Backwards from zero : how the U.S. public evaluates the use of zero-day vulnerabilities in cybersecurity
Autor*in: |
Leal, Marcelo M. [verfasserIn] Musgrave, Paul [verfasserIn] |
---|
Format: |
E-Artikel |
---|---|
Sprache: |
Englisch |
Erschienen: |
2023 |
---|
Schlagwörter: |
---|
Übergeordnetes Werk: |
Enthalten in: Contemporary security policy - London : Routledge, Taylor & Francis Group, 1994, 44(2023), 3, Seite 437-461 |
---|---|
Übergeordnetes Werk: |
volume:44 ; year:2023 ; number:3 ; pages:437-461 |
Links: |
---|
DOI / URN: |
10.1080/13523260.2023.2216112 |
---|
Katalog-ID: |
1873188846 |
---|
LEADER | 01000caa a2200265 4500 | ||
---|---|---|---|
001 | 1873188846 | ||
003 | DE-627 | ||
005 | 20240117084402.0 | ||
007 | cr uuu---uuuuu | ||
008 | 231212s2023 xx |||||o 00| ||eng c | ||
024 | 7 | |a 10.1080/13523260.2023.2216112 |2 doi | |
035 | |a (DE-627)1873188846 | ||
035 | |a (DE-599)KXP1873188846 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
084 | |a RC02 |2 fivr | ||
084 | |a SC02 |2 fivs | ||
084 | |a SI03.02 |2 fivs | ||
100 | 1 | |a Leal, Marcelo M. |e verfasserin |0 (DE-588)1287820859 |0 (DE-627)1844478726 |4 aut | |
245 | 1 | 0 | |a Backwards from zero |b how the U.S. public evaluates the use of zero-day vulnerabilities in cybersecurity |c Marcelo M. Leal and Paul Musgrave |
264 | 1 | |c 2023 | |
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
650 | 0 | 7 | |0 (DE-588)4116489-1 |0 (DE-627)104325224 |0 (DE-576)209502010 |a Sicherheitspolitik |2 gnd |
650 | 0 | 7 | |0 (DE-588)4026899-8 |0 (DE-627)104653795 |0 (DE-576)20896844X |a Information |2 gnd |
650 | 0 | 7 | |0 (DE-588)4054790-5 |0 (DE-627)106161075 |0 (DE-576)209110589 |a Sicherheit |2 gnd |
650 | 0 | 7 | |0 (DE-588)4266146-8 |0 (DE-627)104567120 |0 (DE-576)210634804 |a Cyberspace |2 gnd |
650 | 0 | 7 | |0 (DE-588)1118882725 |0 (DE-627)872358631 |0 (DE-576)479682461 |a Cyberterrorismus |2 gnd |
650 | 0 | 7 | |0 (DE-588)7636249-8 |0 (DE-627)587274115 |0 (DE-576)288551133 |a Kritische Infrastruktur |2 gnd |
650 | 0 | 7 | |0 (DE-588)4129808-1 |0 (DE-627)105707236 |0 (DE-576)209613610 |a Kriegsziel |2 gnd |
650 | 0 | 7 | |0 (DE-588)4260091-1 |0 (DE-627)104643994 |0 (DE-576)210586478 |a Schutzvorrichtung |2 gnd |
651 | 7 | |0 (DE-588)4078704-7 |0 (DE-627)106076612 |0 (DE-576)209209682 |a USA |2 gnd | |
700 | 1 | |a Musgrave, Paul |e verfasserin |0 (DE-588)1166686663 |0 (DE-627)1030551790 |0 (DE-576)510734863 |4 aut | |
773 | 0 | 8 | |i Enthalten in |t Contemporary security policy |d London : Routledge, Taylor & Francis Group, 1994 |g 44(2023), 3, Seite 437-461 |h Online-Ressource |w (DE-627)355394278 |w (DE-600)2090044-2 |w (DE-576)109104781 |x 1743-8764 |7 nnns |
773 | 1 | 8 | |g volume:44 |g year:2023 |g number:3 |g pages:437-461 |
856 | 4 | 0 | |u https://doi.org/10.1080/13523260.2023.2216112 |x Resolving-System |z lizenzpflichtig |
912 | |a GBV_USEFLAG_U | ||
912 | |a GBV_ILN_2470 | ||
912 | |a ISIL_DE-615 | ||
912 | |a ISIL_DE-B1567 | ||
912 | |a SYSFLAG_1 | ||
912 | |a GBV_KXP | ||
912 | |a GBV_ILN_11 | ||
912 | |a GBV_ILN_20 | ||
912 | |a GBV_ILN_60 | ||
912 | |a GBV_ILN_63 | ||
912 | |a GBV_ILN_65 | ||
912 | |a GBV_ILN_69 | ||
912 | |a GBV_ILN_70 | ||
912 | |a GBV_ILN_100 | ||
912 | |a GBV_ILN_110 | ||
912 | |a GBV_ILN_151 | ||
912 | |a GBV_ILN_224 | ||
912 | |a GBV_ILN_285 | ||
912 | |a GBV_ILN_370 | ||
912 | |a GBV_ILN_702 | ||
912 | |a GBV_ILN_2001 | ||
912 | |a GBV_ILN_2006 | ||
912 | |a GBV_ILN_2007 | ||
912 | |a GBV_ILN_2008 | ||
912 | |a GBV_ILN_2009 | ||
912 | |a GBV_ILN_2025 | ||
912 | |a GBV_ILN_2026 | ||
912 | |a GBV_ILN_2034 | ||
912 | |a GBV_ILN_2055 | ||
912 | |a GBV_ILN_2111 | ||
912 | |a GBV_ILN_2190 | ||
912 | |a GBV_ILN_2507 | ||
912 | |a GBV_ILN_4012 | ||
912 | |a GBV_ILN_4035 | ||
912 | |a GBV_ILN_4046 | ||
912 | |a GBV_ILN_4246 | ||
912 | |a GBV_ILN_4249 | ||
912 | |a GBV_ILN_4305 | ||
912 | |a GBV_ILN_4306 | ||
912 | |a GBV_ILN_4313 | ||
912 | |a GBV_ILN_4393 | ||
912 | |a GBV_ILN_4700 | ||
936 | f | i | |0 (DE-627)175613233X |a RC02 |b Vereinigte Staaten |k Nordamerika (ohne Mexiko) |k Vereinigte Staaten |2 fivr |
936 | f | i | |0 (DE-627)175613538X |a SC02 |b Verteidigungs-/Sicherheitspolitik |k Internationale Sicherheit/Verteidigung |k Verteidigungs-/Sicherheitspolitik |2 fivs |
936 | f | i | |0 (DE-627)1756136386 |a SI03.02 |b Informationstechnologie |k Technik |k Technikzweige |k Informationstechnologie |2 fivs |
938 | 1 | 0 | |0 (DE-627)1756241724 |0 (DE-615)6600257 |a Vereinigte Staaten |2 fivt |
938 | 1 | 0 | |0 (DE-627)1756208441 |0 (DE-615)6606080 |a Verteidigungs- und Sicherheitspolitik |2 fivt |
938 | 1 | 0 | |0 (DE-627)1756235201 |0 (DE-615)6604688 |a Informationssicherheit |2 fivt |
938 | 1 | 0 | |0 (DE-627)1756139288 |0 (DE-615)6604295 |a Cyberspace |2 fivt |
938 | 1 | 0 | |0 (DE-627)1756193525 |0 (DE-615)6608795 |a Computerkriminalität |2 fivt |
938 | 1 | 0 | |0 (DE-627)175619145X |0 (DE-615)6609551 |a Cyberterrorismus |2 fivt |
938 | 1 | 0 | |0 (DE-627)1756194688 |0 (DE-615)6602727 |a Informationskriegführung |2 fivt |
938 | 1 | 0 | |0 (DE-627)1756188831 |0 (DE-615)6607834 |a Kritische Infrastrukturen |2 fivt |
938 | 1 | 0 | |0 (DE-627)1756145997 |0 (DE-615)6602987 |a Verwundbarkeit von Zielen |2 fivt |
951 | |a AR | ||
952 | |d 44 |j 2023 |e 3 |h 437-461 | ||
980 | |2 2470 |1 01 |x DE-615 |b 4432809728 |c 00 |f --%%-- |d --%%-- |e --%%-- |j --%%-- |y l01 |z 12-12-23 | ||
980 | |2 2470 |1 02 |x DE-B1567 |b 4435601605 |c 00 |f --%%-- |d --%%-- |e --%%-- |j n |y l02 |z 13-12-23 | ||
998 | |2 2470 |1 01 |x DE-615 |0 2023-12-14 |
author_variant |
m m l mm mml p m pm |
---|---|
matchkey_str |
article:17438764:2023----::akadfo |
hierarchy_sort_str |
2023 |
coordinates_geo2 |
Point ( -098.500000 +039.759999 ) |
publishDate |
2023 |
allfields |
10.1080/13523260.2023.2216112 doi (DE-627)1873188846 (DE-599)KXP1873188846 DE-627 ger DE-627 rda eng RC02 fivr SC02 fivs SI03.02 fivs Leal, Marcelo M. verfasserin (DE-588)1287820859 (DE-627)1844478726 aut Backwards from zero how the U.S. public evaluates the use of zero-day vulnerabilities in cybersecurity Marcelo M. Leal and Paul Musgrave 2023 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier (DE-588)4116489-1 (DE-627)104325224 (DE-576)209502010 Sicherheitspolitik gnd (DE-588)4026899-8 (DE-627)104653795 (DE-576)20896844X Information gnd (DE-588)4054790-5 (DE-627)106161075 (DE-576)209110589 Sicherheit gnd (DE-588)4266146-8 (DE-627)104567120 (DE-576)210634804 Cyberspace gnd (DE-588)1118882725 (DE-627)872358631 (DE-576)479682461 Cyberterrorismus gnd (DE-588)7636249-8 (DE-627)587274115 (DE-576)288551133 Kritische Infrastruktur gnd (DE-588)4129808-1 (DE-627)105707236 (DE-576)209613610 Kriegsziel gnd (DE-588)4260091-1 (DE-627)104643994 (DE-576)210586478 Schutzvorrichtung gnd (DE-588)4078704-7 (DE-627)106076612 (DE-576)209209682 USA gnd Musgrave, Paul verfasserin (DE-588)1166686663 (DE-627)1030551790 (DE-576)510734863 aut Enthalten in Contemporary security policy London : Routledge, Taylor & Francis Group, 1994 44(2023), 3, Seite 437-461 Online-Ressource (DE-627)355394278 (DE-600)2090044-2 (DE-576)109104781 1743-8764 nnns volume:44 year:2023 number:3 pages:437-461 