|
|
|
|
LEADER |
06656cam a22014052 4500 |
001 |
0-1653049588 |
003 |
DE-627 |
005 |
20240122104839.0 |
007 |
cr uuu---uuuuu |
008 |
131106s2013 gw |||||o 00| ||eng c |
020 |
|
|
|a 9783642414855
|9 978-3-642-41485-5
|
024 |
7 |
|
|a 10.1007/978-3-642-41485-5
|2 doi
|
035 |
|
|
|a (DE-627)1653049588
|
035 |
|
|
|a (DE-576)395819652
|
035 |
|
|
|a (DE-599)BSZ395819652
|
035 |
|
|
|a (OCoLC)862045620
|
035 |
|
|
|a (DE-He213)978-3-642-41485-5
|
035 |
|
|
|a (EBP)040551849
|
040 |
|
|
|a DE-627
|b ger
|c DE-627
|e rakwb
|
041 |
|
|
|a eng
|
044 |
|
|
|c XA-DE
|c XA-DE-BE
|
050 |
|
0 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a UTN
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
084 |
|
|
|a SS 4800
|q SEPA
|2 rvk
|0 (DE-625)rvk/143528:
|
084 |
|
|
|a 54.38
|2 bkl
|
100 |
1 |
|
|a Hämmerli, Bernhard M.
|4 aut
|
245 |
1 |
0 |
|a Critical Information Infrastructures Security
|b 7th International Workshop, CRITIS 2012, Lillehammer, Norway, September 17-18, 2012, Revised Selected Papers
|c edited by Bernhard M. Hämmerli, Nils Kalstad Svendsen, Javier Lopez
|
264 |
|
1 |
|a Berlin, Heidelberg
|b Springer
|c 2013
|
300 |
|
|
|a Online-Ressource (XIV, 277 p. 103 illus, online resource)
|
336 |
|
|
|a Text
|b txt
|2 rdacontent
|
337 |
|
|
|a Computermedien
|b c
|2 rdamedia
|
338 |
|
|
|a Online-Ressource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Lecture Notes in Computer Science
|v 7722
|
490 |
0 |
|
|a SpringerLink
|a Bücher
|
500 |
|
|
|a Literaturangaben
|
505 |
8 |
0 |
|a Intrusion managementSmart metering and grid -- Analysis and modeling -- SCADA -- Cyber issues -- CI analysis -- CIP sectors -- CI assessment.- Threat modeling.
|
520 |
|
|
|a This book constitutes the thoroughly refereed post-proceedings of the 7th International Workshop on Critical Information Infrastructures Security, CRITIS 2012, held in Lillehammer, Norway, in September 2012. The 23 revised full papers were thoroughly reviewed and selected from 67 submissions. The papers are structured in the following topical sections: intrusion management; smart metering and grid, analysis and modeling; SCADA; cyber issues; CI analysis; CIP sectors; CI assessment; and threat modeling
|
650 |
|
0 |
|a Computer science
|
650 |
|
0 |
|a Computer Communication Networks
|
650 |
|
0 |
|a Computer Science
|
650 |
|
0 |
|a Computer science
|
650 |
|
0 |
|a Computer Communication Networks
|
650 |
|
0 |
|a Data protection
|
650 |
|
0 |
|a Data protection
|
650 |
|
0 |
|a Computers and civilization.
|
650 |
|
0 |
|a Computer networks .
