex, heterogeneous and dynamically evolving networks. But these can be vulnerable to component failure, and this is a problem which must be addressed by realistic mathematical models. This book presents papers from the NATO Advanced Research Workshop (ARW), Examining Robustness and Vulnerability of Critical Infrastructure Networks, held in Kiev, Ukraine, in June 2013. Contributions were from workshop participants as well as invited experts in the field, and cover topics including: mathematical models; probability-based risk measures; algor. | ||
546 | |a English. | ||
650 | 0 | |a Computer networks |x Security measures |v Congresses. | |
650 | 0 | |a Computer networks |x Mathematical models |v Congresses. | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures |v Congrès. | |
650 | 6 | |a Réseaux d'ordinateurs |x Modèles mathématiques |v Congrès. | |
650 | 7 | |a COMPUTERS |x Computer Literacy. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Computer Science. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Data Processing. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Hardware |x General. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Information Technology. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Machine Theory. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Reference. |2 bisacsh | |
650 | 7 | |a Computer networks |x Mathematical models |2 fast | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
655 | 7 | |a Conference papers and proceedings |2 fast | |
700 | 1 | |a Butenko, Sergiy, |e editor. |0 http://id.loc.gov/authorities/names/n2002162281 | |
700 | 1 | |a Pasiliao, Eduardo L., |e editor. | |
700 | 1 | |a Shylo, Volodymyr, |e editor. | |
710 | 2 | |a IOS Press. |0 http://id.loc.gov/authorities/names/no2015091156 | |
758 | |i has work: |a Examining robustness and vulnerability of networked systems (Text) |1 https://id.oclc.org/worldcat/entity/E39PCFPkPKVrGq8Pf3jmG9kQ7b |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |t Examining robustness and vulnerability of networked systems. |d Amsterdam, Netherlands ; Fairfax, Virginia : IOS Press, ©2014 |h viii, 309 pages |k NATO science for peace and security series. Sub-series D, Information and communication security ; Volume 37 |x 1879-8292 |z 9781614993902 |
830 | 0 | |a NATO science for peace and security series. |n Sub-series D, |p Information and communication security ; |v vol. 37. |0 http://id.loc.gov/authorities/names/no2007140990 | |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=806186 |3 Volltext |
938 | |a ebrary |b EBRY |n ebr10898081 | ||
938 | |a EBSCOhost |b EBSC |n 806186 | ||
938 | |a ProQuest MyiLibrary Digital eBook Collection |b IDEB |n cis26473881 | ||
938 | |a YBP Library Services |b YANK |n 11952401 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn883665971 |
---|---|
_version_ | 1816882278747340800 |
adam_text | |
any_adam_object | |
author2 | Butenko, Sergiy Pasiliao, Eduardo L. Shylo, Volodymyr |
author2_role | edt edt edt |
author2_variant | s b sb e l p el elp v s vs |
author_GND | http://id.loc.gov/authorities/names/n2002162281 |
author_corporate | NATO Advanced Research Workshop on Examining Robustness and Vulnerability of Critical Infrastructure Networks Kiev, Ukraine IOS Press |
author_corporate_role | |
author_facet | Butenko, Sergiy Pasiliao, Eduardo L. Shylo, Volodymyr NATO Advanced Research Workshop on Examining Robustness and Vulnerability of Critical Infrastructure Networks Kiev, Ukraine IOS Press |
author_sort | NATO Advanced Research Workshop on Examining Robustness and Vulnerability of Critical Infrastructure Networks Kiev, Ukraine |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.59 |
callnumber-search | TK5105.59 |
callnumber-sort | TK 45105.59 |
callnumber-subject | TK - Electrical and Nuclear Engineering |
collection | ZDB-4-EBA |
contents | EXAMINING ROBUSTNESS AND VULNERABILITY OF NETWORKED SYSTEMS; Preface; Contents; A Survey of Interdependency Models for Critical Infrastructure Networks; Using GRASP for the Cover by s-Defective Independent Sets Problem; Local Search for Hop-Constrained Directed Steiner Tree Problem with Application to UAV-Based Multi-Target Surveillance; Variable Neighborhood Search for Edge-Ratio Network Clustering; On Data Clustering: Exact and Approximate Solutions; A Hybrid Metaheuristic for the Maximum k-Plex Problem; Monotonic and Non-Monotonic Infections on Networks. Distributed Computer Attack Detection System for Corporate NetworksOptimal Balanced Packing Using Phi-Function Technique; Security in Wireless Networks: A Tutorial; Approximation Algorithms for Detecting Critical Nodes; Subject Index; Author Index. |
ctrlnum | (OCoLC)883665971 |
dewey-full | 004.6 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.6 |
dewey-search | 004.6 |