https://doi.org/10.1080/13523260.2023.2216112 Resolving-System lizenzpflichtig GBV_USEFLAG_U GBV_ILN_2470 ISIL_DE-615 ISIL_DE-B1567 SYSFLAG_1 GBV_KXP GBV_ILN_11 GBV_ILN_20 GBV_ILN_60 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_100 GBV_ILN_110 GBV_ILN_151 GBV_ILN_224 GBV_ILN_285 GBV_ILN_370 GBV_ILN_702 GBV_ILN_2001 GBV_ILN_2006 GBV_ILN_2007 GBV_ILN_2008 GBV_ILN_2009 GBV_ILN_2025 GBV_ILN_2026 GBV_ILN_2034 GBV_ILN_2055 GBV_ILN_2111 GBV_ILN_2190 GBV_ILN_2507 GBV_ILN_4012 GBV_ILN_4035 GBV_ILN_4046 GBV_ILN_4246 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4313 GBV_ILN_4393 GBV_ILN_4700 (DE-627)175613233X RC02 Vereinigte Staaten Nordamerika (ohne Mexiko) Vereinigte Staaten fivr (DE-627)175613538X SC02 Verteidigungs-/Sicherheitspolitik Internationale Sicherheit/Verteidigung Verteidigungs-/Sicherheitspolitik fivs (DE-627)1756136386 SI03.02 Informationstechnologie Technik Technikzweige Informationstechnologie fivs (DE-627)1756241724 (DE-615)6600257 Vereinigte Staaten fivt (DE-627)1756208441 (DE-615)6606080 Verteidigungs- und Sicherheitspolitik fivt (DE-627)1756235201 (DE-615)6604688 Informationssicherheit fivt (DE-627)1756139288 (DE-615)6604295 Cyberspace fivt (DE-627)1756193525 (DE-615)6608795 Computerkriminalität fivt (DE-627)175619145X (DE-615)6609551 Cyberterrorismus fivt (DE-627)1756194688 (DE-615)6602727 Informationskriegführung fivt (DE-627)1756188831 (DE-615)6607834 Kritische Infrastrukturen fivt (DE-627)1756145997 (DE-615)6602987 Verwundbarkeit von Zielen fivt AR 44 2023 3 437-461 2470 01 DE-615 4432809728 00 --%%-- --%%-- --%%-- --%%-- l01 12-12-23 2470 02 DE-B1567 4435601605 00 --%%-- --%%-- --%%-- n l02 13-12-23 2470 01 DE-615 2023-12-14 |
spelling |
10.1080/13523260.2023.2216112 doi (DE-627)1873188846 (DE-599)KXP1873188846 DE-627 ger DE-627 rda eng RC02 fivr SC02 fivs SI03.02 fivs Leal, Marcelo M. verfasserin (DE-588)1287820859 (DE-627)1844478726 aut Backwards from zero how the U.S. public evaluates the use of zero-day vulnerabilities in cybersecurity Marcelo M. Leal and Paul Musgrave 2023 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier (DE-588)4116489-1 (DE-627)104325224 (DE-576)209502010 Sicherheitspolitik gnd (DE-588)4026899-8 (DE-627)104653795 (DE-576)20896844X Information gnd (DE-588)4054790-5 (DE-627)106161075 (DE-576)209110589 Sicherheit gnd (DE-588)4266146-8 (DE-627)104567120 (DE-576)210634804 Cyberspace gnd (DE-588)1118882725 (DE-627)872358631 (DE-576)479682461 Cyberterrorismus gnd (DE-588)7636249-8 (DE-627)587274115 (DE-576)288551133 Kritische Infrastruktur gnd (DE-588)4129808-1 (DE-627)105707236 (DE-576)209613610 Kriegsziel gnd (DE-588)4260091-1 (DE-627)104643994 (DE-576)210586478 Schutzvorrichtung gnd (DE-588)4078704-7 (DE-627)106076612 (DE-576)209209682 USA gnd Musgrave, Paul verfasserin (DE-588)1166686663 (DE-627)1030551790 (DE-576)510734863 aut Enthalten in Contemporary security policy London : Routledge, Taylor & Francis Group, 1994 44(2023), 3, Seite 437-461 Online-Ressource (DE-627)355394278 (DE-600)2090044-2 (DE-576)109104781 1743-8764 nnns volume:44 year:2023 number:3 pages:437-461 https://doi.org/10.1080/13523260.2023.2216112 Resolving-System lizenzpflichtig GBV_USEFLAG_U GBV_ILN_2470 ISIL_DE-615 ISIL_DE-B1567 SYSFLAG_1 GBV_KXP GBV_ILN_11 GBV_ILN_20 GBV_ILN_60 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_100 GBV_ILN_110 GBV_ILN_151 GBV_ILN_224 GBV_ILN_285 GBV_ILN_370 GBV_ILN_702 GBV_ILN_2001 GBV_ILN_2006 GBV_ILN_2007 GBV_ILN_2008 GBV_ILN_2009 GBV_ILN_2025 GBV_ILN_2026 GBV_ILN_2034 GBV_ILN_2055 GBV_ILN_2111 GBV_ILN_2190 GBV_ILN_2507 GBV_ILN_4012 GBV_ILN_4035 GBV_ILN_4046 GBV_ILN_4246 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4313 GBV_ILN_4393 GBV_ILN_4700 (DE-627)175613233X RC02 Vereinigte Staaten Nordamerika (ohne Mexiko) Vereinigte Staaten fivr (DE-627)175613538X SC02 Verteidigungs-/Sicherheitspolitik Internationale Sicherheit/Verteidigung Verteidigungs-/Sicherheitspolitik fivs (DE-627)1756136386 SI03.02 Informationstechnologie Technik Technikzweige Informationstechnologie fivs (DE-627)1756241724 (DE-615)6600257 Vereinigte Staaten fivt (DE-627)1756208441 (DE-615)6606080 Verteidigungs- und Sicherheitspolitik fivt (DE-627)1756235201 (DE-615)6604688 Informationssicherheit fivt (DE-627)1756139288 (DE-615)6604295 Cyberspace fivt (DE-627)1756193525 (DE-615)6608795 Computerkriminalität fivt (DE-627)175619145X (DE-615)6609551 Cyberterrorismus fivt (DE-627)1756194688 (DE-615)6602727 Informationskriegführung fivt (DE-627)1756188831 (DE-615)6607834 Kritische Infrastrukturen fivt (DE-627)1756145997 (DE-615)6602987 Verwundbarkeit von Zielen fivt AR 44 2023 3 437-461 2470 01 DE-615 4432809728 00 --%%-- --%%-- --%%-- --%%-- l01 12-12-23 2470 02 DE-B1567 4435601605 00 --%%-- --%%-- --%%-- n l02 13-12-23 2470 01 DE-615 2023-12-14 |
allfields_unstemmed |
10.1080/13523260.2023.2216112 doi (DE-627)1873188846 (DE-599)KXP1873188846 DE-627 ger DE-627 rda eng RC02 fivr SC02 fivs SI03.02 fivs Leal, Marcelo M. verfasserin (DE-588)1287820859 (DE-627)1844478726 aut Backwards from zero how the U.S. public evaluates the use of zero-day vulnerabilities in cybersecurity Marcelo M. Leal and Paul Musgrave 2023 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier (DE-588)4116489-1 (DE-627)104325224 (DE-576)209502010 Sicherheitspolitik gnd (DE-588)4026899-8 (DE-627)104653795 (DE-576)20896844X Information gnd (DE-588)4054790-5 (DE-627)106161075 (DE-576)209110589 Sicherheit gnd (DE-588)4266146-8 (DE-627)104567120 (DE-576)210634804 Cyberspace gnd (DE-588)1118882725 (DE-627)872358631 (DE-576)479682461 Cyberterrorismus gnd (DE-588)7636249-8 (DE-627)587274115 (DE-576)288551133 Kritische Infrastruktur gnd (DE-588)4129808-1 (DE-627)105707236 (DE-576)209613610 Kriegsziel gnd (DE-588)4260091-1 (DE-627)104643994 (DE-576)210586478 Schutzvorrichtung gnd (DE-588)4078704-7 (DE-627)106076612 (DE-576)209209682 USA gnd Musgrave, Paul verfasserin (DE-588)1166686663 (DE-627)1030551790 (DE-576)510734863 aut Enthalten in Contemporary security policy London : Routledge, Taylor & Francis Group, 1994 44(2023), 3, Seite 437-461 Online-Ressource (DE-627)355394278 (DE-600)2090044-2 (DE-576)109104781 1743-8764 nnns volume:44 year:2023 number:3 pages:437-461 https://doi.org/10.1080/13523260.2023.2216112 Resolving-System lizenzpflichtig GBV_USEFLAG_U GBV_ILN_2470 ISIL_DE-615 ISIL_DE-B1567 SYSFLAG_1 GBV_KXP GBV_ILN_11 GBV_ILN_20 GBV_ILN_60 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_100 GBV_ILN_110 GBV_ILN_151 GBV_ILN_224 GBV_ILN_285 GBV_ILN_370 GBV_ILN_702 GBV_ILN_2001 GBV_ILN_2006 GBV_ILN_2007 GBV_ILN_2008 GBV_ILN_2009 GBV_ILN_2025 GBV_ILN_2026 GBV_ILN_2034 GBV_ILN_2055 GBV_ILN_2111 GBV_ILN_2190 GBV_ILN_2507 GBV_ILN_4012 GBV_ILN_4035 GBV_ILN_4046 GBV_ILN_4246 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4313 GBV_ILN_4393 GBV_ILN_4700 (DE-627)175613233X RC02 Vereinigte Staaten Nordamerika (ohne Mexiko) Vereinigte Staaten fivr (DE-627)175613538X SC02 Verteidigungs-/Sicherheitspolitik Internationale Sicherheit/Verteidigung Verteidigungs-/Sicherheitspolitik fivs (DE-627)1756136386 SI03.02 Informationstechnologie Technik Technikzweige Informationstechnologie fivs (DE-627)1756241724 (DE-615)6600257 Vereinigte Staaten fivt (DE-627)1756208441 (DE-615)6606080 Verteidigungs- und Sicherheitspolitik fivt (DE-627)1756235201 (DE-615)6604688 Informationssicherheit fivt (DE-627)1756139288 (DE-615)6604295 Cyberspace fivt (DE-627)1756193525 (DE-615)6608795 Computerkriminalität fivt (DE-627)175619145X (DE-615)6609551 Cyberterrorismus fivt (DE-627)1756194688 (DE-615)6602727 Informationskriegführung fivt (DE-627)1756188831 (DE-615)6607834 Kritische Infrastrukturen fivt (DE-627)1756145997 (DE-615)6602987 Verwundbarkeit von Zielen fivt AR 44 2023 3 437-461 2470 01 DE-615 4432809728 00 --%%-- --%%-- --%%-- --%%-- l01 12-12-23 2470 02 DE-B1567 4435601605 00 --%%-- --%%-- --%%-- n l02 13-12-23 2470 01 DE-615 2023-12-14 |
