Cyber-Physical Threat Intelligence for Critical Infrastructures Security : : Securing Critical Infrastructures in Air Transport, Water, Gas, Healthcare, Finance and Industry / / John Soldatos, Isabel Praça, Aleksandar Jovanović.

Modern critical infrastructures can be considered as large scale Cyber Physical Systems (CPS). Therefore, when designing, implementing, and operating systems for Critical Infrastructure Protection (CIP), the boundaries between physical security and cybersecurity are blurred. Emerging systems for Cri...

Full description

Saved in:
Bibliographic Details
VerfasserIn:
TeilnehmendeR:
Place / Publishing House:Norwell, Massachusetts : : Now Publishers,, 2021.
Year of Publication:2021
Language:English
Physical Description:1 online resource (626 pages)
Tags: Add Tag
No Tags, Be the first to tag this record!
id 993603184804498
ctrlnum (CKB)5700000000009437
(NjHacI)995700000000009437
(EXLCZ)995700000000009437
collection bib_alma
record_format marc
spelling Soldatos, John, author.
Cyber-Physical Threat Intelligence for Critical Infrastructures Security : Securing Critical Infrastructures in Air Transport, Water, Gas, Healthcare, Finance and Industry / John Soldatos, Isabel Praça, Aleksandar Jovanović.
Cyber-Physical Threat Intelligence for Critical Infrastructures Security
Norwell, Massachusetts : Now Publishers, 2021.
1 online resource (626 pages)
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
Description based on online resource; title from PDF title page (Now Publishers, viewed May 15, 2023).
Modern critical infrastructures can be considered as large scale Cyber Physical Systems (CPS). Therefore, when designing, implementing, and operating systems for Critical Infrastructure Protection (CIP), the boundaries between physical security and cybersecurity are blurred. Emerging systems for Critical Infrastructures Security and Protection must therefore consider integrated approaches that emphasize the interplay between cybersecurity and physical security techniques. Hence, there is a need for a new type of integrated security intelligence i.e., Cyber-Physical Threat Intelligence (CPTI).This book presents novel solutions for integrated Cyber-Physical Threat Intelligence for infrastructures in various sectors, such as Industrial Sites and Plants, Air Transport, Gas, Healthcare, and Finance. The solutions rely on novel methods and technologies, such as integrated modelling for cyber-physical systems, novel reliance indicators, and data driven approaches including BigData analytics and Artificial Intelligence (AI). Some of the presented approaches are sector agnostic i.e., applicable to different sectors with a fair customization effort. Nevertheless, the book presents also peculiar challenges of specific sectors and how they can be addressed. The presented solutions consider the European policy context for Security, Cyber security, and Critical Infrastructure protection, as laid out by the European Commission (EC) to support its Member States to protect and ensure the resilience of their critical infrastructures. Most of the co-authors and contributors are from European Research and Technology Organizations, as well as from European Critical Infrastructure Operators. Hence, the presented solutions respect the European approach to CIP, as reflected in the pillars of the European policy framework. The latter includes for example the Directive on security of network and information systems (NIS Directive), the Directive on protecting European Critical Infrastructures, the General Data Protection Regulation (GDPR), and the Cybersecurity Act Regulation. The sector specific solutions that are described in the book have been developed and validated in the scope of several European Commission (EC) co-funded projects on Critical Infrastructure Protection (CIP), which focus on the listed sectors.Overall, the book illustrates a rich set of systems, technologies, and applications that critical infrastructure operators could consult to shape their future strategies. It also provides a catalogue of CPTI case studies in different sectors, which could be useful for security consultants and practitioners as well.
