000 | 04960nam a22005655i 4500 | ||
---|---|---|---|
001 | 978-3-031-35190-7 | ||
003 | DE-He213 | ||
005 | 20240423125539.0 | ||
007 | cr nn 008mamaa | ||
008 | 230607s2023 sz | s |||| 0|eng d | ||
020 |
_a9783031351907 _9978-3-031-35190-7 |
||
024 | 7 |
_a10.1007/978-3-031-35190-7 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aCritical Information Infrastructures Security _h[electronic resource] : _b17th International Conference, CRITIS 2022, Munich, Germany, September 14–16, 2022, Revised Selected Papers / _cedited by Bernhard Hämmerli, Udo Helmbrecht, Wolfgang Hommel, Leonhard Kunczik, Stefan Pickl. |
250 | _a1st ed. 2023. | ||
264 | 1 |
_aCham : _bSpringer Nature Switzerland : _bImprint: Springer, _c2023. |
|
300 |
_aXIII, 276 p. 84 illus., 61 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v13723 |
|
505 | 0 | _aProtection of Cyber-Physical Systems and Industrial Control Systems -- Root Cause Analysis of Software Aging in Critical Information Infrastructure -- Threat-driven Dynamic Security Policies for Cyber-Physical Infrastructures -- High Data Throughput Exfiltration through Video Cable Emanations -- Design and Justification of a Cybersecurity Assessment Framework for IoT-based Environments -- An Empirical Evaluation of 4.0 CNC Machines -- Dataset Report : LID-DS 2021 -- Analytics, Strategic Management -- Strategic Anticipation in Crisis Management through the Lens of Societal Values - The SANCTUM Project -- An Assessment Model for Prioritizing CVEs in CRITIS in the Context of Time and Fault Criticality -- Towards a Layer Model for Digital Sovereignty: A Holistic Approach -- Building Collaborative Cybersecurity for Critical Infrastructure Protection: Empirical Evidence of Collective Intelligence Information-Sharing Dynamics on ThreatFox -- Automatic Concrete Bridge Crack Detection from Strain Measurements: a Preliminary Study -- Mapping and Simulating Cyber-Physical Threats for Critical Infrastructures -- Identifying Residential Areas based on Open Source Data: a Multi Criteria Holistic Indicator to Optimize Resource Allocation During a Pandemic -- Security Awareness and Crisis Management for C(I)IP -- Modeling Hierarchical Structure of Effective Communication Factors in Cyber Incident Response -- Energy Security in the Context of Hybrid Threats: The Case of the European Natural Gas Network -- Cybersecurity in the German Railway Sector -- The Understanding of Vulnerability of Critical Infrastructure -- Is there a Relationship between Cybersecurity Level and Electricity Outages in Norway? -- Emerging Importance of Cybersecurity in Electric Power Sector as a Hub of Interoperable Critical Infrastructure Protection in the Greater Metropolitan Areas in Japan -- A Water Security Plan to Enhance Resilience of Drinking Water Systems. | |
520 | _aThis book constitutes the refereed proceedings of the 17th International Conference on Critical Information Infrastructures Security, CRITIS 2022, which took place in Munich, Germany, during September 14–16, 2022. The 16 full papers and 4 short papers included in this volume were carefully reviewed and selected from 26 submissions. They are organized in topical sections as follows: protection of cyber-physical systems and industrial control systems (ICS); C(I)IP organization, (strategic) management and legal aspects; human factor, security awareness and crisis management for C(I)IP and critical services; and future, TechWatch and forecast for C(I)IP and critical services. | ||
650 | 0 | _aData protection. | |
650 | 1 | 4 | _aData and Information Security. |
700 | 1 |
_aHämmerli, Bernhard. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aHelmbrecht, Udo. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aHommel, Wolfgang. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aKunczik, Leonhard. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aPickl, Stefan. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783031351891 |
776 | 0 | 8 |
_iPrinted edition: _z9783031351914 |
830 | 0 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v13723 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-031-35190-7 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cSPRINGER | ||
999 |
_c179139 _d179139 |