allfieldsGer |
10.1080/13523260.2023.2216112 doi (DE-627)1873188846 (DE-599)KXP1873188846 DE-627 ger DE-627 rda eng RC02 fivr SC02 fivs SI03.02 fivs Leal, Marcelo M. verfasserin (DE-588)1287820859 (DE-627)1844478726 aut Backwards from zero how the U.S. public evaluates the use of zero-day vulnerabilities in cybersecurity Marcelo M. Leal and Paul Musgrave 2023 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier (DE-588)4116489-1 (DE-627)104325224 (DE-576)209502010 Sicherheitspolitik gnd (DE-588)4026899-8 (DE-627)104653795 (DE-576)20896844X Information gnd (DE-588)4054790-5 (DE-627)106161075 (DE-576)209110589 Sicherheit gnd (DE-588)4266146-8 (DE-627)104567120 (DE-576)210634804 Cyberspace gnd (DE-588)1118882725 (DE-627)872358631 (DE-576)479682461 Cyberterrorismus gnd (DE-588)7636249-8 (DE-627)587274115 (DE-576)288551133 Kritische Infrastruktur gnd (DE-588)4129808-1 (DE-627)105707236 (DE-576)209613610 Kriegsziel gnd (DE-588)4260091-1 (DE-627)104643994 (DE-576)210586478 Schutzvorrichtung gnd (DE-588)4078704-7 (DE-627)106076612 (DE-576)209209682 USA gnd Musgrave, Paul verfasserin (DE-588)1166686663 (DE-627)1030551790 (DE-576)510734863 aut Enthalten in Contemporary security policy London : Routledge, Taylor & Francis Group, 1994 44(2023), 3, Seite 437-461 Online-Ressource (DE-627)355394278 (DE-600)2090044-2 (DE-576)109104781 1743-8764 nnns volume:44 year:2023 number:3 pages:437-461 https://doi.org/10.1080/13523260.2023.2216112 Resolving-System lizenzpflichtig GBV_USEFLAG_U GBV_ILN_2470 ISIL_DE-615 ISIL_DE-B1567 SYSFLAG_1 GBV_KXP GBV_ILN_11 GBV_ILN_20 GBV_ILN_60 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_100 GBV_ILN_110 GBV_ILN_151 GBV_ILN_224 GBV_ILN_285 GBV_ILN_370 GBV_ILN_702 GBV_ILN_2001 GBV_ILN_2006 GBV_ILN_2007 GBV_ILN_2008 GBV_ILN_2009 GBV_ILN_2025 GBV_ILN_2026 GBV_ILN_2034 GBV_ILN_2055 GBV_ILN_2111 GBV_ILN_2190 GBV_ILN_2507 GBV_ILN_4012 GBV_ILN_4035 GBV_ILN_4046 GBV_ILN_4246 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4313 GBV_ILN_4393 GBV_ILN_4700 (DE-627)175613233X RC02 Vereinigte Staaten Nordamerika (ohne Mexiko) Vereinigte Staaten fivr (DE-627)175613538X SC02 Verteidigungs-/Sicherheitspolitik Internationale Sicherheit/Verteidigung Verteidigungs-/Sicherheitspolitik fivs (DE-627)1756136386 SI03.02 Informationstechnologie Technik Technikzweige Informationstechnologie fivs (DE-627)1756241724 (DE-615)6600257 Vereinigte Staaten fivt (DE-627)1756208441 (DE-615)6606080 Verteidigungs- und Sicherheitspolitik fivt (DE-627)1756235201 (DE-615)6604688 Informationssicherheit fivt (DE-627)1756139288 (DE-615)6604295 Cyberspace fivt (DE-627)1756193525 (DE-615)6608795 Computerkriminalität fivt (DE-627)175619145X (DE-615)6609551 Cyberterrorismus fivt (DE-627)1756194688 (DE-615)6602727 Informationskriegführung fivt (DE-627)1756188831 (DE-615)6607834 Kritische Infrastrukturen fivt (DE-627)1756145997 (DE-615)6602987 Verwundbarkeit von Zielen fivt AR 44 2023 3 437-461 2470 01 DE-615 4432809728 00 --%%-- --%%-- --%%-- --%%-- l01 12-12-23 2470 02 DE-B1567 4435601605 00 --%%-- --%%-- --%%-- n l02 13-12-23 2470 01 DE-615 2023-12-14 |
allfieldsSound |
10.1080/13523260.2023.2216112 doi (DE-627)1873188846 (DE-599)KXP1873188846 DE-627 ger DE-627 rda eng RC02 fivr SC02 fivs SI03.02 fivs Leal, Marcelo M. verfasserin (DE-588)1287820859 (DE-627)1844478726 aut Backwards from zero how the U.S. public evaluates the use of zero-day vulnerabilities in cybersecurity Marcelo M. Leal and Paul Musgrave 2023 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier (DE-588)4116489-1 (DE-627)104325224 (DE-576)209502010 Sicherheitspolitik gnd (DE-588)4026899-8 (DE-627)104653795 (DE-576)20896844X Information gnd (DE-588)4054790-5 (DE-627)106161075 (DE-576)209110589 Sicherheit gnd (DE-588)4266146-8 (DE-627)104567120 (DE-576)210634804 Cyberspace gnd (DE-588)1118882725 (DE-627)872358631 (DE-576)479682461 Cyberterrorismus gnd (DE-588)7636249-8 (DE-627)587274115 (DE-576)288551133 Kritische Infrastruktur gnd (DE-588)4129808-1 (DE-627)105707236 (DE-576)209613610 Kriegsziel gnd (DE-588)4260091-1 (DE-627)104643994 (DE-576)210586478 Schutzvorrichtung gnd (DE-588)4078704-7 (DE-627)106076612 (DE-576)209209682 USA gnd Musgrave, Paul verfasserin (DE-588)1166686663 (DE-627)1030551790 (DE-576)510734863 aut Enthalten in Contemporary security policy London : Routledge, Taylor & Francis Group, 1994 44(2023), 3, Seite 437-461 Online-Ressource (DE-627)355394278 (DE-600)2090044-2 (DE-576)109104781 1743-8764 nnns volume:44 year:2023 number:3 pages:437-461 https://doi.org/10.1080/13523260.2023.2216112 Resolving-System lizenzpflichtig GBV_USEFLAG_U GBV_ILN_2470 ISIL_DE-615 ISIL_DE-B1567 SYSFLAG_1 GBV_KXP GBV_ILN_11 GBV_ILN_20 GBV_ILN_60 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_100 GBV_ILN_110 GBV_ILN_151 GBV_ILN_224 GBV_ILN_285 GBV_ILN_370 GBV_ILN_702 GBV_ILN_2001 GBV_ILN_2006 GBV_ILN_2007 GBV_ILN_2008 GBV_ILN_2009 GBV_ILN_2025 GBV_ILN_2026 GBV_ILN_2034 GBV_ILN_2055 GBV_ILN_2111 GBV_ILN_2190 GBV_ILN_2507 GBV_ILN_4012 GBV_ILN_4035 GBV_ILN_4046 GBV_ILN_4246 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4313 GBV_ILN_4393 GBV_ILN_4700 (DE-627)175613233X RC02 Vereinigte Staaten Nordamerika (ohne Mexiko) Vereinigte Staaten fivr (DE-627)175613538X SC02 Verteidigungs-/Sicherheitspolitik Internationale Sicherheit/Verteidigung Verteidigungs-/Sicherheitspolitik fivs (DE-627)1756136386 SI03.02 Informationstechnologie Technik Technikzweige Informationstechnologie fivs (DE-627)1756241724 (DE-615)6600257 Vereinigte Staaten fivt (DE-627)1756208441 (DE-615)6606080 Verteidigungs- und Sicherheitspolitik fivt (DE-627)1756235201 (DE-615)6604688 Informationssicherheit fivt (DE-627)1756139288 (DE-615)6604295 Cyberspace fivt (DE-627)1756193525 (DE-615)6608795 Computerkriminalität fivt (DE-627)175619145X (DE-615)6609551 Cyberterrorismus fivt (DE-627)1756194688 (DE-615)6602727 Informationskriegführung fivt (DE-627)1756188831 (DE-615)6607834 Kritische Infrastrukturen fivt (DE-627)1756145997 (DE-615)6602987 Verwundbarkeit von Zielen fivt AR 44 2023 3 437-461 2470 01 DE-615 4432809728 00 --%%-- --%%-- --%%-- --%%-- l01 12-12-23 2470 02 DE-B1567 4435601605 00 --%%-- --%%-- --%%-- n l02 13-12-23 2470 01 DE-615 2023-12-14 |
language |
English |
source |
Enthalten in Contemporary security policy 44(2023), 3, Seite 437-461 volume:44 year:2023 number:3 pages:437-461 |
sourceStr |
Enthalten in Contemporary security policy 44(2023), 3, Seite 437-461 volume:44 year:2023 number:3 pages:437-461 |
format_phy_str_mv |
