|
|
|
|
LEADER |
04981nam a2200625 4500 |
001 |
978-3-030-16874-2 |
003 |
DE-He213 |
005 |
20191025051222.0 |
007 |
cr nn 008mamaa |
008 |
190327s2019 gw | s |||| 0|eng d |
020 |
|
|
|a 9783030168742
|9 978-3-030-16874-2
|
024 |
7 |
|
|a 10.1007/978-3-030-16874-2
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a UR
|2 thema
|
072 |
|
7 |
|a UTN
|2 thema
|
082 |
0 |
4 |
|a 005.8
|2 23
|
245 |
1 |
0 |
|a Security and Safety Interplay of Intelligent Software Systems
|h [electronic resource] :
|b ESORICS 2018 International Workshops, ISSA 2018 and CSITS 2018, Barcelona, Spain, September 6-7, 2018, Revised Selected Papers /
|c edited by Brahim Hamid, Barbara Gallina, Asaf Shabtai, Yuval Elovici, Joaquin Garcia-Alfaro.
|
250 |
|
|
|a 1st ed. 2019.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2019.
|
300 |
|
|
|a XII, 173 p. 76 illus., 53 illus. in color.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Security and Cryptology ;
|v 11552
|
505 |
0 |
|
|a Invited Paper -- Towards safety and security co-engineering. Challenging aspects for a consistent intertwining -- Safety and Security Interplay -- Understanding Common Automotive Security Issues and their Implications -- SysML model transformation for safety and security analysis -- The Challenge of Safety Tactics Synchronization for Cooperative Systems (Short Paper) -- SAM: A Security Abstraction Model for Automotive Software Systems -- Car Security -- CAN-FD-Sec: Improving Security of CAN-FD Protocol -- INCANTA - INtrusion detection in Controller Area Networks with Time-covert Authentication -- Detection of Injection Attacks in Compressed CAN Traffic Logs -- Key Is In The Air: Hacking Remote Keyless Entry Systems (Short Paper) -- Aviation Security -- Surveying Aviation Professionals on the Security of the Air Traffic Control System -- On the Security of MIL-STD-1553 Communication Bus.
|
520 |
|
|
|a This book constitutes the thoroughly refereed post-conference proceedings of the International Workshop on Interplay of Security, Safety and System/Software Architecture, CSITS 2018, and the International Workshop on Cyber Security for Intelligent Transportation Systems, ISSA 2018, held in Barcelona, Spain, in September 2018, in conjunction with the 23rd European Symposium on Research in Computer Security, ESORICS 2018. The ISSA 2018 workshop received 10 submissions from which 3 full papers and 1 short paper were accepted. They cover topics such as software security engineering, domain-specific security and privacy architectures, and automative security. In addition, an invited paper on safety and security co-engineering intertwining is included. The CSITS 2018 workshop received 9 submissions from which 5 full papers and 1 short paper were accepted. The selected papers deal with car security and aviation security. .
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Computer communication systems.
|
650 |
|
0 |
|a Computers.
|
650 |
|
0 |
|a Software engineering.
|
650 |
1 |
4 |
|a Systems and Data Security.
|0 http://scigraph.springernature.com/things/product-market-codes/I28060
|
650 |
2 |
4 |
|a Security Services.
|0 http://scigraph.springernature.com/things/product-market-codes/I28030
|
650 |
2 |
4 |
|a Cryptology.
|0 http://scigraph.springernature.com/things/product-market-codes/I28020
|
650 |
2 |
4 |
|a Computer Communication Networks.
|0 http://scigraph.springernature.com/things/product-market-codes/I13022
|
650 |
2 |
4 |
|a Computing Milieux.
|0 http://scigraph.springernature.com/things/product-market-codes/I24008
|
650 |
2 |
4 |
|a Software Engineering.
|0 http://scigraph.springernature.com/things/product-market-codes/I14029
|
700 |
1 |
|
|a Hamid, Brahim.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Gallina, Barbara.
|e editor.
|0 (orcid)0000-0002-6952-1053
|1 https://orcid.org/0000-0002-6952-1053
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Shabtai, Asaf.
|e editor.
|0 (orcid)0000-0003-0630-4059
|1 https://orcid.org/0000-0003-0630-4059
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Elovici, Yuval.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Garcia-Alfaro, Joaquin.
|e editor.
|0 (orcid)0000-0002-7453-4393
|1 https://orcid.org/0000-0002-7453-4393
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783030168735
|
776 |
0 |
8 |
|i Printed edition:
|z 9783030168759
|
830 |
|
0 |
|a Security and Cryptology ;
|v 11552
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-030-16874-2
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (Springer-11645)
|