01549nam0-2200445-i-450-99000922132040332120100914100505.0978-0-8218-4891-3Paperback000922132FED01000922132(Aleph)000922132FED0100092213220100914d2010----km-y0itay50------baengUSa---a---101yyAlgebraic methods in statistics and probability IIAMS special session algebraic methods in statistics and probability, March 27-29, 2009. University of Illinois at Urbana-Champaign, Champaign, ILMarlos A. G. Viana, Henri P. Wynn, editorsProvidenceAmerican Mathematical Society2010VIII, 345 p.26 cmContemporary mathematics516Semigruppi di trasformazioniRappresentazioni di gruppi simmetrici finitiMisure di probabilità sui gruppiTrasformata di FourierFattorizzazioneProcessi di rinnovo MarkovianiProcessi semi-MarkovianiDisegno di esperimenti512.2722itaViana,Marlos A. G.Wynn,Henry P.ITUNINAREICATUNIMARCBK990009221320403321C-1-(51624413MA1MA120M2020C3060B1560K1562KXXAlgebraic methods in statistics and probability II776780UNINA02761nam 22007095 450 991041607950332120251225183544.03-030-58295-710.1007/978-3-030-58295-1(CKB)4100000011401152(MiAaPQ)EBC6319935(DE-He213)978-3-030-58295-1(PPN)253256933(EXLCZ)99410000001140115220200826d2020 u| 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierCritical Information Infrastructures Security 15th International Conference, CRITIS 2020, Bristol, UK, September 2–3, 2020, Proceedings /edited by Awais Rashid, Peter Popov1st ed. 2020.Cham :Springer International Publishing :Imprint: Springer,2020.1 online resource (102 pages)Security and Cryptology,2946-1863 ;123323-030-58294-9 Invited Papers -- Attacks and Vulnerabilities -- Threat Modelling and Monitoring -- Networks and IoT.Chapter “A Systematic Literature Review of Information Sources for Threat Modeling in the Power Systems Domain” is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.Security and Cryptology,2946-1863 ;12332Data protectionApplication softwareCryptographyData encryption (Computer science)Computer networksComputer networksSecurity measuresData and Information SecurityComputer and Information Systems ApplicationsCryptologyComputer Communication NetworksMobile and Network SecurityData protection.Application software.Cryptography.Data encryption (Computer science).Computer networks.Computer networksSecurity measures.Data and Information Security.Computer and Information Systems Applications.Cryptology.Computer Communication Networks.Mobile and Network Security.005.8005.8Rashid Awaisedthttp://id.loc.gov/vocabulary/relators/edtPopov Peteredthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK9910416079503321Critical Information Infrastructures Security2584647UNINA