Security and Resiliency Analytics for Smart Grids: Static and Dynamic Approaches
Gespeichert in:
Internformat
MARC
LEADER | 00000nam a2200000zcb4500 | ||
---|---|---|---|
001 | BV043650334 | ||
003 | DE-604 | ||
005 | 20160713 | ||
007 | cr|uuu---uuuuu | ||
008 | 160701s2016 xx a||| o|||| 00||| eng d | ||
020 | |a 9783319328713 |c Online |9 978-3-319-32871-3 | ||
024 | 7 | |a 10.1007/978-3-319-32871-3 |2 doi | |
035 | |a (ZDB-2-SCS)978-3-319-32871-3 | ||
035 | |a (OCoLC)953121254 | ||
035 | |a (DE-599)BVBBV043650334 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-355 |a DE-19 |a DE-Aug4 |a DE-898 |a DE-861 |a DE-523 |a DE-859 |a DE-473 |a DE-29 |a DE-20 |a DE-92 |a DE-573 |a DE-M347 |a DE-703 |a DE-739 |a DE-634 | ||
082 | 0 | |a 005.8 |2 23 | |
084 | |a QR 760 |0 (DE-625)142080: |2 rvk | ||
084 | |a ST 130 |0 (DE-625)143588: |2 rvk | ||
084 | |a ST 620 |0 (DE-625)143684: |2 rvk | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
100 | 1 | |a Al-Shaer, Ehab S. |d 1967- |e Verfasser |0 (DE-588)123235383 |4 aut | |
245 | 1 | 0 | |a Security and Resiliency Analytics for Smart Grids |b Static and Dynamic Approaches |c by Ehab Al-Shaer, Mohammad Ashiqur Rahman |
264 | 1 | |a Cham |b Springer |c 2016 | |
300 | |a 1 Online-Ressource (XVI, 144 Seiten) |b 37 Illustrationen, 22 Illustrationen (farbig) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Advances in Information Security |v volume 67 |x 1568-2633 | |
650 | 4 | |a Computer science | |
650 | 4 | |a Computer communication systems | |
650 | 4 | |a Computer security | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Computer Science | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Computer Communication Networks | |
650 | 4 | |a Information Systems Applications (incl. Internet) | |
650 | 4 | |a Data Encryption | |
650 | 4 | |a Informatik | |
650 | 0 | 7 | |a Sicherheit |0 (DE-588)4054790-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Informatik |0 (DE-588)4026894-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Cyber-physisches System |0 (DE-588)1069505412 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Intelligentes Stromnetz |0 (DE-588)7708028-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Informatik |0 (DE-588)4026894-9 |D s |
689 | 0 | 1 | |a Cyber-physisches System |0 (DE-588)1069505412 |D s |
689 | 0 | 2 | |a Intelligentes Stromnetz |0 (DE-588)7708028-2 |D s |
689 | 0 | 3 | |a Sicherheit |0 (DE-588)4054790-5 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Rahman, Mohammad Ashiqur |e Verfasser |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 978-3-319-32870-6 |
830 | 0 | |a Advances in Information Security |v 67 |w (DE-604)BV022281064 |9 67 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-319-32871-3 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-2-SCS | ||
940 | 1 | |q ZDB-2-SCS_2016 | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-029063941 | |
966 | e | |u https://doi.org/10.1007/978-3-319-32871-3 |l DE-634 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-32871-3 |l DE-Aug4 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-32871-3 |l DE-573 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-32871-3 |l DE-M347 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-32871-3 |l DE-92 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-32871-3 |l DE-898 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-32871-3 |l DE-859 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-32871-3 |l DE-861 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-32871-3 |l DE-523 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-32871-3 |l DE-473 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-32871-3 |l DE-19 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-32871-3 |l DE-355 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-32871-3 |l DE-703 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-32871-3 |l DE-20 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-32871-3 |l DE-29 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-32871-3 |l DE-739 |p ZDB-2-SCS |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1818982084222386176 |
---|---|
any_adam_object | |
author | Al-Shaer, Ehab S. 1967- Rahman, Mohammad Ashiqur |
author_GND | (DE-588)123235383 |
author_facet | Al-Shaer, Ehab S. 1967- Rahman, Mohammad Ashiqur |
author_role | aut aut |
author_sort | Al-Shaer, Ehab S. 1967- |
author_variant | e s a s esa esas m a r ma mar |
building | Verbundindex |
bvnumber | BV043650334 |
classification_rvk | QR 760 ST 130 ST 620 ST 277 |
collection | ZDB-2-SCS |
ctrlnum | (ZDB-2-SCS)978-3-319-32871-3 (OCoLC)953121254 (DE-599)BVBBV043650334 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik Wirtschaftswissenschaften |
