LEADER 03088nam 22006855 450 001 9910416079503321 005 20210108133502.0 010 $a3-030-58295-7 024 7 $a10.1007/978-3-030-58295-1 035 $a(CKB)4100000011401152 035 $a(MiAaPQ)EBC6319935 035 $a(DE-He213)978-3-030-58295-1 035 $a(PPN)253256933 035 $a(EXLCZ)994100000011401152 100 $a20200826d2020 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCritical Information Infrastructures Security $e15th International Conference, CRITIS 2020, Bristol, UK, September 2?3, 2020, Proceedings /$fedited by Awais Rashid, Peter Popov 205 $a1st ed. 2020. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2020. 215 $a1 online resource (102 pages) 225 1 $aSecurity and Cryptology ;$v12332 311 $a3-030-58294-9 327 $aInvited Papers -- Attacks and Vulnerabilities -- Threat Modelling and Monitoring -- Networks and IoT. 330 $aChapter ?A Systematic Literature Review of Information Sources for Threat Modeling in the Power Systems Domain? is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com. 410 0$aSecurity and Cryptology ;$v12332 606 $aComputer security 606 $aApplication software 606 $aData encryption (Computer science) 606 $aComputer communication systems 606 $aComputer networks$xSecurity measures 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aMobile and Network Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28050 615 0$aComputer security. 615 0$aApplication software. 615 0$aData encryption (Computer science). 615 0$aComputer communication systems. 615 0$aComputer networks$xSecurity measures. 615 14$aSystems and Data Security. 615 24$aInformation Systems Applications (incl. Internet). 615 24$aCryptology. 615 24$aComputer Communication Networks. 615 24$aMobile and Network Security. 676 $a005.8 676 $a005.8 702 $aRashid$b Awais$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aPopov$b Peter$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910416079503321 996 $aCritical Information Infrastructures Security$92584647 997 $aUNINA