dewey-sort | 14.6 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic Conference Proceeding eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05998cam a2200877 i 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn883665971</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu---unuuu</controlfield><controlfield tag="008">140715s2014 ne ob 101 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a"> 2014937624</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">IOSPR</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">IOSPR</subfield><subfield code="d">N$T</subfield><subfield code="d">E7B</subfield><subfield code="d">YDXCP</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCL</subfield><subfield code="d">OCLCO</subfield><subfield code="d">AZK</subfield><subfield code="d">IDEBK</subfield><subfield code="d">COCUF</subfield><subfield code="d">AGLDB</subfield><subfield code="d">CCO</subfield><subfield code="d">PIFBY</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VTS</subfield><subfield code="d">VT2</subfield><subfield code="d">AU@</subfield><subfield code="d">REC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">WYU</subfield><subfield code="d">STF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AJS</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">QGK</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">016859616</subfield><subfield code="2">Uk</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">961586241</subfield><subfield code="a">962645162</subfield><subfield code="a">1055378269</subfield><subfield code="a">1066691605</subfield><subfield code="a">1081233631</subfield><subfield code="a">1228571670</subfield><subfield code="a">1259193341</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781614993919</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1614993912</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1614993904</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781614993902</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781614993902</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)883665971</subfield><subfield code="z">(OCoLC)961586241</subfield><subfield code="z">(OCoLC)962645162</subfield><subfield code="z">(OCoLC)1055378269</subfield><subfield code="z">(OCoLC)1066691605</subfield><subfield code="z">(OCoLC)1081233631</subfield><subfield code="z">(OCoLC)1228571670</subfield><subfield code="z">(OCoLC)1259193341</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">9781614993919</subfield><subfield code="b">IOS Press</subfield><subfield code="n">http://www.iospress.nl</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK5105.59</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">COM053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">013000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">014000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">018000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">067000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">032000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">037000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">052000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">004.6</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="111" ind1="2" ind2=" "><subfield code="a">NATO Advanced Research Workshop on Examining Robustness and Vulnerability of Critical Infrastructure Networks</subfield><subfield code="d">(2013 :</subfield><subfield code="c">Kiev, Ukraine)</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Examining robustness and vulnerability of networked systems /</subfield><subfield code="c">edited by Sergiy Butenko, Eduardo L. Pasiliao, and Volodymyr Shylo.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Amsterdam :</subfield><subfield code="b">IOS Press,</subfield><subfield code="c">2014.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">NATO Science for Peace and Security. Series D, Information and Communication Security ;</subfield><subfield code="v">vol. 37</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"Proceedings of the NATO Advanced Research Workshop on Examining Robustness and Vulnerability of Critical Infrastructure Networks, Kiev, Ukraine, 3-5 June 2013."</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes indexes.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Online resource; title from PDF title page (IOS Press, viewed July 15, 2014).</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references at the end of each chapters and indexes.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">EXAMINING ROBUSTNESS AND VULNERABILITY OF NETWORKED SYSTEMS; Preface; Contents; A Survey of Interdependency Models for Critical Infrastructure Networks; Using GRASP for the Cover by s-Defective Independent Sets Problem; Local Search for Hop-Constrained Directed Steiner Tree Problem with Application to UAV-Based Multi-Target Surveillance; Variable Neighborhood Search for Edge-Ratio Network Clustering; On Data Clustering: Exact and Approximate Solutions; A Hybrid Metaheuristic for the Maximum k-Plex Problem; Monotonic and Non-Monotonic Infections on Networks.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Distributed Computer Attack Detection System for Corporate NetworksOptimal Balanced Packing Using Phi-Function Technique; Security in Wireless Networks: A Tutorial; Approximation Algorithms for Detecting Critical Nodes; Subject Index; Author Index.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Modern critical infrastructure is characterized by complex, heterogeneous and dynamically evolving networks. But these can be vulnerable to component failure, and this is a problem which must be addressed by realistic mathematical models. This book presents papers from the NATO Advanced Research Workshop (ARW), Examining Robustness and Vulnerability of Critical Infrastructure Networks, held in Kiev, Ukraine, in June 2013. Contributions were from workshop participants as well as invited experts in the field, and cover topics including: mathematical models; probability-based risk measures; algor.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="v">Congresses.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Mathematical models</subfield><subfield code="v">Congresses.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Réseaux d'ordinateurs</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures</subfield><subfield code="v">Congrès.