000 | 04362nam a22007335i 4500 | ||
---|---|---|---|
001 | 978-3-030-12786-2 | ||
003 | DE-He213 | ||
005 | 20240730165223.0 | ||
007 | cr nn 008mamaa | ||
008 | 190130s2019 sz | s |||| 0|eng d | ||
020 |
_a9783030127862 _9978-3-030-12786-2 |
||
024 | 7 |
_a10.1007/978-3-030-12786-2 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aComputer Security _h[electronic resource] : _bESORICS 2018 International Workshops, CyberICPS 2018 and SECPRE 2018, Barcelona, Spain, September 6-7, 2018, Revised Selected Papers / _cedited by Sokratis K. Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Annie Antón, Stefanos Gritzalis, John Mylopoulos, Christos Kalloniatis. |
250 | _a1st ed. 2019. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2019. |
|
300 |
_aX, 233 p. 108 illus., 78 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v11387 |
|
520 | _aThis book constitutes the thoroughly refereed post-conference proceedings of the 4th International Workshop on the Security of Industrial Control Systems and Cyber-Physical Systems, CyberICPS 2018, and the Second International Workshop on Security and Privacy Requirements Engineering, SECPRE 2018, held in Barcelona, Spain, in September 2018, in conjunction with the 23rd European Symposium on Research in Computer Security, ESORICS 2018. The CyberICPS Workshop received 15 submissions from which 8 full papers were selected for presentation. They cover topics related to threats, vulnerabilities and risks that cyber-physical systems and industrial control systems face; cyber attacks that may be launched against such systems; and ways of detecting and responding to such attacks. From the SECPRE Workshop 5 full papers out of 11 submissions are included. The selected papers deal with aspects of security and privacy requirements assurance and evaluation; and security requirements elicitation and modelling. | ||
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aComputer crimes. _910774 |
|
650 | 0 |
_aComputers _xLaw and legislation. _975151 |
|
650 | 0 |
_aInformation technology _xLaw and legislation. _982531 |
|
650 | 0 |
_aComputer engineering. _910164 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 0 |
_aSoftware engineering. _94138 |
|
650 | 0 |
_aApplication software. _987901 |
|
650 | 1 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_aComputer Crime. _986411 |
650 | 2 | 4 |
_aLegal Aspects of Computing. _953952 |
650 | 2 | 4 |
_aComputer Engineering and Networks. _987903 |
650 | 2 | 4 |
_aSoftware Engineering. _94138 |
650 | 2 | 4 |
_aComputer and Information Systems Applications. _987906 |
700 | 1 |
_aKatsikas, Sokratis K. _eeditor. _0(orcid) _10000-0003-2966-9683 _4edt _4http://id.loc.gov/vocabulary/relators/edt _987908 |
|
700 | 1 |
_aCuppens, Frédéric. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _987909 |
|
700 | 1 |
_aCuppens, Nora. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _987910 |
|
700 | 1 |
_aLambrinoudakis, Costas. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _987913 |
|
700 | 1 |
_aAntón, Annie. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _987914 |
|
700 | 1 |
_aGritzalis, Stefanos. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _987915 |
|
700 | 1 |
_aMylopoulos, John. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _987917 |
|
700 | 1 |
_aKalloniatis, Christos. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _987918 |
|
710 | 2 |
_aSpringerLink (Online service) _987921 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783030127855 |
776 | 0 | 8 |
_iPrinted edition: _z9783030127879 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v11387 _987923 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-030-12786-2 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c86171 _d86171 |