|
|
|
|
LEADER |
03615nam a22006255i 4500 |
001 |
978-3-030-12085-6 |
003 |
DE-He213 |
005 |
20210624194704.0 |
007 |
cr nn 008mamaa |
008 |
190129s2019 gw | s |||| 0|eng d |
020 |
|
|
|a 9783030120856
|9 978-3-030-12085-6
|
024 |
7 |
|
|a 10.1007/978-3-030-12085-6
|2 doi
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a UR
|2 thema
|
072 |
|
7 |
|a UTN
|2 thema
|
082 |
0 |
4 |
|a 005.8
|2 23
|
245 |
1 |
0 |
|a Information and Operational Technology Security Systems
|h [electronic resource] :
|b First International Workshop, IOSec 2018, CIPSEC Project, Heraklion, Crete, Greece, September 13, 2018, Revised Selected Papers /
|c edited by Apostolos P. Fournaris, Konstantinos Lampropoulos, Eva Marín Tordera.
|
250 |
|
|
|a 1st ed. 2019.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2019.
|
300 |
|
|
|a X, 147 p. 63 illus., 45 illus. in color.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Security and Cryptology ;
|v 11398
|
505 |
0 |
|
|a Critical Infrastructure Cybersecurity Issues -- CyberSecurity Threats, Assessment and Privacy -- Vulnerability and Malware Detection.
|
520 |
|
|
|a This book constitutes the refereed proceedings of the First International Workshop, IOSec 2018, sponsored by CIPSEC, held in Heraklion, Crete, Greece, in September 2018. The 12 full papers presented were carefully reviewed and selected from 22 submissions. They were organized in topical sections named: Critical Infrastructure Cybersecurity Issues; CyberSecurity Threats, Assessment and Privacy; and Vulnerability and Malware Detection.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Computer communication systems.
|
650 |
|
0 |
|a Computer system failures.
|
650 |
|
0 |
|a Application software.
|
650 |
1 |
4 |
|a Systems and Data Security.
|0 https://scigraph.springernature.com/ontologies/product-market-codes/I28060
|
650 |
2 |
4 |
|a Mobile and Network Security.
|0 https://scigraph.springernature.com/ontologies/product-market-codes/I28050
|
650 |
2 |
4 |
|a Cryptology.
|0 https://scigraph.springernature.com/ontologies/product-market-codes/I28020
|
650 |
2 |
4 |
|a Computer Communication Networks.
|0 https://scigraph.springernature.com/ontologies/product-market-codes/I13022
|
650 |
2 |
4 |
|a System Performance and Evaluation.
|0 https://scigraph.springernature.com/ontologies/product-market-codes/I13049
|
650 |
2 |
4 |
|a Information Systems Applications (incl. Internet).
|0 https://scigraph.springernature.com/ontologies/product-market-codes/I18040
|
700 |
1 |
|
|a Fournaris, Apostolos P.
|e editor.
|0 (orcid)0000-0002-4758-2349
|1 https://orcid.org/0000-0002-4758-2349
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Lampropoulos, Konstantinos.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Marín Tordera, Eva.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9783030120849
|
776 |
0 |
8 |
|i Printed edition:
|z 9783030120863
|
830 |
|
0 |
|a Security and Cryptology ;
|v 11398
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-030-12085-6
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|