Article |
building |
2470:0 |
institution |
findex.gbv.de |
selectbib_iln_str_mv |
2470@01 2470@02 |
topic_facet |
Sicherheitspolitik Information Sicherheit Cyberspace Cyberterrorismus Kritische Infrastruktur Kriegsziel Schutzvorrichtung |
geographic |
(DE-588)4078704-7 (DE-627)106076612 (DE-576)209209682 USA gnd |
isfreeaccess_bool |
false |
container_title |
Contemporary security policy |
authorswithroles_txt_mv |
Leal, Marcelo M. @@aut@@ Musgrave, Paul @@aut@@ |
publishDateDaySort_date |
2023-01-01T00:00:00Z |
hierarchy_top_id |
355394278 |
id |
1873188846 |
language_de |
englisch |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a2200265 4500</leader><controlfield tag="001">1873188846</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20240117084402.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">231212s2023 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1080/13523260.2023.2216112</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)1873188846</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KXP1873188846</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">RC02</subfield><subfield code="2">fivr</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SC02</subfield><subfield code="2">fivs</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SI03.02</subfield><subfield code="2">fivs</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Leal, Marcelo M.</subfield><subfield code="e">verfasserin</subfield><subfield code="0">(DE-588)1287820859</subfield><subfield code="0">(DE-627)1844478726</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Backwards from zero</subfield><subfield code="b">how the U.S. public evaluates the use of zero-day vulnerabilities in cybersecurity</subfield><subfield code="c">Marcelo M. Leal and Paul Musgrave</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2023</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="0">(DE-588)4116489-1</subfield><subfield code="0">(DE-627)104325224</subfield><subfield code="0">(DE-576)209502010</subfield><subfield code="a">Sicherheitspolitik</subfield><subfield code="2">gnd</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="0">(DE-588)4026899-8</subfield><subfield code="0">(DE-627)104653795</subfield><subfield code="0">(DE-576)20896844X</subfield><subfield code="a">Information</subfield><subfield code="2">gnd</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="0">(DE-588)4054790-5</subfield><subfield code="0">(DE-627)106161075</subfield><subfield code="0">(DE-576)209110589</subfield><subfield code="a">Sicherheit</subfield><subfield code="2">gnd</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="0">(DE-588)4266146-8</subfield><subfield code="0">(DE-627)104567120</subfield><subfield code="0">(DE-576)210634804</subfield><subfield code="a">Cyberspace</subfield><subfield code="2">gnd</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="0">(DE-588)1118882725</subfield><subfield code="0">(DE-627)872358631</subfield><subfield code="0">(DE-576)479682461</subfield><subfield code="a">Cyberterrorismus</subfield><subfield code="2">gnd</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="0">(DE-588)7636249-8</subfield><subfield code="0">(DE-627)587274115</subfield><subfield code="0">(DE-576)288551133</subfield><subfield code="a">Kritische Infrastruktur</subfield><subfield code="2">gnd</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="0">(DE-588)4129808-1</subfield><subfield code="0">(DE-627)105707236</subfield><subfield code="0">(DE-576)209613610</subfield><subfield code="a">Kriegsziel</subfield><subfield code="2">gnd</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="0">(DE-588)4260091-1</subfield><subfield code="0">(DE-627)104643994</subfield><subfield code="0">(DE-576)210586478</subfield><subfield code="a">Schutzvorrichtung</subfield><subfield code="2">gnd</subfield></datafield><datafield tag="651" ind1=" " ind2="7"><subfield code="0">(DE-588)4078704-7</subfield><subfield code="0">(DE-627)106076612</subfield><subfield code="0">(DE-576)209209682</subfield><subfield code="a">USA</subfield><subfield code="2">gnd</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Musgrave, Paul</subfield><subfield code="e">verfasserin</subfield><subfield code="0">(DE-588)1166686663</subfield><subfield code="0">(DE-627)1030551790</subfield><subfield code="0">(DE-576)510734863</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">Contemporary security policy</subfield><subfield code="d">London : Routledge, Taylor & Francis Group, 1994</subfield><subfield code="g">44(2023), 3, Seite 437-461</subfield><subfield code="h">Online-Ressource</subfield><subfield code="w">(DE-627)355394278</subfield><subfield code="w">(DE-600)2090044-2</subfield><subfield code="w">(DE-576)109104781</subfield><subfield code="x">1743-8764</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:44</subfield><subfield code="g">year:2023</subfield><subfield code="g">number:3</subfield><subfield code="g">pages:437-461</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1080/13523260.2023.2216112</subfield><subfield code="x">Resolving-System</subfield><subfield code="z">lizenzpflichtig</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_U</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2470</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ISIL_DE-615</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ISIL_DE-B1567</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_1</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_KXP</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_11</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_20</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_60</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_63</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_65</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_69</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_100</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_110</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_151</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_224</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_285</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_370</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_702</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2001</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2006</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2007</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2008</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2009</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2025</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2026</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2034</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2055</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2111</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2190</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2507</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4012</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4035</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4046</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4246</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4249</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4305</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4306</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4313</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4393</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4700</subfield></datafield><datafield