Overview
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 11777)
Part of the book sub series: Security and Cryptology (LNSC)
Included in the following conference series:
Conference proceedings info: CRITIS 2019.
Access this book
Tax calculation will be finalised at checkout
Other ways to access
Table of contents (19 papers)
-
Risk Management
-
Resilience and Mitigation
-
Transport and Finance
-
Short Papers
Other volumes
-
Critical Information Infrastructures Security
Keywords
- architecture types
- artificial intelligence
- computer crime
- computer networks
- computer security
- computer systems
- cryptography
- cyber security
- data security
- databases
- engineering
- internet
- mathematics
- network protocols
- network security
- security issues
- signal processing
- software architecture
- software design
- software engineering
About this book
The 10 full papers and 5 short papers presented were carefully reviewed and selected from 30 submissions. They are grouped in the following topical sections: Invited Papers, Risk Management, Vulnerability Assessment, Resilience and Mitigation Short Papers, and Industry and Practical Experience Reports.
Editors and Affiliations
Bibliographic Information
Book Title: Critical Information Infrastructures Security
Book Subtitle: 14th International Conference, CRITIS 2019, Linköping, Sweden, September 23–25, 2019, Revised Selected Papers
Editors: Simin Nadjm-Tehrani
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-030-37670-3
Publisher: Springer Cham
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer Nature Switzerland AG 2020
Softcover ISBN: 978-3-030-37669-7Published: 20 December 2019
eBook ISBN: 978-3-030-37670-3Published: 19 December 2019
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XI, 210
Number of Illustrations: 14 b/w illustrations
Topics: Systems and Data Security, Information Systems and Communication Service, Computer Systems Organization and Communication Networks, Software Engineering/Programming and Operating Systems, Computing Milieux, Computer Crime