Part I "Securing Critical Infrastructures of Sensitive Industrial Plants and Sites": *Chapter 1 "InfraStress approach on risk modelling of cascading events with live data for decision support". *Chapter 2 "Cyber-physical adversarial attacks and countermeasures for deep learning vision systems on critical infrastructures".*Chapter 3 "Modelling of interdependencies among and InfraStress approach on risk modelling of cascading events with live data for decision support". *Chapter 4 "Data Visualisation for Situational Awareness in Industrial Critical Infrastructure: an InfraStress Case Study".*Chapter 5 "Critical Infrastructures, SIPS and Threat Intelligence: legal and ethical aspects of security research".Part II "Securing Critical Infrastructures in the Water Sector": *Chapter 6 "Cyber security importance in the water sector and the contribution of the STOP-IT project".*Chapter 7 "Cyber-Physical security for critical water infrastructures at strategic and tactical level". *Chapter 8 "Cyber-physical solutions for real-time detection at operational level". *Chapter 9 "Applying Machine Learning and Deep Learning algorithms for Anomaly Detection in Critical Water Infrastructures".Part III "Securing Critical Infrastructures for Air Transport": *Chapter 10 "Security Challenges for Critical Infrastructures in Air Transport".*Chapter 11 "Toolkit to enhance cyber-physical security of Critical Infrastructures in Air Transport".*Chapter 12 "Security ontologies as technological enabler for blended threat detection and enhanced systems interoperability".Part IV "Securing Critical Infrastructures for Gas": *Chapter 13 "Conceptual Model and CONOPS for Secure and Resilient Gas CI".*Chapter 14 "High-Level Reference Architecture (HLRA) for Gas Infrastructures Protection". *Chapter 15 "The SecureGas Key Performance Indicators for resilient gas critical infrastructures". *Chapter 16 "Communication of Security-related Incident Information to the Authorities and the Population".Part V "Securing Critical Infrastructures of the Healthcare Sector": *Chapter 17 "Security monitoring for medical devices".*Chapter 18 "User Experience models for threat monitoring and security management in healthcare". *Chapter 19 "Attacking and defending healthcare building automation networks".*Chapter 20 "An Intuitive Distributed Cyber Situational Awareness Framework Within a Healthcare Environment".Part VI "Securing Critical Infrastructures in the Finance Sector": *Chapter 21 "The FINSEC Platform: End-to-End Data-Driven Cyber-Physical Threat Intelligence for Critical Infrastructures in Finance". *Chapter 22 "Anomaly detection for critical financial infrastructure protection".Part VII "Critical Infrastructure Protection and Smart Resilience": *Chapter 23 "Indicator-based assessment of resilience of critical infrastructures: From single indicators to comprehensive "smart" assessment".
Cyber intelligence (Computer security)
1-68083-822-9
Jovanović, Aleksandar, author.
Praça, Isabel, author.
language English
format eBook
author Soldatos, John,
Jovanović, Aleksandar,
Praça, Isabel,
spellingShingle Soldatos, John,
Jovanović, Aleksandar,
Praça, Isabel,
Cyber-Physical Threat Intelligence for Critical Infrastructures Security : Securing Critical Infrastructures in Air Transport, Water, Gas, Healthcare, Finance and Industry /
Part I "Securing Critical Infrastructures of Sensitive Industrial Plants and Sites": *Chapter 1 "InfraStress approach on risk modelling of cascading events with live data for decision support". *Chapter 2 "Cyber-physical adversarial attacks and countermeasures for deep learning vision systems on critical infrastructures".*Chapter 3 "Modelling of interdependencies among and InfraStress approach on risk modelling of cascading events with live data for decision support". *Chapter 4 "Data Visualisation for Situational Awareness in Industrial Critical Infrastructure: an InfraStress Case Study".*Chapter 5 "Critical Infrastructures, SIPS and Threat Intelligence: legal and ethical aspects of security research".Part II "Securing Critical Infrastructures in the Water Sector": *Chapter 6 "Cyber security importance in the water sector and the contribution of the STOP-IT project".*Chapter 7 "Cyber-Physical security for critical water infrastructures at strategic and tactical level". *Chapter 8 "Cyber-physical solutions for real-time detection at operational level". *Chapter 9 "Applying Machine Learning and Deep Learning algorithms for Anomaly Detection in Critical Water Infrastructures".Part III "Securing Critical Infrastructures for Air Transport": *Chapter 10 "Security Challenges for Critical Infrastructures in Air Transport".*Chapter 11 "Toolkit to enhance cyber-physical security of Critical Infrastructures in Air Transport".*Chapter 12 "Security ontologies as technological enabler for blended threat detection and enhanced systems interoperability".Part IV "Securing Critical Infrastructures for Gas": *Chapter 13 "Conceptual Model and CONOPS for Secure and Resilient Gas CI".*Chapter 14 "High-Level Reference Architecture (HLRA) for Gas Infrastructures Protection". *Chapter 15 "The SecureGas Key Performance Indicators for resilient gas critical infrastructures". *Chapter 16 "Communication of Security-related Incident Information to the Authorities and the Population".Part V "Securing Critical Infrastructures of the Healthcare Sector": *Chapter 17 "Security monitoring for medical devices".*Chapter 18 "User Experience models for threat monitoring and security management in healthcare". *Chapter 19 "Attacking and defending healthcare building automation networks".*Chapter 20 "An Intuitive Distributed Cyber Situational Awareness Framework Within a Healthcare Environment".Part VI "Securing Critical Infrastructures in the Finance Sector": *Chapter 21 "The FINSEC Platform: End-to-End Data-Driven Cyber-Physical Threat Intelligence for Critical Infrastructures in Finance". *Chapter 22 "Anomaly detection for critical financial infrastructure protection".Part VII "Critical Infrastructure Protection and Smart Resilience": *Chapter 23 "Indicator-based assessment of resilience of critical infrastructures: From single indicators to comprehensive "smart" assessment".