tag="936" ind1="f" ind2="i"><subfield code="0">(DE-627)175613233X</subfield><subfield code="a">RC02</subfield><subfield code="b">Vereinigte Staaten</subfield><subfield code="k">Nordamerika (ohne Mexiko)</subfield><subfield code="k">Vereinigte Staaten</subfield><subfield code="2">fivr</subfield></datafield><datafield tag="936" ind1="f" ind2="i"><subfield code="0">(DE-627)175613538X</subfield><subfield code="a">SC02</subfield><subfield code="b">Verteidigungs-/Sicherheitspolitik</subfield><subfield code="k">Internationale Sicherheit/Verteidigung</subfield><subfield code="k">Verteidigungs-/Sicherheitspolitik</subfield><subfield code="2">fivs</subfield></datafield><datafield tag="936" ind1="f" ind2="i"><subfield code="0">(DE-627)1756136386</subfield><subfield code="a">SI03.02</subfield><subfield code="b">Informationstechnologie</subfield><subfield code="k">Technik</subfield><subfield code="k">Technikzweige</subfield><subfield code="k">Informationstechnologie</subfield><subfield code="2">fivs</subfield></datafield><datafield tag="938" ind1="1" ind2="0"><subfield code="0">(DE-627)1756241724</subfield><subfield code="0">(DE-615)6600257</subfield><subfield code="a">Vereinigte Staaten</subfield><subfield code="2">fivt</subfield></datafield><datafield tag="938" ind1="1" ind2="0"><subfield code="0">(DE-627)1756208441</subfield><subfield code="0">(DE-615)6606080</subfield><subfield code="a">Verteidigungs- und Sicherheitspolitik</subfield><subfield code="2">fivt</subfield></datafield><datafield tag="938" ind1="1" ind2="0"><subfield code="0">(DE-627)1756235201</subfield><subfield code="0">(DE-615)6604688</subfield><subfield code="a">Informationssicherheit</subfield><subfield code="2">fivt</subfield></datafield><datafield tag="938" ind1="1" ind2="0"><subfield code="0">(DE-627)1756139288</subfield><subfield code="0">(DE-615)6604295</subfield><subfield code="a">Cyberspace</subfield><subfield code="2">fivt</subfield></datafield><datafield tag="938" ind1="1" ind2="0"><subfield code="0">(DE-627)1756193525</subfield><subfield code="0">(DE-615)6608795</subfield><subfield code="a">Computerkriminalität</subfield><subfield code="2">fivt</subfield></datafield><datafield tag="938" ind1="1" ind2="0"><subfield code="0">(DE-627)175619145X</subfield><subfield code="0">(DE-615)6609551</subfield><subfield code="a">Cyberterrorismus</subfield><subfield code="2">fivt</subfield></datafield><datafield tag="938" ind1="1" ind2="0"><subfield code="0">(DE-627)1756194688</subfield><subfield code="0">(DE-615)6602727</subfield><subfield code="a">Informationskriegführung</subfield><subfield code="2">fivt</subfield></datafield><datafield tag="938" ind1="1" ind2="0"><subfield code="0">(DE-627)1756188831</subfield><subfield code="0">(DE-615)6607834</subfield><subfield code="a">Kritische Infrastrukturen</subfield><subfield code="2">fivt</subfield></datafield><datafield tag="938" ind1="1" ind2="0"><subfield code="0">(DE-627)1756145997</subfield><subfield code="0">(DE-615)6602987</subfield><subfield code="a">Verwundbarkeit von Zielen</subfield><subfield code="2">fivt</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">44</subfield><subfield code="j">2023</subfield><subfield code="e">3</subfield><subfield code="h">437-461</subfield></datafield><datafield tag="980" ind1=" " ind2=" "><subfield code="2">2470</subfield><subfield code="1">01</subfield><subfield code="x">DE-615</subfield><subfield code="b">4432809728</subfield><subfield code="c">00</subfield><subfield code="f">--%%--</subfield><subfield code="d">--%%--</subfield><subfield code="e">--%%--</subfield><subfield code="j">--%%--</subfield><subfield code="y">l01</subfield><subfield code="z">12-12-23</subfield></datafield><datafield tag="980" ind1=" " ind2=" "><subfield code="2">2470</subfield><subfield code="1">02</subfield><subfield code="x">DE-B1567</subfield><subfield code="b">4435601605</subfield><subfield code="c">00</subfield><subfield code="f">--%%--</subfield><subfield code="d">--%%--</subfield><subfield code="e">--%%--</subfield><subfield code="j">n</subfield><subfield code="y">l02</subfield><subfield code="z">13-12-23</subfield></datafield><datafield tag="998" ind1=" " ind2=" "><subfield code="2">2470</subfield><subfield code="1">01</subfield><subfield code="x">DE-615</subfield><subfield code="0">2023-12-14</subfield></datafield></record></collection>
|
standort_str_mv |
--%%-- |
standort_iln_str_mv |
2470:--%%-- DE-615:--%%-- DE-B1567:--%%-- |
author |
Leal, Marcelo M. |
spellingShingle |
Leal, Marcelo M. fivr RC02 fivs SC02 fivs SI03.02 gnd Sicherheitspolitik gnd Information gnd Sicherheit gnd Cyberspace gnd Cyberterrorismus gnd Kritische Infrastruktur gnd Kriegsziel gnd Schutzvorrichtung fivt Vereinigte Staaten fivt Verteidigungs- und Sicherheitspolitik fivt Informationssicherheit fivt Cyberspace fivt Computerkriminalität fivt Cyberterrorismus fivt Informationskriegführung fivt Kritische Infrastrukturen fivt Verwundbarkeit von Zielen Backwards from zero how the U.S. public evaluates the use of zero-day vulnerabilities in cybersecurity |
authorStr |
Leal, Marcelo M. |
ppnlink_with_tag_str_mv |
@@773@@(DE-627)355394278 |
format |
electronic Article |
delete_txt_mv |
keep |
author_role |
aut aut |
typewithnormlink_str_mv |
DifferentiatedPerson@(DE-588)1287820859 Person@(DE-588)1287820859 SubjectHeadingSensoStricto@(DE-588)4116489-1 SubjectHeading@(DE-588)4116489-1 SubjectHeading@(DE-588)4026899-8 SubjectHeadingSensoStricto@(DE-588)4026899-8 SubjectHeadingSensoStricto@(DE-588)4054790-5 SubjectHeading@(DE-588)4054790-5 SubjectHeadingSensoStricto@(DE-588)4266146-8 SubjectHeading@(DE-588)4266146-8 SubjectHeadingSensoStricto@(DE-588)1118882725 SubjectHeading@(DE-588)1118882725 SubjectHeading@(DE-588)7636249-8 SubjectHeadingSensoStricto@(DE-588)7636249-8 SubjectHeadingSensoStricto@(DE-588)4129808-1 SubjectHeading@(DE-588)4129808-1 SubjectHeadingSensoStricto@(DE-588)4260091-1 SubjectHeading@(DE-588)4260091-1 TerritorialCorporateBodyOrAdministrativeUnit@(DE-588)4078704-7 Country@(DE-588)4078704-7 PlaceOrGeographicName@(DE-588)4078704-7 Person@(DE-588)1166686663 DifferentiatedPerson@(DE-588)1166686663 |
collection |
KXP SWB GVK |
remote_str |
true |
last_changed_iln_str_mv |
2470@12-12-23 2470@13-12-23 |
illustrated |
Not Illustrated |
issn |
1743-8764 |
topic_title |
RC02 fivr SC02 fivs SI03.02 fivs Backwards from zero how the U.S. public evaluates the use of zero-day vulnerabilities in cybersecurity Marcelo M. Leal and Paul Musgrave (DE-588)4116489-1 (DE-627)104325224 (DE-576)209502010 Sicherheitspolitik gnd (DE-588)4026899-8 (DE-627)104653795 (DE-576)20896844X Information gnd (DE-588)4054790-5 (DE-627)106161075 (DE-576)209110589 Sicherheit gnd (DE-588)4266146-8 (DE-627)104567120 (DE-576)210634804 Cyberspace gnd (DE-588)1118882725 (DE-627)872358631 (DE-576)479682461 Cyberterrorismus gnd (DE-588)7636249-8 (DE-627)587274115 (DE-576)288551133 Kritische Infrastruktur gnd (DE-588)4129808-1 (DE-627)105707236 (DE-576)209613610 Kriegsziel gnd (DE-588)4260091-1 (DE-627)104643994 (DE-576)210586478 Schutzvorrichtung gnd |