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Réseaux d'ordinateurs</subfield><subfield code="x">Modèles mathématiques</subfield><subfield code="v">Congrès.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Computer Literacy.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Computer Science.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Data Processing.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Hardware</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Information Technology.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Machine Theory.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Reference.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Mathematical models</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Conference papers and proceedings</subfield><subfield code="2">fast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Butenko, Sergiy,</subfield><subfield code="e">editor.</subfield><subfield code="0">http://id.loc.gov/authorities/names/n2002162281</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Pasiliao, Eduardo L.,</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Shylo, Volodymyr,</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">IOS Press.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2015091156</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Examining robustness and vulnerability of networked systems (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCFPkPKVrGq8Pf3jmG9kQ7b</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="t">Examining robustness and vulnerability of networked systems.</subfield><subfield code="d">Amsterdam, Netherlands ; Fairfax, Virginia : IOS Press, ©2014</subfield><subfield code="h">viii, 309 pages</subfield><subfield code="k">NATO science for peace and security series. Sub-series D, Information and communication security ; Volume 37</subfield><subfield code="x">1879-8292</subfield><subfield code="z">9781614993902</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">NATO science for peace and security series.</subfield><subfield code="n">Sub-series D,</subfield><subfield code="p">Information and communication security ;</subfield><subfield code="v">vol. 37.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2007140990</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=806186</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ebrary</subfield><subfield code="b">EBRY</subfield><subfield code="n">ebr10898081</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">806186</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest MyiLibrary Digital eBook Collection</subfield><subfield code="b">IDEB</subfield><subfield code="n">cis26473881</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">11952401</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
genre | Conference papers and proceedings fast |
genre_facet | Conference papers and proceedings |
id | ZDB-4-EBA-ocn883665971 |
illustrated | Not Illustrated |
indexdate | 2024-11-27T13:26:05Z |
institution | BVB |
institution_GND | http://id.loc.gov/authorities/names/no2015091156 |
isbn | 9781614993919 1614993912 1614993904 9781614993902 |
issn | 1879-8292 |
language | English |
lccn | 2014937624 |
oclc_num | 883665971 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource |
psigel | ZDB-4-EBA |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | IOS Press, |
record_format | marc |
series | NATO science for peace and security series. Information and communication security ; |
series2 | NATO Science for Peace and Security. Series D, Information and Communication Security ; |
spelling | NATO Advanced Research Workshop on Examining Robustness and Vulnerability of Critical Infrastructure Networks (2013 : Kiev, Ukraine) Examining robustness and vulnerability of networked systems / edited by Sergiy Butenko, Eduardo L. Pasiliao, and Volodymyr Shylo. Amsterdam : IOS Press, 2014. 1 online resource text txt rdacontent computer c rdamedia online resource cr rdacarrier NATO Science for Peace and Security. Series D, Information and Communication Security ; vol. 37 "Proceedings of the NATO Advanced Research Workshop on Examining Robustness and Vulnerability of Critical Infrastructure Networks, Kiev, Ukraine, 3-5 June 2013." Includes indexes. Online resource; title from PDF title page (IOS Press, viewed July 15, 2014). Includes bibliographical references at the end of each chapters and indexes. EXAMINING ROBUSTNESS AND VULNERABILITY OF NETWORKED SYSTEMS; Preface; Contents; A Survey of Interdependency Models for Critical Infrastructure Networks; Using GRASP for the Cover by s-Defective Independent Sets Problem; Local Search for Hop-Constrained Directed Steiner Tree Problem with Application to UAV-Based Multi-Target Surveillance; Variable Neighborhood Search for Edge-Ratio Network Clustering; On Data Clustering: Exact and Approximate Solutions; A Hybrid Metaheuristic for the Maximum k-Plex Problem; Monotonic and Non-Monotonic Infections on Networks. Distributed Computer Attack Detection System for Corporate NetworksOptimal Balanced Packing Using Phi-Function Technique; Security in Wireless Networks: A Tutorial; Approximation Algorithms for Detecting Critical Nodes; Subject Index; Author Index. Modern critical infrastructure is characterized by complex, heterogeneous and dynamically evolving networks. But these can be vulnerable to component failure, and this is a problem which must be addressed by realistic mathematical models. This book presents papers from the NATO Advanced Research Workshop (ARW), Examining Robustness and Vulnerability of Critical