LEADER 05076nam 22008295 450 001 996465495703316 005 20201019130716.0 010 $a3-319-72817-2 024 7 $a10.1007/978-3-319-72817-9 035 $a(CKB)4100000001381791 035 $a(DE-He213)978-3-319-72817-9 035 $a(MiAaPQ)EBC6283136 035 $a(MiAaPQ)EBC5577018 035 $a(Au-PeEL)EBL5577018 035 $a(OCoLC)1019679971 035 $a(PPN)223955183 035 $a(EXLCZ)994100000001381791 100 $a20171221d2018 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aComputer Security$b[electronic resource] $eESORICS 2017 International Workshops, CyberICPS 2017 and SECPRE 2017, Oslo, Norway, September 14-15, 2017, Revised Selected Papers /$fedited by Sokratis K. Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Christos Kalloniatis, John Mylopoulos, Annie Antón, Stefanos Gritzalis 205 $a1st ed. 2018. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2018. 215 $a1 online resource (XII, 281 p. 76 illus.) 225 1 $aSecurity and Cryptology ;$v10683 311 $a3-319-72816-4 327 $aProtecting Industrial Control and Cyber-Physical Systems -- Threats, Vulnerabilities and Risks -- Cyber Attacks in Industrial Control and Cyber-Physical Systems -- Detecting Attacks in Industrial Control and Cyber-Physical Systems -- Security and Privacy Requirements Assurance and Evaluation -- Security Requirements Elicitation and Modelling. 330 $aThis book constitutes the thoroughly refereed post-conference proceedings of the Third International Workshop on the Security of Industrial Control Systems and of Cyber-Physical Systems, CyberICPS 2017, and the First International Workshop on Security and Privacy Requirements Engineering, SECPRE 2017, held in Oslo, Norway, in September 2017, in conjunction with the 22nd European Symposium on Research in Computer Security, ESORICS 2017. The CyberICPS Workshop received 32 submissions from which 10 full and 2 short papers were selected for presentation. They cover topics related to threats, vulnerabilities and risks that cyber-physical systems and industrial control systems face; cyber attacks that may be launched against such systems; and ways of detecting and responding to such attacks. From the SECPRE Workshop 5 full papers out of 14 submissions are included. The selected papers deal with aspects of security and privacy requirements assurance and evaluation; and security requirements elicitation and modelling. 410 0$aSecurity and Cryptology ;$v10683 606 $aComputer security 606 $aData encryption (Computer science) 606 $aSoftware engineering 606 $aComputer organization 606 $aComputers and civilization 606 $aMicroprogramming  606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aSoftware Engineering$3https://scigraph.springernature.com/ontologies/product-market-codes/I14029 606 $aComputer Systems Organization and Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13006 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 606 $aControl Structures and Microprogramming$3https://scigraph.springernature.com/ontologies/product-market-codes/I12018 615 0$aComputer security. 615 0$aData encryption (Computer science). 615 0$aSoftware engineering. 615 0$aComputer organization. 615 0$aComputers and civilization. 615 0$aMicroprogramming . 615 14$aSystems and Data Security. 615 24$aCryptology. 615 24$aSoftware Engineering. 615 24$aComputer Systems Organization and Communication Networks. 615 24$aComputers and Society. 615 24$aControl Structures and Microprogramming. 676 $a005.8 702 $aKatsikas$b Sokratis K$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aCuppens$b Frédéric$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aCuppens$b Nora$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aLambrinoudakis$b Costas$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aKalloniatis$b Christos$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aMylopoulos$b John$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aAntón$b Annie$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aGritzalis$b Stefanos$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996465495703316 996 $aComputer & security$9878224 997 $aUNISA LEADER 01118nam0 22002651i 450 001 UON00338340 005 20231205104248.564 100 $a20091014d1979 |0itac50 ba 101 $aita 102 $aIT 105 $a|||| ||||| 200 1 $aˆGli ‰squilibri regionali nella Comunità economica europea e insufficienza dello SME$fCosmo Giacomo Sallustio Salvemini 205 $aSeconda edizione ampliata 210 $aMilano$cGiuffrè$d1979 215 $aVII, 220 p.$d24 cm. 606 $aCOMUNITA' ECONOMICA EUROPEA$xPolitica regionale$3UONC073643$2FI 620 $aIT$dMilano$3UONL000005 700 1$aSALLUSTIO_SALVEMINI$bCosmo Giacomo$3UONV190882$0267616 712 $aGiuffrè$3UONV257275$4650 801 $aIT$bSOL$c20240220$gRICA 899 $aSIBA - SISTEMA BIBLIOTECARIO DI ATENEO$2UONSI 912 $aUON00338340 950 $aSIBA - SISTEMA BIBLIOTECARIO DI ATENEO$dSI IX DIR INTCOM F 0006 $eSI SC 6157 5 0006 996 $aSquilibri regionali nella Comunita economica europea e insufficienza dello SME$9690981 997 $aUNIOR