000 | 04402nam a22007095i 4500 | ||
---|---|---|---|
001 | 978-3-319-40385-4 | ||
003 | DE-He213 | ||
005 | 20240423130202.0 | ||
007 | cr nn 008mamaa | ||
008 | 160617s2016 sz | s |||| 0|eng d | ||
020 |
_a9783319403854 _9978-3-319-40385-4 |
||
024 | 7 |
_a10.1007/978-3-319-40385-4 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aSecurity of Industrial Control Systems and Cyber Physical Systems _h[electronic resource] : _bFirst Workshop, CyberICS 2015 and First Workshop, WOS-CPS 2015 Vienna, Austria, September 21–22, 2015 Revised Selected Papers / _cedited by Adrien Bécue, Nora Cuppens-Boulahia, Frédéric Cuppens, Sokratis Katsikas, Costas Lambrinoudakis. |
250 | _a1st ed. 2016. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2016. |
|
300 |
_aX, 169 p. 41 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v9588 |
|
505 | 0 | _aICSs: Cyber protection and cyber defense of SCADA systems -- Plant control systems -- Engineering workstations -- Substation equipment -- Programmable logic controllers -- PLCs, and other industrial control system -- WOS-CPS: Security of Cyber Physical Systems -- In embedded systems -- In smart vehicles -- SCADA systems in smart grids -- Control systems in water distribution systems -- In smart transportation systems etc. . | |
520 | _aThis book constitutes the refereed proceedings of the First Conference on Cybersecurity of Industrial Control Systems, CyberICS 2015, and the First Workshop on the Security of Cyber Physical Systems, WOS-CPS 2015, held in Vienna, Austria, in September 2015 in conjunction with ESORICS 2015, the 20th annual European Symposium on Research in Computer Security. The 6 revised full papers and 2 short papers of CyberICS 2015 presented together with 3 revised full papers of WOS-CPS 2015 were carefully reviewed and selected from 28 initial submissions. CyberICS 2015 focuses on topics covering ICSs, including cyber protection and cyber defense of SCADA systems, plant control systems, engineering workstations, substation equipment, programmable logic controllers, PLCs, and other industrial control system. WOS-CPS 2015 deals with the Security of Cyber Physical Systems, that exist everywhere around us, and range in size, complexity and criticality, from embedded systems used in smart vehicles, to SCADA systems in smart grids to control systems in water distribution systems, to smart transportation systems etc. . | ||
650 | 0 | _aData protection. | |
650 | 0 | _aCryptography. | |
650 | 0 | _aData encryption (Computer science). | |
650 | 0 | _aComputer engineering. | |
650 | 0 | _aComputer networks . | |
650 | 0 | _aApplication software. | |
650 | 0 |
_aElectronic data processing _xManagement. |
|
650 | 0 | _aComputers and civilization. | |
650 | 1 | 4 | _aData and Information Security. |
650 | 2 | 4 | _aCryptology. |
650 | 2 | 4 | _aComputer Engineering and Networks. |
650 | 2 | 4 | _aComputer and Information Systems Applications. |
650 | 2 | 4 | _aIT Operations. |
650 | 2 | 4 | _aComputers and Society. |
700 | 1 |
_aBécue, Adrien. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aCuppens-Boulahia, Nora. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aCuppens, Frédéric. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aKatsikas, Sokratis. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aLambrinoudakis, Costas. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783319403847 |
776 | 0 | 8 |
_iPrinted edition: _z9783319403861 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v9588 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-319-40385-4 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cSPRINGER | ||
999 |
_c185964 _d185964 |