|
655 |
|
7 |
|a Konferenzschrift
|y 2012
|z Lillehammer
|0 (DE-588)1071861417
|0 (DE-627)826484824
|0 (DE-576)433375485
|2 gnd-content
|
655 |
|
7 |
|a Konferenzschrift
|0 (DE-588)1071861417
|0 (DE-627)826484824
|0 (DE-576)433375485
|2 gnd-content
|
689 |
0 |
0 |
|D s
|0 (DE-588)7636254-1
|0 (DE-627)587274158
|0 (DE-576)288551176
|a Kritische Informationsinfrastruktur
|2 gnd
|
689 |
0 |
1 |
|D s
|0 (DE-588)4274324-2
|0 (DE-627)104467525
|0 (DE-576)21070585X
|a Computersicherheit
|2 gnd
|
689 |
0 |
2 |
|D s
|0 (DE-588)4011144-1
|0 (DE-627)106354191
|0 (DE-576)208892001
|a Datensicherung
|2 gnd
|
689 |
0 |
3 |
|D s
|0 (DE-588)4830502-9
|0 (DE-627)489246060
|0 (DE-576)21698677X
|a Kryptoanalyse
|2 gnd
|
689 |
0 |
4 |
|D s
|0 (DE-588)4767762-4
|0 (DE-627)379148463
|0 (DE-576)216199018
|a Sicherheitskritisches System
|2 gnd
|
689 |
0 |
|
|5 DE-101
|
700 |
1 |
|
|a Kalstad Svendsen, Nils
|e Hrsg.
|4 edt
|
700 |
1 |
|
|a Lopez, Javier
|e Hrsg.
|0 (DE-627)1258438232
|0 (DE-576)188438238
|4 edt
|
776 |
1 |
|
|z 9783642414848
|
776 |
0 |
8 |
|i Druckausg.
|t Critical information infrastructures security
|d Heidelberg : Springer, 2013
|h XIII, 275 S.
|w (DE-627)768111773
|w (DE-576)404972837
|z 9783642414848
|z 3642414842
|
830 |
|
0 |
|a Lecture notes in computer science
|v 7722
|9 7722
|w (DE-627)316228877
|w (DE-576)093890923
|w (DE-600)2018930-8
|x 1611-3349
|7 ns
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-642-41485-5
|m X:SPRINGER
|x Verlag
|z lizenzpflichtig
|3 Volltext
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-41485-5
|x Resolving-System
|z lizenzpflichtig
|3 Volltext
|
856 |
4 |
2 |
|u https://swbplus.bsz-bw.de/bsz395819652cov.jpg
|m V:DE-576
|m X:springer
|q image/jpeg
|v 20150316113317
|3 Cover
|
889 |
|
|
|w (DE-627)772151504
|
912 |
|
|
|a ZDB-2-LNC
|b 2013
|
912 |
|
|
|a ZDB-2-SCS
|b 2013
|
912 |
|
|
|a ZDB-2-SEB
|
912 |
|
|
|a ZDB-2-SXCS
|b 2013
|
912 |
|
|
|a ZDB-2-SEB
|b 2013
|
935 |
|
|
|h GBV
|i ExPruef
|
936 |
r |
v |
|a SS 4800
|b Lecture notes in computer science
|k Informatik
|k Enzyklopädien und Handbücher. Kongressberichte Schriftenreihe. Tafeln und Formelsammlungen
|k Schriftenreihen (indiv. Sign.)
