LEADER 03857nam 22007215 450 001 996466471003316 005 20200703020659.0 010 $a3-030-05849-2 024 7 $a10.1007/978-3-030-05849-4 035 $a(CKB)4100000007389513 035 $a(DE-He213)978-3-030-05849-4 035 $a(MiAaPQ)EBC5925950 035 $a(PPN)233799427 035 $a(EXLCZ)994100000007389513 100 $a20181230d2019 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCritical Information Infrastructures Security$b[electronic resource] $e13th International Conference, CRITIS 2018, Kaunas, Lithuania, September 24-26, 2018, Revised Selected Papers /$fedited by Eric Luiijf, Inga ?utautait?, Bernhard M. Hämmerli 205 $a1st ed. 2019. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2019. 215 $a1 online resource (XIII, 238 p. 71 illus., 47 illus. in color.) 225 1 $aSecurity and Cryptology ;$v11260 300 $aIncludes Index. 311 $a3-030-05848-4 327 $aAdvanced analysis of critical energy systems -- Strengthening urban resilience -- Securing internet of things and industrial control systems -- Need and tool sets for industrial control system security -- Advancements in governance and resilience of critical infrastructures. . 330 $aThis book constitutes revised selected papers from the 13th International Conference on Critical Information Infrastructures Security, CRITIS 2018, held in Kaunas, Lithuania, in September 2018. The 16 full papers and 3 short papers presented were carefully reviewed and selected from 61 submissions. They are grouped in the following topical sections: advanced analysis of critical energy systems, strengthening urban resilience, securing internet of things and industrial control systems, need and tool sets for industrial control system security, and advancements in governance and resilience of critical infrastructures. . 410 0$aSecurity and Cryptology ;$v11260 606 $aComputer security 606 $aComputer communication systems 606 $aComputer crimes 606 $aApplication software 606 $aComputers 606 $aLaw and legislation 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aComputer Crime$3https://scigraph.springernature.com/ontologies/product-market-codes/I28070 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 606 $aLegal Aspects of Computing$3https://scigraph.springernature.com/ontologies/product-market-codes/I24059 615 0$aComputer security. 615 0$aComputer communication systems. 615 0$aComputer crimes. 615 0$aApplication software. 615 0$aComputers. 615 0$aLaw and legislation. 615 14$aSystems and Data Security. 615 24$aComputer Communication Networks. 615 24$aComputer Crime. 615 24$aInformation Systems Applications (incl. Internet). 615 24$aLegal Aspects of Computing. 676 $a005.8 702 $aLuiijf$b Eric$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $a?utautait?$b Inga$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aHämmerli$b Bernhard M$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996466471003316 996 $aCritical Information Infrastructures Security$9772142 997 $aUNISA