Infrastructure Networks, held in Kiev, Ukraine, in June 2013. Contributions were from workshop participants as well as invited experts in the field, and cover topics including: mathematical models; probability-based risk measures; algor. English. Computer networks Security measures Congresses. Computer networks Mathematical models Congresses. Réseaux d'ordinateurs Sécurité Mesures Congrès. Réseaux d'ordinateurs Modèles mathématiques Congrès. COMPUTERS Computer Literacy. bisacsh COMPUTERS Computer Science. bisacsh COMPUTERS Data Processing. bisacsh COMPUTERS Hardware General. bisacsh COMPUTERS Information Technology. bisacsh COMPUTERS Machine Theory. bisacsh COMPUTERS Reference. bisacsh Computer networks Mathematical models fast Computer networks Security measures fast Conference papers and proceedings fast Butenko, Sergiy, editor. http://id.loc.gov/authorities/names/n2002162281 Pasiliao, Eduardo L., editor. Shylo, Volodymyr, editor. IOS Press. http://id.loc.gov/authorities/names/no2015091156 has work: Examining robustness and vulnerability of networked systems (Text) https://id.oclc.org/worldcat/entity/E39PCFPkPKVrGq8Pf3jmG9kQ7b https://id.oclc.org/worldcat/ontology/hasWork Print version: Examining robustness and vulnerability of networked systems. Amsterdam, Netherlands ; Fairfax, Virginia : IOS Press, ©2014 viii, 309 pages NATO science for peace and security series. Sub-series D, Information and communication security ; Volume 37 1879-8292 9781614993902 NATO science for peace and security series. Sub-series D, Information and communication security ; vol. 37. http://id.loc.gov/authorities/names/no2007140990 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=806186 Volltext |
spellingShingle | Examining robustness and vulnerability of networked systems / NATO science for peace and security series. Information and communication security ; EXAMINING ROBUSTNESS AND VULNERABILITY OF NETWORKED SYSTEMS; Preface; Contents; A Survey of Interdependency Models for Critical Infrastructure Networks; Using GRASP for the Cover by s-Defective Independent Sets Problem; Local Search for Hop-Constrained Directed Steiner Tree Problem with Application to UAV-Based Multi-Target Surveillance; Variable Neighborhood Search for Edge-Ratio Network Clustering; On Data Clustering: Exact and Approximate Solutions; A Hybrid Metaheuristic for the Maximum k-Plex Problem; Monotonic and Non-Monotonic Infections on Networks. Distributed Computer Attack Detection System for Corporate NetworksOptimal Balanced Packing Using Phi-Function Technique; Security in Wireless Networks: A Tutorial; Approximation Algorithms for Detecting Critical Nodes; Subject Index; Author Index. Computer networks Security measures Congresses. Computer networks Mathematical models Congresses. Réseaux d'ordinateurs Sécurité Mesures Congrès. Réseaux d'ordinateurs Modèles mathématiques Congrès. COMPUTERS Computer Literacy. bisacsh COMPUTERS Computer Science. bisacsh COMPUTERS Data Processing. bisacsh COMPUTERS Hardware General. bisacsh COMPUTERS Information Technology. bisacsh COMPUTERS Machine Theory. bisacsh COMPUTERS Reference. bisacsh Computer networks Mathematical models fast Computer networks Security measures fast |
title | Examining robustness and vulnerability of networked systems / |
title_auth | Examining robustness and vulnerability of networked systems / |
title_exact_search | Examining robustness and vulnerability of networked systems / |
title_full | Examining robustness and vulnerability of networked systems / edited by Sergiy Butenko, Eduardo L. Pasiliao, and Volodymyr Shylo. |
title_fullStr | Examining robustness and vulnerability of networked systems / edited by Sergiy Butenko, Eduardo L. Pasiliao, and Volodymyr Shylo. |
title_full_unstemmed | Examining robustness and vulnerability of networked systems / edited by Sergiy Butenko, Eduardo L. Pasiliao, and Volodymyr Shylo. |
title_short | Examining robustness and vulnerability of networked systems / |
title_sort | examining robustness and vulnerability of networked systems |
topic | Computer networks Security measures Congresses. Computer networks Mathematical models Congresses. Réseaux d'ordinateurs Sécurité Mesures Congrès. Réseaux d'ordinateurs Modèles mathématiques Congrès. COMPUTERS Computer Literacy. bisacsh COMPUTERS Computer Science. bisacsh COMPUTERS Data Processing. bisacsh COMPUTERS Hardware General. bisacsh COMPUTERS Information Technology. bisacsh COMPUTERS Machine Theory. bisacsh COMPUTERS Reference. bisacsh Computer networks Mathematical models fast Computer networks Security measures fast |
topic_facet | Computer networks Security measures Congresses. Computer networks Mathematical models Congresses. Réseaux d'ordinateurs Sécurité Mesures Congrès. Réseaux d'ordinateurs Modèles mathématiques Congrès. COMPUTERS Computer Literacy. COMPUTERS Computer Science. COMPUTERS Data Processing. COMPUTERS Hardware General. COMPUTERS Information Technology. COMPUTERS Machine Theory. COMPUTERS Reference. Computer networks Mathematical models Computer networks Security measures Conference papers and proceedings |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=806186 |
work_keys_str_mv | AT natoadvancedresearchworkshoponexaminingrobustnessandvulnerabilityofcriticalinfrastructurenetworkskievukraine examiningrobustnessandvulnerabilityofnetworkedsystems AT butenkosergiy examiningrobustnessandvulnerabilityofnetworkedsystems AT pasiliaoeduardol examiningrobustnessandvulnerabilityofnetworkedsystems AT shylovolodymyr examiningrobustnessandvulnerabilityofnetworkedsystems AT iospress examiningrobustnessandvulnerabilityofnetworkedsystems |