LEADER 03559nam 22007335 450 001 9910337571103321 005 20251225190525.0 010 $a3-030-05849-2 024 7 $a10.1007/978-3-030-05849-4 035 $a(CKB)4100000007389513 035 $a(DE-He213)978-3-030-05849-4 035 $a(MiAaPQ)EBC5925950 035 $a(PPN)233799427 035 $a(EXLCZ)994100000007389513 100 $a20181230d2019 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCritical Information Infrastructures Security $e13th International Conference, CRITIS 2018, Kaunas, Lithuania, September 24-26, 2018, Revised Selected Papers /$fedited by Eric Luiijf, Inga ?utautait?, Bernhard M. Hämmerli 205 $a1st ed. 2019. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2019. 215 $a1 online resource (XIII, 238 p. 71 illus., 47 illus. in color.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v11260 300 $aIncludes Index. 311 08$a3-030-05848-4 327 $aAdvanced analysis of critical energy systems -- Strengthening urban resilience -- Securing internet of things and industrial control systems -- Need and tool sets for industrial control system security -- Advancements in governance and resilience of critical infrastructures. . 330 $aThis book constitutes revised selected papers from the 13th International Conference on Critical Information Infrastructures Security, CRITIS 2018, held in Kaunas, Lithuania, in September 2018. The 16 full papers and 3 short papers presented were carefully reviewed and selected from 61 submissions. They are grouped in the following topical sections: advanced analysis of critical energy systems, strengthening urban resilience, securing internet of things and industrial control systems, need and tool sets for industrial control system security, and advancements in governance and resilience of critical infrastructures. . 410 0$aSecurity and Cryptology,$x2946-1863 ;$v11260 606 $aData protection 606 $aComputer networks 606 $aComputer crimes 606 $aApplication software 606 $aComputers$xLaw and legislation 606 $aInformation technology$xLaw and legislation 606 $aData and Information Security 606 $aComputer Communication Networks 606 $aComputer Crime 606 $aComputer and Information Systems Applications 606 $aLegal Aspects of Computing 615 0$aData protection. 615 0$aComputer networks. 615 0$aComputer crimes. 615 0$aApplication software. 615 0$aComputers$xLaw and legislation. 615 0$aInformation technology$xLaw and legislation. 615 14$aData and Information Security. 615 24$aComputer Communication Networks. 615 24$aComputer Crime. 615 24$aComputer and Information Systems Applications. 615 24$aLegal Aspects of Computing. 676 $a005.8 676 $a005.8 702 $aLuiijf$b Eric$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $a?utautait?$b Inga$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aHämmerli$b Bernhard M$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910337571103321 996 $aCritical Information Infrastructures Security$92584647 997 $aUNINA