doi_str_mv | 10.1007/978-3-319-32871-3 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04182nam a2200841zcb4500</leader><controlfield tag="001">BV043650334</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20160713 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">160701s2016 xx a||| o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319328713</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-319-32871-3</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-319-32871-3</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SCS)978-3-319-32871-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)953121254</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043650334</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-523</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-634</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">QR 760</subfield><subfield code="0">(DE-625)142080:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 130</subfield><subfield code="0">(DE-625)143588:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 620</subfield><subfield code="0">(DE-625)143684:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Al-Shaer, Ehab S.</subfield><subfield code="d">1967-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)123235383</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security and Resiliency Analytics for Smart Grids</subfield><subfield code="b">Static and Dynamic Approaches</subfield><subfield code="c">by Ehab Al-Shaer, Mohammad Ashiqur Rahman</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer</subfield><subfield code="c">2016</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XVI, 144 Seiten)</subfield><subfield code="b">37 Illustrationen, 22 Illustrationen (farbig)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Advances in Information Security</subfield><subfield code="v">volume 67</subfield><subfield code="x">1568-2633</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer communication systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information Systems Applications (incl. Internet)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Encryption</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheit</subfield><subfield code="0">(DE-588)4054790-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informatik</subfield><subfield code="0">(DE-588)4026894-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Cyber-physisches System</subfield><subfield code="0">(DE-588)1069505412</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Intelligentes Stromnetz</subfield><subfield code="0">(DE-588)7708028-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Informatik</subfield><subfield code="0">(DE-588)4026894-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Cyber-physisches System</subfield><subfield code="0">(DE-588)1069505412</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Intelligentes Stromnetz</subfield><subfield code="0">(DE-588)7708028-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Sicherheit</subfield><subfield code="0">(DE-588)4054790-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Rahman, Mohammad Ashiqur</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-3-319-32870-6</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Advances in Information Security</subfield><subfield code="v">67</subfield><subfield code="w">(DE-604)BV022281064</subfield><subfield code="9">67</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-319-32871-3</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2016</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029063941</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-32871-3</subfield><subfield code="l">DE-634</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-32871-3</subfield><subfield code="l">DE-Aug4</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-32871-3</subfield><subfield code="l">DE-573</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-32871-3</subfield><subfield code="l">DE-M347</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-32871-3</subfield><subfield code="l">DE-92</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-32871-3</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-32871-3</subfield><subfield code="l">DE-859</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-32871-3</subfield><subfield code="l">DE-861</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-32871-3</subfield><subfield code="l">DE-523</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-32871-3</subfield><subfield code="l">DE-473</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-32871-3</subfield><subfield code="l">DE-19</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-32871-3</subfield><subfield code="l">DE-355</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-32871-3</subfield><subfield code="l">DE-703</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-32871-3</subfield><subfield code="l">DE-20</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-32871-3</subfield><subfield code="l">DE-29</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-32871-3</subfield><subfield code="l">DE-739</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043650334 |