author_facet Soldatos, John,
Jovanović, Aleksandar,
Praça, Isabel,
Jovanović, Aleksandar,
Praça, Isabel,
author_variant j s js
a j aj
i p ip
author_role VerfasserIn
VerfasserIn
VerfasserIn
author2 Jovanović, Aleksandar,
Praça, Isabel,
author2_role TeilnehmendeR
TeilnehmendeR
author_sort Soldatos, John,
title Cyber-Physical Threat Intelligence for Critical Infrastructures Security : Securing Critical Infrastructures in Air Transport, Water, Gas, Healthcare, Finance and Industry /
title_sub Securing Critical Infrastructures in Air Transport, Water, Gas, Healthcare, Finance and Industry /
title_full Cyber-Physical Threat Intelligence for Critical Infrastructures Security : Securing Critical Infrastructures in Air Transport, Water, Gas, Healthcare, Finance and Industry / John Soldatos, Isabel Praça, Aleksandar Jovanović.
title_fullStr Cyber-Physical Threat Intelligence for Critical Infrastructures Security : Securing Critical Infrastructures in Air Transport, Water, Gas, Healthcare, Finance and Industry / John Soldatos, Isabel Praça, Aleksandar Jovanović.
title_full_unstemmed Cyber-Physical Threat Intelligence for Critical Infrastructures Security : Securing Critical Infrastructures in Air Transport, Water, Gas, Healthcare, Finance and Industry / John Soldatos, Isabel Praça, Aleksandar Jovanović.
title_auth Cyber-Physical Threat Intelligence for Critical Infrastructures Security : Securing Critical Infrastructures in Air Transport, Water, Gas, Healthcare, Finance and Industry /
title_alt Cyber-Physical Threat Intelligence for Critical Infrastructures Security
title_new Cyber-Physical Threat Intelligence for Critical Infrastructures Security :
title_sort cyber-physical threat intelligence for critical infrastructures security : securing critical infrastructures in air transport, water, gas, healthcare, finance and industry /
publisher Now Publishers,
publishDate 2021
physical 1 online resource (626 pages)
contents Part I "Securing Critical Infrastructures of Sensitive Industrial Plants and Sites": *Chapter 1 "InfraStress approach on risk modelling of cascading events with live data for decision support". *Chapter 2 "Cyber-physical adversarial attacks and countermeasures for deep learning vision systems on critical infrastructures".*Chapter 3 "Modelling of interdependencies among and InfraStress approach on risk modelling of cascading events with live data for decision support". *Chapter 4 "Data Visualisation for Situational Awareness in Industrial Critical Infrastructure: an InfraStress Case Study".*Chapter 5 "Critical Infrastructures, SIPS and Threat Intelligence: legal and ethical aspects of security research".Part II "Securing Critical Infrastructures in the Water Sector": *Chapter 6 "Cyber security importance in the water sector and the contribution of the STOP-IT project".*Chapter 7 "Cyber-Physical security for critical water infrastructures at strategic and tactical level". *Chapter 8 "Cyber-physical solutions for real-time detection at operational level". *Chapter 9 "Applying Machine Learning and Deep Learning algorithms for Anomaly Detection in Critical Water Infrastructures".Part III "Securing Critical Infrastructures for Air Transport": *Chapter 10 "Security Challenges for Critical Infrastructures in Air Transport".*Chapter 11 "Toolkit to enhance cyber-physical security of Critical Infrastructures in Air Transport".*Chapter 12 "Security ontologies as technological enabler for blended threat detection and enhanced systems interoperability".Part IV "Securing Critical Infrastructures for Gas": *Chapter 13 "Conceptual Model and CONOPS for Secure and Resilient Gas CI".*Chapter 14 "High-Level Reference Architecture (HLRA) for Gas Infrastructures Protection". *Chapter 15 "The SecureGas Key Performance Indicators for resilient gas critical infrastructures". *Chapter 16 "Communication of Security-related Incident Information to the Authorities and the Population".Part V "Securing Critical Infrastructures of the Healthcare Sector": *Chapter 17 "Security monitoring for medical devices".*Chapter 18 "User Experience models for threat monitoring and security management in healthcare". *Chapter 19 "Attacking and defending healthcare building automation networks".*Chapter 20 "An Intuitive Distributed Cyber Situational Awareness Framework Within a Healthcare Environment".Part VI "Securing Critical Infrastructures in the Finance Sector": *Chapter 21 "The FINSEC Platform: End-to-End Data-Driven Cyber-Physical Threat Intelligence for Critical Infrastructures in Finance". *Chapter 22 "Anomaly detection for critical financial infrastructure protection".Part VII "Critical Infrastructure Protection and Smart Resilience": *Chapter 23 "Indicator-based assessment of resilience of critical infrastructures: From single indicators to comprehensive "smart" assessment".
