000 | 04537nam a22006855i 4500 | ||
---|---|---|---|
001 | 978-3-030-16874-2 | ||
003 | DE-He213 | ||
005 | 20240423130150.0 | ||
007 | cr nn 008mamaa | ||
008 | 190327s2019 sz | s |||| 0|eng d | ||
020 |
_a9783030168742 _9978-3-030-16874-2 |
||
024 | 7 |
_a10.1007/978-3-030-16874-2 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aSecurity and Safety Interplay of Intelligent Software Systems _h[electronic resource] : _bESORICS 2018 International Workshops, ISSA 2018 and CSITS 2018, Barcelona, Spain, September 6–7, 2018, Revised Selected Papers / _cedited by Brahim Hamid, Barbara Gallina, Asaf Shabtai, Yuval Elovici, Joaquin Garcia-Alfaro. |
250 | _a1st ed. 2019. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2019. |
|
300 |
_aXII, 173 p. 76 illus., 53 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v11552 |
|
505 | 0 | _aInvited Paper -- Towards safety and security co-engineering. Challenging aspects for a consistent intertwining -- Safety and Security Interplay -- Understanding Common Automotive Security Issues and their Implications -- SysML model transformation for safety and security analysis -- The Challenge of Safety Tactics Synchronization for Cooperative Systems (Short Paper) -- SAM: A Security Abstraction Model for Automotive Software Systems -- Car Security -- CAN-FD-Sec: Improving Security of CAN-FD Protocol -- INCANTA - INtrusion detection in Controller Area Networks with Time-covert Authentication -- Detection of Injection Attacks in Compressed CAN Traffic Logs -- Key Is In The Air: Hacking Remote Keyless Entry Systems (Short Paper) -- Aviation Security -- Surveying Aviation Professionals on the Security of the Air Traffic Control System -- On the Security of MIL-STD-1553 Communication Bus. | |
520 | _aThis book constitutes the thoroughly refereed post-conference proceedings of the International Workshop on Interplay of Security, Safety and System/Software Architecture, CSITS 2018, and the International Workshop on Cyber Security for Intelligent Transportation Systems, ISSA 2018, held in Barcelona, Spain, in September 2018, in conjunction with the 23rd European Symposium on Research in Computer Security, ESORICS 2018. The ISSA 2018 workshop received 10 submissions from which 3 full papers and 1 short paper were accepted. They cover topics such as software security engineering, domain-specific security and privacy architectures, and automative security. In addition, an invited paper on safety and security co-engineering intertwining is included. The CSITS 2018 workshop received 9 submissions from which 5 full papers and 1 short paper were accepted. The selected papers deal with car security and aviation security. . | ||
650 | 0 | _aData protection. | |
650 | 0 | _aCryptography. | |
650 | 0 | _aData encryption (Computer science). | |
650 | 0 | _aComputer networks . | |
650 | 0 | _aComputers. | |
650 | 0 | _aSoftware engineering. | |
650 | 1 | 4 | _aData and Information Security. |
650 | 2 | 4 | _aSecurity Services. |
650 | 2 | 4 | _aCryptology. |
650 | 2 | 4 | _aComputer Communication Networks. |
650 | 2 | 4 | _aComputing Milieux. |
650 | 2 | 4 | _aSoftware Engineering. |
700 | 1 |
_aHamid, Brahim. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aGallina, Barbara. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aShabtai, Asaf. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aElovici, Yuval. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aGarcia-Alfaro, Joaquin. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783030168735 |
776 | 0 | 8 |
_iPrinted edition: _z9783030168759 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v11552 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-030-16874-2 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cSPRINGER | ||
999 |
_c185767 _d185767 |