topic |
fivr RC02 fivs SC02 fivs SI03.02 gnd Sicherheitspolitik gnd Information gnd Sicherheit gnd Cyberspace gnd Cyberterrorismus gnd Kritische Infrastruktur gnd Kriegsziel gnd Schutzvorrichtung fivt Vereinigte Staaten fivt Verteidigungs- und Sicherheitspolitik fivt Informationssicherheit fivt Cyberspace fivt Computerkriminalität fivt Cyberterrorismus fivt Informationskriegführung fivt Kritische Infrastrukturen fivt Verwundbarkeit von Zielen |
topic_unstemmed |
fivr RC02 fivs SC02 fivs SI03.02 gnd Sicherheitspolitik gnd Information gnd Sicherheit gnd Cyberspace gnd Cyberterrorismus gnd Kritische Infrastruktur gnd Kriegsziel gnd Schutzvorrichtung fivt Vereinigte Staaten fivt Verteidigungs- und Sicherheitspolitik fivt Informationssicherheit fivt Cyberspace fivt Computerkriminalität fivt Cyberterrorismus fivt Informationskriegführung fivt Kritische Infrastrukturen fivt Verwundbarkeit von Zielen |
topic_browse |
fivr RC02 fivs SC02 fivs SI03.02 gnd Sicherheitspolitik gnd Information gnd Sicherheit gnd Cyberspace gnd Cyberterrorismus gnd Kritische Infrastruktur gnd Kriegsziel gnd Schutzvorrichtung fivt Vereinigte Staaten fivt Verteidigungs- und Sicherheitspolitik fivt Informationssicherheit fivt Cyberspace fivt Computerkriminalität fivt Cyberterrorismus fivt Informationskriegführung fivt Kritische Infrastrukturen fivt Verwundbarkeit von Zielen |
format_facet |
Elektronische Aufsätze Aufsätze Elektronische Ressource |
standort_txtP_mv |
--%%-- |
format_main_str_mv |
Text Zeitschrift/Artikel |
carriertype_str_mv |
cr |
hierarchy_parent_title |
Contemporary security policy |
coordinates_geo |
Point ( -098.500000 +039.759999 ) |
normlinkwithtype_str_mv |
(DE-588)1287820859@DifferentiatedPerson (DE-588)1287820859@Person (DE-588)4116489-1@SubjectHeadingSensoStricto (DE-588)4116489-1@SubjectHeading (DE-588)4026899-8@SubjectHeading (DE-588)4026899-8@SubjectHeadingSensoStricto (DE-588)4054790-5@SubjectHeadingSensoStricto (DE-588)4054790-5@SubjectHeading (DE-588)4266146-8@SubjectHeadingSensoStricto (DE-588)4266146-8@SubjectHeading (DE-588)1118882725@SubjectHeadingSensoStricto (DE-588)1118882725@SubjectHeading (DE-588)7636249-8@SubjectHeading (DE-588)7636249-8@SubjectHeadingSensoStricto (DE-588)4129808-1@SubjectHeadingSensoStricto (DE-588)4129808-1@SubjectHeading (DE-588)4260091-1@SubjectHeadingSensoStricto (DE-588)4260091-1@SubjectHeading (DE-588)4078704-7@TerritorialCorporateBodyOrAdministrativeUnit (DE-588)4078704-7@Country (DE-588)4078704-7@PlaceOrGeographicName (DE-588)1166686663@Person (DE-588)1166686663@DifferentiatedPerson |
hierarchy_parent_id |
355394278 |
signature |
--%%-- |
signature_str_mv |
--%%-- |
hierarchy_top_title |
Contemporary security policy |
isfreeaccess_txt |
false |
familylinks_str_mv |
(DE-627)355394278 (DE-600)2090044-2 (DE-576)109104781 |
normlinkwithrole_str_mv |
(DE-588)1287820859@@aut@@ (DE-588)4116489-1@@650@@ (DE-588)4026899-8@@650@@ (DE-588)4054790-5@@650@@ (DE-588)4266146-8@@650@@ (DE-588)1118882725@@650@@ (DE-588)7636249-8@@650@@ (DE-588)4129808-1@@650@@ (DE-588)4260091-1@@650@@ (DE-588)4078704-7@@651@@ (DE-588)1166686663@@aut@@ |
title |
Backwards from zero how the U.S. public evaluates the use of zero-day vulnerabilities in cybersecurity |
ctrlnum |
(DE-627)1873188846 (DE-599)KXP1873188846 |
geographic_facet |
USA |
title_full |
Backwards from zero how the U.S. public evaluates the use of zero-day vulnerabilities in cybersecurity Marcelo M. Leal and Paul Musgrave |
author_sort |
Leal, Marcelo M. |
journal |
Contemporary security policy |
journalStr |
Contemporary security policy |
callnumber-first-code |
- |
lang_code |
eng |
selektneu_str_mv |
2470@2023-12-14 |
isOA_bool |
false |
recordtype |
marc |
publishDateSort |
2023 |
contenttype_str_mv |
txt |
container_start_page |
437 |
class_local_iln |
fivr:RC02 fivs:SC02 fivs:SI03.02 |
author_browse |
Leal, Marcelo M. Musgrave, Paul |
selectkey |
2470:l |
container_volume |
44 |
class |
RC02 fivr SC02 fivs SI03.02 fivs |
format_se |
Elektronische Aufsätze |
author-letter |
Leal, Marcelo M. |
title_sub |
how the U.S. public evaluates the use of zero-day vulnerabilities in cybersecurity |
doi_str_mv |
10.1080/13523260.2023.2216112 |
normlink |
1287820859 1844478726 4116489-1 104325224 209502010 4026899-8 104653795 20896844X 4054790-5 106161075 209110589 4266146-8 104567120 210634804 1118882725 872358631 479682461 7636249-8 587274115 288551133 4129808-1 105707236 209613610 4260091-1 104643994 210586478 4078704-7 106076612 209209682 1166686663 1030551790 510734863 175613233X 175613538X 1756136386 1756241724 6600257 1756208441 6606080 1756235201 6604688 1756139288 6604295 1756193525 6608795 175619145X 6609551 1756194688 6602727 1756188831 6607834 1756145997 6602987 2023-12-14 |
normlink_prefix_str_mv |
(DE-588)1287820859 (DE-627)1844478726 (DE-588)4116489-1 (DE-627)104325224 (DE-576)209502010 (DE-588)4026899-8 (DE-627)104653795 (DE-576)20896844X (DE-588)4054790-5 (DE-627)106161075 (DE-576)209110589 (DE-588)4266146-8 (DE-627)104567120 (DE-576)210634804 (DE-588)1118882725 (DE-627)872358631 (DE-576)479682461 (DE-588)7636249-8 (DE-627)587274115 (DE-576)288551133 (DE-588)4129808-1 (DE-627)105707236 (DE-576)209613610 (DE-588)4260091-1 (DE-627)104643994 (DE-576)210586478 (DE-588)4078704-7 (DE-627)106076612 (DE-576)209209682 (DE-588)1166686663 (DE-627)1030551790 (DE-576)510734863 (DE-627)175613233X (DE-627)175613538X (DE-627)1756136386 (DE-627)1756241724 (DE-615)6600257 (DE-627)1756208441 (DE-615)6606080 (DE-627)1756235201 (DE-615)6604688 (DE-627)1756139288 (DE-615)6604295 (DE-627)1756193525 (DE-615)6608795 (DE-627)175619145X (DE-615)6609551 (DE-627)1756194688 (DE-615)6602727 (DE-627)1756188831 (DE-615)6607834 (DE-627)1756145997 (DE-615)6602987 2023-12-14 |
author2-role |
verfasserin |
title_sort |
backwards from zerohow the u.s. public evaluates the use of zero-day vulnerabilities in cybersecurity |
title_auth |
Backwards from zero how the U.S. public evaluates the use of zero-day vulnerabilities in cybersecurity |
collection_details |
GBV_USEFLAG_U GBV_ILN_2470 ISIL_DE-615 ISIL_DE-B1567 SYSFLAG_1 GBV_KXP GBV_ILN_11 GBV_ILN_20 GBV_ILN_60 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_100 GBV_ILN_110 GBV_ILN_151 GBV_ILN_224 GBV_ILN_285 GBV_ILN_370 GBV_ILN_702 GBV_ILN_2001 GBV_ILN_2006 GBV_ILN_2007 GBV_ILN_2008 GBV_ILN_2009 GBV_ILN_2025 GBV_ILN_2026 GBV_ILN_2034 GBV_ILN_2055 GBV_ILN_2111 GBV_ILN_2190 GBV_ILN_2507 GBV_ILN_4012 GBV_ILN_4035 GBV_ILN_4046 GBV_ILN_4246 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4313 GBV_ILN_4393 GBV_ILN_4700 |
container_issue |
3 |
title_short |
Backwards from zero |
url |
https://doi.org/10.1080/13523260.2023.2216112 |
ausleihindikator_str_mv |
2470:- |
rolewithnormlink_str_mv |
@@aut@@(DE-588)1287820859 @@650@@(DE-588)4116489-1 @@650@@(DE-588)4026899-8 @@650@@(DE-588)4054790-5 @@650@@(DE-588)4266146-8 @@650@@(DE-588)1118882725 @@650@@(DE-588)7636249-8 @@650@@(DE-588)4129808-1 @@650@@(DE-588)4260091-1 @@651@@(DE-588)4078704-7 @@aut@@(DE-588)1166686663 |