|k Lecture notes in computer science
|0 (DE-627)1271461242
|0 (DE-625)rvk/143528:
|0 (DE-576)201461242
|
936 |
b |
k |
|a 54.38
|j Computersicherheit
|q SEPA
|0 (DE-627)106418866
|
951 |
|
|
|a BO
|
900 |
|
|
|a Lopez Muñoz, Javier
|
900 |
|
|
|a Lopez-Muñoz, Javier
|
950 |
|
|
|a Cyber Security
|
950 |
|
|
|a Datenverarbeitungssystem
|
950 |
|
|
|a Sicherheit
|
950 |
|
|
|a Computer
|
950 |
|
|
|a Cybersicherheit
|
950 |
|
|
|a Cybersecurity
|
950 |
|
|
|a IT-Sicherheit
|
950 |
|
|
|a Informationssicherheit
|
950 |
|
|
|a Datensicherung
|
950 |
|
|
|a Softwareschutz
|
950 |
|
|
|a Datensicherheit
|
950 |
|
|
|a Datenverarbeitung
|
950 |
|
|
|a Computersicherheit
|
950 |
|
|
|a Надёжность сохранения данных
|
950 |
|
|
|a Safety Critical System
|
950 |
|
|
|a Mission Critical System
|
950 |
|
|
|a Sicherheitsrelevantes System
|
950 |
|
|
|a Technisches System
|
950 |
|
|
|a Sicherheitsrelevanz
|
950 |
|
|
|a System
|
950 |
|
|
|a Kritische Informationsinfrastruktur
|
950 |
|
|
|a Cryptoanalysis
|
950 |
|
|
|a Angriff
|
950 |
|
|
|a Attacke
|
950 |
|
|
|a Kryptoanalytische Attacke
|
950 |
|
|
|a Kryptoanalytischer Angriff
|
950 |
|
|
|a Cryptanalysis
|
950 |
|
|
|a Kryptologie
|
950 |
|
|
|a Dechiffrierung
|
950 |
|
|
|a Critical information infrastructure
|
950 |
|
|
|a Kritische Infrastruktur
|
950 |
|
|
|a Sicherheitskritisches System
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-41485-5
|9 DE-14
|
852 |
|
|
|a DE-14
|x epn:3362461824
|z 2013-11-06T08:22:55Z
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-41485-5
|9 DE-15
|
852 |
|
|
|a DE-15
|x epn:3362461859
|z 2013-11-06T08:22:55Z
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-41485-5
|9 DE-Ch1
|
852 |
|
|
|a DE-Ch1
|x epn:3362461891
|z 2013-11-06T08:22:55Z
|
976 |
|
|
|h Elektronischer Volltext - Campuslizenz
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-41485-5
|z Zum Online-Dokument
|9 DE-Zi4
|
852 |
|
|
|a DE-Zi4
|x epn:3362461921
|z 2013-11-06T08:22:55Z
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-41485-5
|9 DE-520
|
852 |
|
|
|a DE-520
|x epn:3362461956
|z 2013-11-06T08:22:55Z
|
980 |
|
|
|a 1653049588
|b 0
|k 1653049588
|o 395819652
|
SOLR
_version_ |
1792258634129866752 |
access_facet |
Electronic Resources |
author |
Hämmerli, Bernhard M. |
author2 |
Kalstad Svendsen, Nils, Lopez, Javier |
author2_role |
edt, edt |
author2_variant |
s n k sn snk, j l jl |
author_facet |
Hämmerli, Bernhard M., Kalstad Svendsen, Nils, Lopez, Javier |
author_role |
aut |
author_sort |
Hämmerli, Bernhard M. |
author_variant |
b m h bm bmh |
callnumber-first |
Q - Science |
callnumber-label |
QA76 |
callnumber-raw |
QA76.9.A25 |
callnumber-search |
QA76.9.A25 |
callnumber-sort |
QA 276.9 A25 |
callnumber-subject |
QA - Mathematics |
collection |
ZDB-2-LNC, ZDB-2-SCS, ZDB-2-SEB, ZDB-2-SXCS |
contents |
Intrusion managementSmart metering and grid -- Analysis and modeling -- SCADA -- Cyber issues -- CI analysis -- CIP sectors -- CI assessment.- Threat modeling., This book constitutes the thoroughly refereed post-proceedings of the 7th International Workshop on Critical Information Infrastructures Security, CRITIS 2012, held in Lillehammer, Norway, in September 2012. The 23 revised full papers were thoroughly reviewed and selected from 67 submissions. The papers are structured in the following topical sections: intrusion management; smart metering and grid, analysis and modeling; SCADA; cyber issues; CI analysis; CIP sectors; CI assessment; and threat modeling |