illustrated | Illustrated |
indexdate | 2024-12-20T17:41:35Z |
institution | BVB |
isbn | 9783319328713 |
issn | 1568-2633 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029063941 |
oclc_num | 953121254 |
open_access_boolean | |
owner | DE-355 DE-BY-UBR DE-19 DE-BY-UBM DE-Aug4 DE-898 DE-BY-UBR DE-861 DE-523 DE-859 DE-473 DE-BY-UBG DE-29 DE-20 DE-92 DE-573 DE-M347 DE-703 DE-739 DE-634 |
owner_facet | DE-355 DE-BY-UBR DE-19 DE-BY-UBM DE-Aug4 DE-898 DE-BY-UBR DE-861 DE-523 DE-859 DE-473 DE-BY-UBG DE-29 DE-20 DE-92 DE-573 DE-M347 DE-703 DE-739 DE-634 |
physical | 1 Online-Ressource (XVI, 144 Seiten) 37 Illustrationen, 22 Illustrationen (farbig) |
psigel | ZDB-2-SCS ZDB-2-SCS_2016 |
publishDate | 2016 |
publishDateSearch | 2016 |
publishDateSort | 2016 |
publisher | Springer |
record_format | marc |
series | Advances in Information Security |
series2 | Advances in Information Security |
spelling | Al-Shaer, Ehab S. 1967- Verfasser (DE-588)123235383 aut Security and Resiliency Analytics for Smart Grids Static and Dynamic Approaches by Ehab Al-Shaer, Mohammad Ashiqur Rahman Cham Springer 2016 1 Online-Ressource (XVI, 144 Seiten) 37 Illustrationen, 22 Illustrationen (farbig) txt rdacontent c rdamedia cr rdacarrier Advances in Information Security volume 67 1568-2633 Computer science Computer communication systems Computer security Data encryption (Computer science) Computer Science Systems and Data Security Computer Communication Networks Information Systems Applications (incl. Internet) Data Encryption Informatik Sicherheit (DE-588)4054790-5 gnd rswk-swf Informatik (DE-588)4026894-9 gnd rswk-swf Cyber-physisches System (DE-588)1069505412 gnd rswk-swf Intelligentes Stromnetz (DE-588)7708028-2 gnd rswk-swf Informatik (DE-588)4026894-9 s Cyber-physisches System (DE-588)1069505412 s Intelligentes Stromnetz (DE-588)7708028-2 s Sicherheit (DE-588)4054790-5 s DE-604 Rahman, Mohammad Ashiqur Verfasser aut Erscheint auch als Druckausgabe 978-3-319-32870-6 Advances in Information Security 67 (DE-604)BV022281064 67 https://doi.org/10.1007/978-3-319-32871-3 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Al-Shaer, Ehab S. 1967- Rahman, Mohammad Ashiqur Security and Resiliency Analytics for Smart Grids Static and Dynamic Approaches Advances in Information Security Computer science Computer communication systems Computer security Data encryption (Computer science) Computer Science Systems and Data Security Computer Communication Networks Information Systems Applications (incl. Internet) Data Encryption Informatik Sicherheit (DE-588)4054790-5 gnd Informatik (DE-588)4026894-9 gnd Cyber-physisches System (DE-588)1069505412 gnd Intelligentes Stromnetz (DE-588)7708028-2 gnd |
subject_GND | (DE-588)4054790-5 (DE-588)4026894-9 (DE-588)1069505412 (DE-588)7708028-2 |
title | Security and Resiliency Analytics for Smart Grids Static and Dynamic Approaches |
title_auth | Security and Resiliency Analytics for Smart Grids Static and Dynamic Approaches |
title_exact_search | Security and Resiliency Analytics for Smart Grids Static and Dynamic Approaches |
title_full | Security and Resiliency Analytics for Smart Grids Static and Dynamic Approaches by Ehab Al-Shaer, Mohammad Ashiqur Rahman |
title_fullStr | Security and Resiliency Analytics for Smart Grids Static and Dynamic Approaches by Ehab Al-Shaer, Mohammad Ashiqur Rahman |
title_full_unstemmed | Security and Resiliency Analytics for Smart Grids Static and Dynamic Approaches by Ehab Al-Shaer, Mohammad Ashiqur Rahman |
title_short | Security and Resiliency Analytics for Smart Grids |
title_sort | security and resiliency analytics for smart grids static and dynamic approaches |
title_sub | Static and Dynamic Approaches |
topic | Computer science Computer communication systems Computer security Data encryption (Computer science) Computer Science Systems and Data Security Computer Communication Networks Information Systems Applications (incl. Internet) Data Encryption Informatik Sicherheit (DE-588)4054790-5 gnd Informatik (DE-588)4026894-9 gnd Cyber-physisches System (DE-588)1069505412 gnd Intelligentes Stromnetz (DE-588)7708028-2 gnd |
topic_facet | Computer science Computer communication systems Computer security Data encryption (Computer science) Computer Science Systems and Data Security Computer Communication Networks Information Systems Applications (incl. Internet) Data Encryption Informatik Sicherheit Cyber-physisches System Intelligentes Stromnetz |
url | https://doi.org/10.1007/978-3-319-32871-3 |
volume_link | (DE-604)BV022281064 |
work_keys_str_mv | AT alshaerehabs securityandresiliencyanalyticsforsmartgridsstaticanddynamicapproaches AT rahmanmohammadashiqur securityandresiliencyanalyticsforsmartgridsstaticanddynamicapproaches |