Theory and models for cyber situation awareness

Gespeichert in:
Bibliographische Detailangaben
Weitere Verfasser: Liu, Peng 1970- (HerausgeberIn), Jajodia, Sushil 1947- (HerausgeberIn), Wang, Cliff (HerausgeberIn)
Format: Buch
Sprache:English
Veröffentlicht: Cham Springer [2017]
© 2017
Schriftenreihe:Lecture notes in computer science 10030
Schlagworte:
Online-Zugang:Inhaltstext
http://www.springer.com/
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a2200000 cb4500
001 BV044433668
003 DE-604
005 00000000000000.0
007 t|
008 170801s2017 sz |||| 00||| eng d
016 7 |a 1132077575  |2 DE-101 
020 |a 9783319611518  |9 978-3-319-61151-8 
020 |a 3319611518  |9 3-319-61151-8 
024 3 |a 9783319611518 
028 5 2 |a Bestellnummer: 978-3-319-61151-8 
035 |a (OCoLC)1002268596 
035 |a (DE-599)DNB1132077575 
040 |a DE-604  |b ger  |e rda 
041 0 |a eng 
044 |a sz  |c XA-CH 
049 |a DE-83 
084 |a SS 4800  |0 (DE-625)143528:  |2 rvk 
245 1 0 |a Theory and models for cyber situation awareness  |c Peng Liu, Sushil Jajodia, Cliff Wang (eds.) 
264 1 |a Cham  |b Springer  |c [2017] 
264 1 |c © 2017 
300 |a VI, 226 Seiten  |c 23.5 cm x 15.5 cm 
336 |b txt  |2 rdacontent 
337 |b n  |2 rdamedia 
338 |b nc  |2 rdacarrier 
490 1 |a Lecture notes in computer science  |v 10030 
650 0 7 |a Informatik  |0 (DE-588)4026894-9  |2 gnd  |9 rswk-swf 
650 0 7 |a Computersicherheit  |0 (DE-588)4274324-2  |2 gnd  |9 rswk-swf 
653 |a UYQ 
653 |a URY 
653 |a UKN 
653 |a UR 
653 |a cyber security 
653 |a decision making 
653 |a enterprise networks 
653 |a multi-agent cognitive modeling 
653 |a visualization 
653 |a automated reasoning 
653 |a cognitive models 
653 |a cognitive science 
653 |a cognitive task analysis 
653 |a collaboration 
653 |a cyber defense 
653 |a cyberattacks 
653 |a cyberwar 
653 |a human factors 
653 |a learning 
653 |a modeling 
653 |a network security domain 
653 |a security analysts 
653 |a simulation 
653 |a socio-cyber systems 
689 0 0 |a Informatik  |0 (DE-588)4026894-9  |D s 
689 0 |5 DE-604 
689 1 0 |a Computersicherheit  |0 (DE-588)4274324-2  |D s 
689 1 |8 1\p  |5 DE-604 
700 1 |a Liu, Peng  |d 1970-  |0 (DE-588)1072570947  |4 edt 
700 1 |a Jajodia, Sushil  |d 1947-  |0 (DE-588)120551683  |4 edt 
700 1 |a Wang, Cliff  |0 (DE-588)1047455986  |4 edt 
710 2 |a Springer International Publishing  |0 (DE-588)1064344704  |4 pbl 
776 0 8 |i Elektronische Reproduktion  |z 9783319611525 
776 0 8 |i Erscheint auch als  |n Online-Ausgabe  |z 978-3-319-61152-5 
830 0 |a Lecture notes in computer science  |v 10030  |w (DE-604)BV000000607  |9 10030 
856 4 2 |m X:MVB  |q text/html  |u http://deposit.dnb.de/cgi-bin/dokserv?id=88c8caed964b4f1581c1bb958df86eca&prov=M&dok_var=1&dok_ext=htm  |3 Inhaltstext 
856 4 2 |m X:MVB  |u http://www.springer.com/ 
883 1 |8 1\p  |a cgwrk  |d 20201028  |q DE-101  |u https://d-nb.info/provenance/plan#cgwrk 
943 1 |a oai:aleph.bib-bvb.de:BVB01-029835022 