ctrlnum |
(DE-627)1653049588, (DE-576)395819652, (DE-599)BSZ395819652, (OCoLC)862045620, (DE-He213)978-3-642-41485-5, (EBP)040551849 |
de15_date |
2013-11-06T08:22:55Z |
dech1_date |
2013-11-06T08:22:55Z |
doi_str_mv |
10.1007/978-3-642-41485-5 |
era_facet |
2012 |
facet_912a |
ZDB-2-LNC, ZDB-2-SCS, ZDB-2-SEB, ZDB-2-SXCS |
facet_avail |
Online |
facet_local_del330 |
Kritische Informationsinfrastruktur, Computersicherheit, Datensicherung, Kryptoanalyse, Sicherheitskritisches System |
finc_class_facet |
Informatik, Mathematik |
fincclass_txtF_mv |
science-computerscience |
footnote |
Literaturangaben |
format |
eBook, ConferenceProceedings |
format_access_txtF_mv |
Book, E-Book |
format_de105 |
Ebook |
format_de14 |
Book, E-Book |
format_de15 |
Book, E-Book |
format_del152 |
Buch |
format_detail_txtF_mv |
text-online-monograph-independent |
format_dezi4 |
e-Book |
format_finc |
Book, E-Book |
format_legacy |
ElectronicBook |
format_legacy_nrw |
Book, E-Book |
format_nrw |
Book, E-Book |
format_strict_txtF_mv |
E-Book |
genre |
Konferenzschrift 2012 Lillehammer (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content, Konferenzschrift (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content |
genre_facet |
Konferenzschrift |
geogr_code |
not assigned |
geogr_code_person |
not assigned |
geographic_facet |
Lillehammer |
hierarchy_parent_id |
0-316228877 |
hierarchy_parent_title |
Lecture notes in computer science |
hierarchy_sequence |
7722 |
hierarchy_top_id |
0-316228877 |
hierarchy_top_title |
Lecture notes in computer science |
id |
0-1653049588 |
illustrated |
Not Illustrated |
imprint |
Berlin, Heidelberg, Springer, 2013 |
imprint_str_mv |
Berlin, Heidelberg: Springer, 2013 |
institution |
DE-14, DE-Zi4, DE-Ch1, DE-520, DE-15 |
is_hierarchy_id |
0-1653049588 |
is_hierarchy_title |
Critical Information Infrastructures Security: 7th International Workshop, CRITIS 2012, Lillehammer, Norway, September 17-18, 2012, Revised Selected Papers |
isbn |
9783642414855 |
isbn_isn_mv |
9783642414848, 3642414842 |
issn_isn_mv |
1611-3349 |
kxp_id_str |
1653049588 |
language |
English |
last_indexed |
2024-02-29T18:23:46.119Z |
local_heading_facet_dezwi2 |
Computer science, Computer Communication Networks, Computer Science, Data protection, Computers and civilization., Computer networks ., Kritische Informationsinfrastruktur, Computersicherheit, Datensicherung, Kryptoanalyse, Sicherheitskritisches System |
marc024a_ct_mv |
10.1007/978-3-642-41485-5 |
match_str |
hammerli2013criticalinformationinfrastructuressecurity7thinternationalworkshopcritis2012lillehammernorwayseptember17182012revisedselectedpapers |
mega_collection |
Verbunddaten SWB |
multipart_link |
093890923 |
multipart_part |
(093890923)7722 |
names_id_str_mv |
(DE-627)1258438232, (DE-576)188438238 |
oclc_num |
862045620 |
physical |
Online-Ressource (XIV, 277 p. 103 illus, online resource) |
publishDate |
2013 |
publishDateSort |
2013 |
publishPlace |
Berlin, Heidelberg |
publisher |
Springer |
record_format |
marcfinc |
record_id |
395819652 |
recordtype |
marcfinc |
rsn_id_str_mv |
(DE-15)3262997 |
rvk_facet |
SS 4800 |
rvk_label |
Informatik, Enzyklopädien und Handbücher. Kongressberichte Schriftenreihe. Tafeln und Formelsammlungen, Schriftenreihen (indiv. Sign.), Lecture notes in computer science |
rvk_path |
SS, SQ - SU, SS 4000 - SS 5999, SS 4800 |
rvk_path_str_mv |
SS, SQ - SU, SS 4000 - SS 5999, SS 4800 |
series |
Lecture notes in computer science, 7722 |