remote_bool |
true |
author2 |
Musgrave, Paul |
author2Str |
Musgrave, Paul |
ppnlink |
355394278 |
GND_str_mv |
Leal, Marcelo Mesquita Mesquita Leal, Marcelo Leal, Marcelo Leal, Marcelo M. Verteidigungspolitik <Sicherheitspolitik> Nationale Sicherheit <Sicherheitspolitik> Äußere Sicherheit <Sicherheitspolitik> Sicherheitspolitik Informationswesen Information Sicherheit Cyberia Cyberspace Cyberterrorismus Critical infrastructure Kritische Infrastruktur Kriegsziele Krieg / Ziel Kriegsziel Schutzvorrichtung Vereinigte Staaten von Nordamerika Hēnōmenai Politeiai tēs Boreiu Amerikēs Nordamerika (USA) Etats-Unis d'Amérique Ēnōmenes Politeies tēs Amerikēs Etats Unis Vereinigte Staaten Amerika (USA) Stany Zjednoczone Ameryki Północnej Hēnōmenes Politeies tēs Amerikēs Meiguo United States of America United States Etats-Unis Estados Unidos de America Soedinennye Štaty Ameriki Vereinigte Staaten von Amerika USA Musgrave, Paul |
GND_txt_mv |
Leal, Marcelo Mesquita Mesquita Leal, Marcelo Leal, Marcelo Leal, Marcelo M. Verteidigungspolitik <Sicherheitspolitik> Nationale Sicherheit <Sicherheitspolitik> Äußere Sicherheit <Sicherheitspolitik> Sicherheitspolitik Informationswesen Information Sicherheit Cyberia Cyberspace Cyberterrorismus Critical infrastructure Kritische Infrastruktur Kriegsziele Krieg / Ziel Kriegsziel Schutzvorrichtung Vereinigte Staaten von Nordamerika Hēnōmenai Politeiai tēs Boreiu Amerikēs Nordamerika (USA) Etats-Unis d'Amérique Ēnōmenes Politeies tēs Amerikēs Etats Unis Vereinigte Staaten Amerika (USA) Stany Zjednoczone Ameryki Północnej Hēnōmenes Politeies tēs Amerikēs Meiguo United States of America United States Etats-Unis Estados Unidos de America Soedinennye Štaty Ameriki Vereinigte Staaten von Amerika USA Musgrave, Paul |
GND_txtF_mv |
Leal, Marcelo Mesquita Mesquita Leal, Marcelo Leal, Marcelo Leal, Marcelo M. Verteidigungspolitik <Sicherheitspolitik> Nationale Sicherheit <Sicherheitspolitik> Äußere Sicherheit <Sicherheitspolitik> Sicherheitspolitik Informationswesen Information Sicherheit Cyberia Cyberspace Cyberterrorismus Critical infrastructure Kritische Infrastruktur Kriegsziele Krieg / Ziel Kriegsziel Schutzvorrichtung Vereinigte Staaten von Nordamerika Hēnōmenai Politeiai tēs Boreiu Amerikēs Nordamerika (USA) Etats-Unis d'Amérique Ēnōmenes Politeies tēs Amerikēs Etats Unis Vereinigte Staaten Amerika (USA) Stany Zjednoczone Ameryki Północnej Hēnōmenes Politeies tēs Amerikēs Meiguo United States of America United States Etats-Unis Estados Unidos de America Soedinennye Štaty Ameriki Vereinigte Staaten von Amerika USA Musgrave, Paul |
mediatype_str_mv |
c |
isOA_txt |
false |
hochschulschrift_bool |
false |
doi_str |
10.1080/13523260.2023.2216112 |
callnumber-a |
--%%-- |
up_date |
2024-07-04T21:35:58.616Z |
_version_ |
1803685942911827969 |
fullrecord_marcxml |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a2200265 4500</leader><controlfield tag="001">1873188846</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20240117084402.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">231212s2023 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1080/13523260.2023.2216112</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)1873188846</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KXP1873188846</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">RC02</subfield><subfield code="2">fivr</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SC02</subfield><subfield code="2">fivs</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SI03.02</subfield><subfield code="2">fivs</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Leal, Marcelo M.</subfield><subfield code="e">verfasserin</subfield><subfield code="0">(DE-588)1287820859</subfield><subfield code="0">(DE-627)1844478726</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Backwards from zero</subfield><subfield code="b">how the U.S. public evaluates the use of zero-day vulnerabilities in cybersecurity</subfield><subfield code="c">Marcelo M. Leal and Paul Musgrave</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2023</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="0">(DE-588)4116489-1</subfield><subfield code="0">(DE-627)104325224</subfield><subfield code="0">(DE-576)209502010</subfield><subfield code="a">Sicherheitspolitik</subfield><subfield code="2">gnd</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="0">(DE-588)4026899-8</subfield><subfield code="0">(DE-627)104653795</subfield><subfield code="0">(DE-576)20896844X</subfield><subfield code="a">Information</subfield><subfield code="2">gnd</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="0">(DE-588)4054790-5</subfield><subfield code="0">(DE-627)106161075</subfield><subfield code="0">(DE-576)209110589</subfield><subfield code="a">Sicherheit</subfield><subfield code="2">gnd</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="0">(DE-588)4266146-8</subfield><subfield code="0">(DE-627)104567120</subfield><subfield code="0">(DE-576)210634804</subfield><subfield code="a">Cyberspace</subfield><subfield code="2">gnd</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="0">(DE-588)1118882725</subfield><subfield code="0">(DE-627)872358631</subfield><subfield code="0">(DE-576)479682461</subfield><subfield code="a">Cyberterrorismus</subfield><subfield code="2">gnd</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="0">(DE-588)7636249-8</subfield><subfield code="0">(DE-627)587274115</subfield><subfield code="0">(DE-576)288551133</subfield><subfield code="a">Kritische Infrastruktur</subfield><subfield code="2">gnd</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="0">(DE-588)4129808-1</subfield><subfield code="0">(DE-627)105707236</subfield><subfield code="0">(DE-576)209613610</subfield><subfield code="a">Kriegsziel</subfield><subfield code="2">gnd</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="0">(DE-588)4260091-1</subfield><subfield code="0">(DE-627)104643994</subfield><subfield code="0">(DE-576)210586478</subfield><subfield code="a">Schutzvorrichtung</subfield><subfield code="2">gnd</subfield></datafield><datafield tag="651" ind1=" " ind2="7"><subfield code="0">(DE-588)4078704-7</subfield><subfield code="0">(DE-627)106076612</subfield><subfield code="0">(DE-576)209209682</subfield><subfield code="a">USA</subfield><subfield code="2">gnd</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Musgrave, Paul</subfield><subfield code="e">verfasserin</subfield><subfield code="0">(DE-588)1166686663</subfield><subfield code="0">(DE-627)1030551790</subfield><subfield code="0">(DE-576)510734863</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">Contemporary security policy</subfield><subfield code="d">London : Routledge, Taylor & Francis Group, 1994</subfield><subfield code="g">44(2023), 3, Seite 437-461</subfield><subfield code="h">Online-Ressource</subfield><subfield code="w">(DE-627)355394278</subfield><subfield code="w">(DE-600)2090044-2</subfield><subfield code="w">(DE-576)109104781</subfield><subfield