isbn 1-68083-822-9
callnumber-first Q - Science
callnumber-subject QA - Mathematics
callnumber-label QA76
callnumber-sort QA 276 A25 S653 42021
illustrated Not Illustrated
dewey-hundreds 000 - Computer science, information & general works
dewey-tens 000 - Computer science, knowledge & systems
dewey-ones 005 - Computer programming, programs & data
dewey-full 005.8
dewey-sort 15.8
dewey-raw 005.8
dewey-search 005.8
work_keys_str_mv AT soldatosjohn cyberphysicalthreatintelligenceforcriticalinfrastructuressecuritysecuringcriticalinfrastructuresinairtransportwatergashealthcarefinanceandindustry
AT jovanovicaleksandar cyberphysicalthreatintelligenceforcriticalinfrastructuressecuritysecuringcriticalinfrastructuresinairtransportwatergashealthcarefinanceandindustry
AT pracaisabel cyberphysicalthreatintelligenceforcriticalinfrastructuressecuritysecuringcriticalinfrastructuresinairtransportwatergashealthcarefinanceandindustry
AT soldatosjohn cyberphysicalthreatintelligenceforcriticalinfrastructuressecurity
AT jovanovicaleksandar cyberphysicalthreatintelligenceforcriticalinfrastructuressecurity
AT pracaisabel cyberphysicalthreatintelligenceforcriticalinfrastructuressecurity
status_str n
ids_txt_mv (CKB)5700000000009437
(NjHacI)995700000000009437
(EXLCZ)995700000000009437
carrierType_str_mv cr
is_hierarchy_title Cyber-Physical Threat Intelligence for Critical Infrastructures Security : Securing Critical Infrastructures in Air Transport, Water, Gas, Healthcare, Finance and Industry /
author2_original_writing_str_mv noLinkedField
noLinkedField
_version_ 1796653217910620160
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>06747nam a2200313 i 4500</leader><controlfield tag="001">993603184804498</controlfield><controlfield tag="005">20230517081113.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr |||||||||||</controlfield><controlfield tag="008">230517s2021 mau o 000 0 eng d</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)5700000000009437</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(NjHacI)995700000000009437</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)995700000000009437</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">NjHacI</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="c">NjHacl</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.A25</subfield><subfield code="b">.S653 2021</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Soldatos, John,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber-Physical Threat Intelligence for Critical Infrastructures Security :</subfield><subfield code="b">Securing Critical Infrastructures in Air Transport, Water, Gas, Healthcare, Finance and Industry /</subfield><subfield code="c">John Soldatos, Isabel Praça, Aleksandar Jovanović.</subfield></datafield><datafield tag="246" ind1=" " ind2=" "><subfield code="a">Cyber-Physical Threat Intelligence for Critical Infrastructures Security </subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Norwell, Massachusetts :</subfield><subfield code="b">Now Publishers,</subfield><subfield code="c">2021.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (626 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on online resource; title from PDF title page (Now Publishers, viewed May 15, 2023).</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Modern critical infrastructures can be considered as large scale Cyber Physical Systems (CPS). Therefore, when designing, implementing, and operating systems for Critical Infrastructure Protection (CIP), the boundaries between physical security and cybersecurity are blurred. Emerging systems for Critical Infrastructures Security and Protection must therefore consider integrated approaches that emphasize the interplay between cybersecurity and physical security techniques. Hence, there is a need for a new type of integrated security intelligence i.e., Cyber-Physical Threat Intelligence (CPTI).This book presents novel solutions for integrated Cyber-Physical Threat Intelligence for infrastructures in various sectors, such as Industrial Sites and Plants, Air Transport, Gas, Healthcare, and Finance. The solutions rely on novel methods and technologies, such as integrated modelling for cyber-physical systems, novel reliance indicators, and data driven approaches including BigData analytics and Artificial Intelligence (AI). Some of the presented approaches are sector agnostic i.e., applicable to different sectors with a fair customization effort. Nevertheless, the book presents also peculiar challenges of specific sectors and how they can be addressed. The presented solutions consider the European policy context for Security, Cyber security, and Critical Infrastructure protection, as laid out by the European Commission (EC) to support its Member States to protect and ensure the resilience of their critical infrastructures. Most of the co-authors and contributors are