series2 |
Lecture Notes in Computer Science ; 7722, SpringerLink ; Bücher |
source_id |
0 |
spelling |
Hämmerli, Bernhard M. aut, Critical Information Infrastructures Security 7th International Workshop, CRITIS 2012, Lillehammer, Norway, September 17-18, 2012, Revised Selected Papers edited by Bernhard M. Hämmerli, Nils Kalstad Svendsen, Javier Lopez, Berlin, Heidelberg Springer 2013, Online-Ressource (XIV, 277 p. 103 illus, online resource), Text txt rdacontent, Computermedien c rdamedia, Online-Ressource cr rdacarrier, Lecture Notes in Computer Science 7722, SpringerLink Bücher, Literaturangaben, Intrusion managementSmart metering and grid -- Analysis and modeling -- SCADA -- Cyber issues -- CI analysis -- CIP sectors -- CI assessment.- Threat modeling., This book constitutes the thoroughly refereed post-proceedings of the 7th International Workshop on Critical Information Infrastructures Security, CRITIS 2012, held in Lillehammer, Norway, in September 2012. The 23 revised full papers were thoroughly reviewed and selected from 67 submissions. The papers are structured in the following topical sections: intrusion management; smart metering and grid, analysis and modeling; SCADA; cyber issues; CI analysis; CIP sectors; CI assessment; and threat modeling, Computer science, Computer Communication Networks, Computer Science, Data protection, Computers and civilization., Computer networks ., Konferenzschrift 2012 Lillehammer (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content, Konferenzschrift (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content, s (DE-588)7636254-1 (DE-627)587274158 (DE-576)288551176 Kritische Informationsinfrastruktur gnd, s (DE-588)4274324-2 (DE-627)104467525 (DE-576)21070585X Computersicherheit gnd, s (DE-588)4011144-1 (DE-627)106354191 (DE-576)208892001 Datensicherung gnd, s (DE-588)4830502-9 (DE-627)489246060 (DE-576)21698677X Kryptoanalyse gnd, s (DE-588)4767762-4 (DE-627)379148463 (DE-576)216199018 Sicherheitskritisches System gnd, DE-101, Kalstad Svendsen, Nils Hrsg. edt, Lopez, Javier Hrsg. (DE-627)1258438232 (DE-576)188438238 edt, 9783642414848, Druckausg. Critical information infrastructures security Heidelberg : Springer, 2013 XIII, 275 S. (DE-627)768111773 (DE-576)404972837 9783642414848 3642414842, Lecture notes in computer science 7722 7722 (DE-627)316228877 (DE-576)093890923 (DE-600)2018930-8 1611-3349 ns, https://doi.org/10.1007/978-3-642-41485-5 X:SPRINGER Verlag lizenzpflichtig Volltext, http://dx.doi.org/10.1007/978-3-642-41485-5 Resolving-System lizenzpflichtig Volltext, https://swbplus.bsz-bw.de/bsz395819652cov.jpg V:DE-576 X:springer image/jpeg 20150316113317 Cover, (DE-627)772151504, http://dx.doi.org/10.1007/978-3-642-41485-5 DE-14, DE-14 epn:3362461824 2013-11-06T08:22:55Z, http://dx.doi.org/10.1007/978-3-642-41485-5 DE-15, DE-15 epn:3362461859 2013-11-06T08:22:55Z, http://dx.doi.org/10.1007/978-3-642-41485-5 DE-Ch1, DE-Ch1 epn:3362461891 2013-11-06T08:22:55Z, http://dx.doi.org/10.1007/978-3-642-41485-5 Zum Online-Dokument DE-Zi4, DE-Zi4 epn:3362461921 2013-11-06T08:22:55Z, http://dx.doi.org/10.1007/978-3-642-41485-5 DE-520, DE-520 epn:3362461956 2013-11-06T08:22:55Z |
spellingShingle |
