LEADER 03902nam 22007215 450 001 9910299288103321 005 20240613152523.0 010 $a3-319-95189-0 024 7 $a10.1007/978-3-319-95189-8 035 $a(CKB)4100000005323523 035 $a(DE-He213)978-3-319-95189-8 035 $a(oapen)https://directory.doabooks.org/handle/20.500.12854/27012 035 $a(PPN)229503241 035 $a(EXLCZ)994100000005323523 100 $a20180713d2018 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aSecurity in Computer and Information Sciences $eFirst International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised Selected Papers /$fedited by Erol Gelenbe, Paolo Campegiani, Tadeusz Czachórski, Sokratis K. Katsikas, Ioannis Komnios, Luigi Romano, Dimitrios Tzovaras 205 $aFirst edition, 2018. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2018. 215 $a1 online resource (XII, 159 pages, 33 illustrations) 225 1 $aCommunications in Computer and Information Science,$x1865-0937 ;$v821. 311 $a3-319-95188-2 327 $aSecurity of distributed interconnected systems -- Security of software systems -- Security of the Internet of Things. 330 $aThis open access book constitutes the thoroughly refereed proceedings of the First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, held in London, UK, in February 2018. The 12 full papers presented together with an overview paper were carefully reviewed and selected from 31 submissions. Security of distributed interconnected systems, software systems, and the Internet of Things has become a crucial aspect of the performance of computer systems. The papers deal with these issues, with a specific focus on societally critical systems such as health informatics systems, the Internet of Things, energy systems, digital cities, digital economy, mobile networks, and the underlying physical and network infrastructures. 410 0$aCommunications in Computer and Information Science,$x1865-0937 ;$v821 606 $aData protection 606 $aApplication software 606 $aCryptography 606 $aData encryption (Computer science) 606 $aComputers, Special purpose 606 $aComputer networks 606 $aData and Information Security 606 $aComputer and Information Systems Applications 606 $aCryptology 606 $aSpecial Purpose and Application-Based Systems 606 $aComputer Communication Networks 615 0$aData protection. 615 0$aApplication software. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aComputers, Special purpose. 615 0$aComputer networks. 615 14$aData and Information Security. 615 24$aComputer and Information Systems Applications. 615 24$aCryptology. 615 24$aSpecial Purpose and Application-Based Systems. 615 24$aComputer Communication Networks. 676 $a005.8 702 $aGelenbe$b Erol$f1945-$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aCampegiani$b Paolo$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aCzachórski$b Tadeusz$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aKatsikas$b Sokratis K$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aKomnios$b Ioannis$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aRomano$b Luigi$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aTzovaras$b Dimitrios$4edt$4http://id.loc.gov/vocabulary/relators/edt 906 $aBOOK 912 $a9910299288103321 996 $aSecurity in Computer and Information Sciences$94163616 997 $aUNINA