Amazon cover image
Image from Amazon.com

Information and Operational Technology Security Systems [electronic resource] : First International Workshop, IOSec 2018, CIPSEC Project, Heraklion, Crete, Greece, September 13, 2018, Revised Selected Papers /

Contributor(s): Material type: TextTextSeries: Security and Cryptology ; 11398Publisher: Cham : Springer International Publishing : Imprint: Springer, 2019Edition: 1st ed. 2019Description: X, 147 p. 63 illus., 45 illus. in color. online resourceContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9783030120856
Subject(s): Additional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification:
  • 005.8 23
LOC classification:
  • QA76.9.A25
Online resources:
Contents:
Critical Infrastructure Cybersecurity Issues -- CyberSecurity Threats, Assessment and Privacy -- Vulnerability and Malware Detection.
In: Springer Nature eBookSummary: This book constitutes the refereed proceedings of the First International Workshop, IOSec 2018, sponsored by CIPSEC, held in Heraklion, Crete, Greece, in September 2018. The 12 full papers presented were carefully reviewed and selected from 22 submissions. They were organized in topical sections named: Critical Infrastructure Cybersecurity Issues; CyberSecurity Threats, Assessment and Privacy; and Vulnerability and Malware Detection.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

Critical Infrastructure Cybersecurity Issues -- CyberSecurity Threats, Assessment and Privacy -- Vulnerability and Malware Detection.

This book constitutes the refereed proceedings of the First International Workshop, IOSec 2018, sponsored by CIPSEC, held in Heraklion, Crete, Greece, in September 2018. The 12 full papers presented were carefully reviewed and selected from 22 submissions. They were organized in topical sections named: Critical Infrastructure Cybersecurity Issues; CyberSecurity Threats, Assessment and Privacy; and Vulnerability and Malware Detection.

There are no comments on this title.

to post a comment.
© 2024 IIIT-Delhi, library@iiitd.ac.in