Hämmerli, Bernhard M., Critical Information Infrastructures Security: 7th International Workshop, CRITIS 2012, Lillehammer, Norway, September 17-18, 2012, Revised Selected Papers, Lecture notes in computer science, 7722, Intrusion managementSmart metering and grid -- Analysis and modeling -- SCADA -- Cyber issues -- CI analysis -- CIP sectors -- CI assessment.- Threat modeling., This book constitutes the thoroughly refereed post-proceedings of the 7th International Workshop on Critical Information Infrastructures Security, CRITIS 2012, held in Lillehammer, Norway, in September 2012. The 23 revised full papers were thoroughly reviewed and selected from 67 submissions. The papers are structured in the following topical sections: intrusion management; smart metering and grid, analysis and modeling; SCADA; cyber issues; CI analysis; CIP sectors; CI assessment; and threat modeling, Computer science, Computer Communication Networks, Computer Science, Data protection, Computers and civilization., Computer networks ., Konferenzschrift 2012 Lillehammer, Konferenzschrift, Kritische Informationsinfrastruktur, Computersicherheit, Datensicherung, Kryptoanalyse, Sicherheitskritisches System |
swb_id_str |
395819652 |
title |
Critical Information Infrastructures Security: 7th International Workshop, CRITIS 2012, Lillehammer, Norway, September 17-18, 2012, Revised Selected Papers |
title_auth |
Critical Information Infrastructures Security 7th International Workshop, CRITIS 2012, Lillehammer, Norway, September 17-18, 2012, Revised Selected Papers |
title_full |
Critical Information Infrastructures Security 7th International Workshop, CRITIS 2012, Lillehammer, Norway, September 17-18, 2012, Revised Selected Papers edited by Bernhard M. Hämmerli, Nils Kalstad Svendsen, Javier Lopez |
title_fullStr |
Critical Information Infrastructures Security 7th International Workshop, CRITIS 2012, Lillehammer, Norway, September 17-18, 2012, Revised Selected Papers edited by Bernhard M. Hämmerli, Nils Kalstad Svendsen, Javier Lopez |
title_full_unstemmed |
Critical Information Infrastructures Security 7th International Workshop, CRITIS 2012, Lillehammer, Norway, September 17-18, 2012, Revised Selected Papers edited by Bernhard M. Hämmerli, Nils Kalstad Svendsen, Javier Lopez |
title_in_hierarchy |
7722. Critical Information Infrastructures Security: 7th International Workshop, CRITIS 2012, Lillehammer, Norway, September 17-18, 2012, Revised Selected Papers (2013) |
title_short |
Critical Information Infrastructures Security |
title_sort |
critical information infrastructures security 7th international workshop critis 2012 lillehammer norway september 17 18 2012 revised selected papers |
title_sub |
7th International Workshop, CRITIS 2012, Lillehammer, Norway, September 17-18, 2012, Revised Selected Papers |
title_unstemmed |
Critical Information Infrastructures Security: 7th International Workshop, CRITIS 2012, Lillehammer, Norway, September 17-18, 2012, Revised Selected Papers |
topic |
Computer science, Computer Communication Networks, Computer Science, Data protection, Computers and civilization., Computer networks ., Konferenzschrift 2012 Lillehammer, Konferenzschrift, Kritische Informationsinfrastruktur, Computersicherheit, Datensicherung, Kryptoanalyse, Sicherheitskritisches System |
topic_facet |
Computer science, Computer Communication Networks, Computer Science, Data protection, Computers and civilization., Computer networks ., Konferenzschrift, Kritische Informationsinfrastruktur, Computersicherheit, Datensicherung, Kryptoanalyse, Sicherheitskritisches System |
url |
https://doi.org/10.1007/978-3-642-41485-5, http://dx.doi.org/10.1007/978-3-642-41485-5, https://swbplus.bsz-bw.de/bsz395819652cov.jpg |