from European Research and Technology Organizations, as well as from European Critical Infrastructure Operators. Hence, the presented solutions respect the European approach to CIP, as reflected in the pillars of the European policy framework. The latter includes for example the Directive on security of network and information systems (NIS Directive), the Directive on protecting European Critical Infrastructures, the General Data Protection Regulation (GDPR), and the Cybersecurity Act Regulation. The sector specific solutions that are described in the book have been developed and validated in the scope of several European Commission (EC) co-funded projects on Critical Infrastructure Protection (CIP), which focus on the listed sectors.Overall, the book illustrates a rich set of systems, technologies, and applications that critical infrastructure operators could consult to shape their future strategies. It also provides a catalogue of CPTI case studies in different sectors, which could be useful for security consultants and practitioners as well.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Part I "Securing Critical Infrastructures of Sensitive Industrial Plants and Sites": *Chapter 1 "InfraStress approach on risk modelling of cascading events with live data for decision support". *Chapter 2 "Cyber-physical adversarial attacks and countermeasures for deep learning vision systems on critical infrastructures".*Chapter 3 "Modelling of interdependencies among and InfraStress approach on risk modelling of cascading events with live data for decision support". *Chapter 4 "Data Visualisation for Situational Awareness in Industrial Critical Infrastructure: an InfraStress Case Study".*Chapter 5 "Critical Infrastructures, SIPS and Threat Intelligence: legal and ethical aspects of security research".Part II "Securing Critical Infrastructures in the Water Sector": *Chapter 6 "Cyber security importance in the water sector and the contribution of the STOP-IT project".*Chapter 7 "Cyber-Physical security for critical water infrastructures at strategic and tactical level". *Chapter 8 "Cyber-physical solutions for real-time detection at operational level". *Chapter 9 "Applying Machine Learning and Deep Learning algorithms for Anomaly Detection in Critical Water Infrastructures".Part III "Securing Critical Infrastructures for Air Transport": *Chapter 10 "Security Challenges for Critical Infrastructures in Air Transport".*Chapter 11 "Toolkit to enhance cyber-physical security of Critical Infrastructures in Air Transport".*Chapter 12 "Security ontologies as technological enabler for blended threat detection and enhanced systems interoperability".Part IV "Securing Critical Infrastructures for Gas": *Chapter 13 "Conceptual Model and CONOPS for Secure and Resilient Gas CI".*Chapter 14 "High-Level Reference Architecture (HLRA) for Gas Infrastructures Protection". *Chapter 15 "The SecureGas Key Performance Indicators for resilient gas critical infrastructures". *Chapter 16 "Communication of Security-related Incident Information to the Authorities and the Population".Part V "Securing Critical Infrastructures of the Healthcare Sector": *Chapter 17 "Security monitoring for medical devices".*Chapter 18 "User Experience models for threat monitoring and security management in healthcare". *Chapter 19 "Attacking and defending healthcare building automation networks".*Chapter 20 "An Intuitive Distributed Cyber Situational Awareness Framework Within a Healthcare Environment".Part VI "Securing Critical Infrastructures in the Finance Sector": *Chapter 21 "The FINSEC Platform: End-to-End Data-Driven Cyber-Physical Threat Intelligence for Critical Infrastructures in Finance". *Chapter 22 "Anomaly detection for critical financial infrastructure protection".Part VII "Critical Infrastructure Protection and Smart Resilience": *Chapter 23 "Indicator-based assessment of resilience of critical infrastructures: From single indicators to comprehensive "smart" assessment".</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyber intelligence (Computer security)</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">1-68083-822-9</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Jovanović, Aleksandar,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Praça, Isabel,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2023-06-09 09:23:16 Europe/Vienna</subfield><subfield code="f">System</subfield><subfield code="c">marc21</subfield><subfield code="a">2022-02-12 19:07:41 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="i">DOAB Directory of Open Access Books</subfield><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&amp;portfolio_pid=5337798300004498&amp;Force_direct=true</subfield><subfield code="Z">5337798300004498</subfield><subfield code="b">Available</subfield><subfield code="8">5337798300004498</subfield></datafield></record></collection>