000 03693nam a22006735i 4500
001 978-3-319-61437-3
003 DE-He213
005 20240730202400.0
007 cr nn 008mamaa
008 170609s2017 sz | s |||| 0|eng d
020 _a9783319614373
_9978-3-319-61437-3
024 7 _a10.1007/978-3-319-61437-3
_2doi
050 4 _aQA75.5-76.95
072 7 _aUYA
_2bicssc
072 7 _aCOM014000
_2bisacsh
072 7 _aUYA
_2thema
082 0 4 _a004.0151
_223
245 1 0 _aSecurity of Industrial Control Systems and Cyber-Physical Systems
_h[electronic resource] :
_bSecond International Workshop, CyberICPS 2016, Heraklion, Crete, Greece, September 26-30, 2016, Revised Selected Papers /
_cedited by Nora Cuppens-Boulahia, Costas Lambrinoudakis, Frédéric Cuppens, Sokratis Katsikas.
250 _a1st ed. 2017.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2017.
300 _aVII, 121 p. 19 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSecurity and Cryptology,
_x2946-1863 ;
_v10166
505 0 _aManagement of cyber security in industrial control systems and cyber-physical systems -- Security monitoring -- Trust management -- Security policies and measures.
520 _aThis book constitutes the refereed proceedings of the Second Conference on Security of Industrial Control Systems and Cyber-Physical Systems, CyberICPS 2016, held in Crete, Greece, in September 2016 in conjunction with ESORICS 2016, the 21st annual European Symposium on Research in Computer Security. The 5 revised full papers 2 invited papers presented were carefully reviewed and selected from 18 initial submissions. CyberICPS 2016 focuses on topics related to the management of cyber security in industrial control systems and cyber-physical systems, including security monitoring, trust management, security policies and measures.
650 0 _aComputer science.
_99832
650 0 _aData protection.
_97245
650 0 _aCryptography.
_91973
650 0 _aData encryption (Computer science).
_99168
650 0 _aComputer engineering.
_910164
650 0 _aComputer networks .
_931572
650 0 _aApplication software.
_9171175
650 0 _aElectronic data processing
_xManagement.
_9171176
650 1 4 _aComputer Science Logic and Foundations of Programming.
_942203
650 2 4 _aData and Information Security.
_931990
650 2 4 _aCryptology.
_931769
650 2 4 _aComputer Engineering and Networks.
_9171177
650 2 4 _aComputer and Information Systems Applications.
_9171178
650 2 4 _aIT Operations.
_931703
700 1 _aCuppens-Boulahia, Nora.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9171179
700 1 _aLambrinoudakis, Costas.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9171180
700 1 _aCuppens, Frédéric.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9171181
700 1 _aKatsikas, Sokratis.
_eeditor.
_0(orcid)
_10000-0003-2966-9683
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9171182
710 2 _aSpringerLink (Online service)
_9171183
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783319614366
776 0 8 _iPrinted edition:
_z9783319614380
830 0 _aSecurity and Cryptology,
_x2946-1863 ;
_v10166
_9171184
856 4 0 _uhttps://doi.org/10.1007/978-3-319-61437-3
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cELN
999 _c96988
_d96988