Datensatz im Suchindex

_version_ 1819300829933338624
any_adam_object
author2 Liu, Peng 1970-
Jajodia, Sushil 1947-
Wang, Cliff
author2_role edt
edt
edt
author2_variant p l pl
s j sj
c w cw
author_GND (DE-588)1072570947
(DE-588)120551683
(DE-588)1047455986
author_facet Liu, Peng 1970-
Jajodia, Sushil 1947-
Wang, Cliff
building Verbundindex
bvnumber BV044433668
classification_rvk SS 4800
ctrlnum (OCoLC)1002268596
(DE-599)DNB1132077575
discipline Informatik
format Book
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02776nam a2200817 cb4500</leader><controlfield tag="001">BV044433668</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">170801s2017 sz |||| 00||| eng d</controlfield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1132077575</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319611518</subfield><subfield code="9">978-3-319-61151-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3319611518</subfield><subfield code="9">3-319-61151-8</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783319611518</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">Bestellnummer: 978-3-319-61151-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1002268596</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1132077575</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">sz</subfield><subfield code="c">XA-CH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-83</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SS 4800</subfield><subfield code="0">(DE-625)143528:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Theory and models for cyber situation awareness</subfield><subfield code="c">Peng Liu, Sushil Jajodia, Cliff Wang (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer</subfield><subfield code="c">[2017]</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">© 2017</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">VI, 226 Seiten</subfield><subfield code="c">23.5 cm x 15.5 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">10030</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informatik</subfield><subfield code="0">(DE-588)4026894-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">UYQ</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">URY</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">UKN</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">UR</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">cyber security</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">decision making</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">enterprise networks</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">multi-agent cognitive modeling</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">visualization</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">automated reasoning</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">cognitive models</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">cognitive science</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">cognitive task analysis</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">collaboration</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">cyber defense</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">cyberattacks</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">cyberwar</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">human factors</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">learning</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">modeling</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">network security domain</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">security analysts</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">simulation</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">socio-cyber systems</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Informatik</subfield><subfield code="0">(DE-588)4026894-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Liu, Peng</subfield><subfield code="d">1970-</subfield><subfield code="0">(DE-588)1072570947</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Jajodia, Sushil</subfield><subfield code="d">1947-</subfield><subfield code="0">(DE-588)120551683</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wang, Cliff</subfield><subfield code="0">(DE-588)1047455986</subfield><subfield code="4">edt</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Springer International Publishing</subfield><subfield code="0">(DE-588)1064344704</subfield><subfield code="4">pbl</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Elektronische Reproduktion</subfield><subfield code="z">9783319611525</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-3-319-61152-5</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">10030</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">10030</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">X:MVB</subfield><subfield code="q">text/html</subfield><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=88c8caed964b4f1581c1bb958df86eca&amp;prov=M&amp;dok_var=1&amp;dok_ext=htm</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">X:MVB</subfield><subfield code="u">http://www.springer.com/</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029835022</subfield></datafield></record></collection>
id DE-604.BV044433668
illustrated Not Illustrated
indexdate 2024-12-24T06:07:55Z
institution BVB
institution_GND (DE-588)1064344704
isbn 9783319611518
3319611518
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-029835022
oclc_num 1002268596
open_access_boolean
owner DE-83
owner_facet DE-83
physical VI, 226 Seiten 23.5 cm x 15.5 cm
publishDate 2017
publishDateSearch 2017
publishDateSort 2017
publisher Springer
record_format marc
series Lecture notes in computer science
series2 Lecture notes in computer science
spelling Theory and models for cyber situation awareness Peng Liu, Sushil Jajodia, Cliff Wang (eds.)
Cham Springer [2017]
© 2017
VI, 226 Seiten 23.5 cm x 15.5 cm
txt rdacontent
n rdamedia
nc rdacarrier
Lecture notes in computer science 10030
Informatik (DE-588)4026894-9 gnd rswk-swf
Computersicherheit (DE-588)4274324-2 gnd rswk-swf
UYQ
URY
UKN
UR
cyber security
decision making
enterprise networks
multi-agent cognitive modeling
visualization
automated reasoning
cognitive models
cognitive science
cognitive task analysis
collaboration
cyber defense
cyberattacks
cyberwar
human factors
learning
modeling
network security domain
security analysts
simulation
socio-cyber systems
Informatik (DE-588)4026894-9 s
DE-604
Computersicherheit (DE-588)4274324-2 s
1\p DE-604
Liu, Peng 1970- (DE-588)1072570947 edt
Jajodia, Sushil 1947- (DE-588)120551683 edt
Wang, Cliff (DE-588)1047455986 edt
Springer International Publishing (DE-588)1064344704 pbl
Elektronische Reproduktion 9783319611525
Erscheint auch als Online-Ausgabe 978-3-319-61152-5
Lecture notes in computer science 10030 (DE-604)BV000000607 10030
X:MVB text/html http://deposit.dnb.de/cgi-bin/dokserv?id=88c8caed964b4f1581c1bb958df86eca&prov=M&dok_var=1&dok_ext=htm Inhaltstext
X:MVB http://www.springer.com/
1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk
spellingShingle Theory and models for cyber situation awareness
Lecture notes in computer science
Informatik (DE-588)4026894-9 gnd
Computersicherheit (DE-588)4274324-2 gnd
subject_GND (DE-588)4026894-9
(DE-588)4274324-2
title Theory and models for cyber situation awareness
title_auth Theory and models for cyber situation awareness
title_exact_search Theory and models for cyber situation awareness
title_full Theory and models for cyber situation awareness Peng Liu, Sushil Jajodia, Cliff Wang (eds.)
title_fullStr Theory and models for cyber situation awareness Peng Liu, Sushil Jajodia, Cliff Wang (eds.)
title_full_unstemmed Theory and models for cyber situation awareness Peng Liu, Sushil Jajodia, Cliff Wang (eds.)
title_short Theory and models for cyber situation awareness
title_sort theory and models for cyber situation awareness
topic Informatik (DE-588)4026894-9 gnd
Computersicherheit (DE-588)4274324-2 gnd
topic_facet Informatik
Computersicherheit
url http://deposit.dnb.de/cgi-bin/dokserv?id=88c8caed964b4f1581c1bb958df86eca&prov=M&dok_var=1&dok_ext=htm
http://www.springer.com/
volume_link (DE-604)BV000000607
work_keys_str_mv AT liupeng theoryandmodelsforcybersituationawareness
AT jajodiasushil theoryandmodelsforcybersituationawareness
AT wangcliff theoryandmodelsforcybersituationawareness
AT springerinternationalpublishing theoryandmodelsforcybersituationawareness