code="x">1743-8764</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:44</subfield><subfield code="g">year:2023</subfield><subfield code="g">number:3</subfield><subfield code="g">pages:437-461</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1080/13523260.2023.2216112</subfield><subfield code="x">Resolving-System</subfield><subfield code="z">lizenzpflichtig</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_U</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2470</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ISIL_DE-615</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ISIL_DE-B1567</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_1</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_KXP</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_11</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_20</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_60</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_63</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_65</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_69</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_100</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_110</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_151</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_224</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_285</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_370</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_702</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2001</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2006</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2007</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2008</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2009</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2025</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2026</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2034</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2055</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2111</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2190</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2507</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4012</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4035</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4046</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4246</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4249</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4305</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4306</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4313</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4393</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4700</subfield></datafield><datafield tag="936" ind1="f" ind2="i"><subfield code="0">(DE-627)175613233X</subfield><subfield code="a">RC02</subfield><subfield code="b">Vereinigte Staaten</subfield><subfield code="k">Nordamerika (ohne Mexiko)</subfield><subfield code="k">Vereinigte Staaten</subfield><subfield code="2">fivr</subfield></datafield><datafield tag="936" ind1="f" ind2="i"><subfield code="0">(DE-627)175613538X</subfield><subfield code="a">SC02</subfield><subfield code="b">Verteidigungs-/Sicherheitspolitik</subfield><subfield code="k">Internationale Sicherheit/Verteidigung</subfield><subfield code="k">Verteidigungs-/Sicherheitspolitik</subfield><subfield code="2">fivs</subfield></datafield><datafield tag="936" ind1="f" ind2="i"><subfield code="0">(DE-627)1756136386</subfield><subfield code="a">SI03.02</subfield><subfield code="b">Informationstechnologie</subfield><subfield code="k">Technik</subfield><subfield code="k">Technikzweige</subfield><subfield code="k">Informationstechnologie</subfield><subfield code="2">fivs</subfield></datafield><datafield tag="938" ind1="1" ind2="0"><subfield code="0">(DE-627)1756241724</subfield><subfield code="0">(DE-615)6600257</subfield><subfield code="a">Vereinigte Staaten</subfield><subfield code="2">fivt</subfield></datafield><datafield tag="938" ind1="1" ind2="0"><subfield code="0">(DE-627)1756208441</subfield><subfield code="0">(DE-615)6606080</subfield><subfield code="a">Verteidigungs- und Sicherheitspolitik</subfield><subfield code="2">fivt</subfield></datafield><datafield tag="938" ind1="1" ind2="0"><subfield code="0">(DE-627)1756235201</subfield><subfield code="0">(DE-615)6604688</subfield><subfield code="a">Informationssicherheit</subfield><subfield code="2">fivt</subfield></datafield><datafield tag="938" ind1="1" ind2="0"><subfield code="0">(DE-627)1756139288</subfield><subfield code="0">(DE-615)6604295</subfield><subfield code="a">Cyberspace</subfield><subfield code="2">fivt</subfield></datafield><datafield tag="938" ind1="1" ind2="0"><subfield code="0">(DE-627)1756193525</subfield><subfield code="0">(DE-615)6608795</subfield><subfield code="a">Computerkriminalität</subfield><subfield code="2">fivt</subfield></datafield><datafield tag="938" ind1="1" ind2="0"><subfield code="0">(DE-627)175619145X</subfield><subfield code="0">(DE-615)6609551</subfield><subfield code="a">Cyberterrorismus</subfield><subfield code="2">fivt</subfield></datafield><datafield tag="938" ind1="1" ind2="0"><subfield code="0">(DE-627)1756194688</subfield><subfield code="0">(DE-615)6602727</subfield><subfield code="a">Informationskriegführung</subfield><subfield code="2">fivt</subfield></datafield><datafield tag="938" ind1="1" ind2="0"><subfield code="0">(DE-627)1756188831</subfield><subfield code="0">(DE-615)6607834</subfield><subfield code="a">Kritische Infrastrukturen</subfield><subfield code="2">fivt</subfield></datafield><datafield tag="938" ind1="1" ind2="0"><subfield code="0">(DE-627)1756145997</subfield><subfield code="0">(DE-615)6602987</subfield><subfield code="a">Verwundbarkeit von Zielen</subfield><subfield code="2">fivt</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">44</subfield><subfield code="j">2023</subfield><subfield code="e">3</subfield><subfield code="h">437-461</subfield></datafield><datafield tag="980" ind1=" " ind2=" "><subfield code="2">2470</subfield><subfield code="1">01</subfield><subfield code="x">DE-615</subfield><subfield code="b">4432809728</subfield><subfield code="c">00</subfield><subfield code="f">--%%--</subfield><subfield code="d">--%%--</subfield><subfield code="e">--%%--</subfield><subfield code="j">--%%--</subfield><subfield code="y">l01</subfield><subfield code="z">12-12-23</subfield></datafield><datafield tag="980" ind1=" " ind2=" "><subfield code="2">2470</subfield><subfield code="1">02</subfield><subfield code="x">DE-B1567</subfield><subfield code="b">4435601605</subfield><subfield code="c">00</subfield><subfield code="f">--%%--</subfield><subfield code="d">--%%--</subfield><subfield code="e">--%%--</subfield><subfield code="j">n</subfield><subfield code="y">l02</subfield><subfield code="z">13-12-23</subfield></datafield><datafield tag="998" ind1=" " ind2=" "><subfield code="2">2470</subfield><subfield code="1">01</subfield><subfield code="x">DE-615</subfield><subfield code="0">2023-12-14</subfield></datafield></record></collection>
|
score |
7.3976793 |