語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Cybersecurity of digital service cha...
~
Kolodziej, Joanna.
FindBook
Google Book
Amazon
博客來
Cybersecurity of digital service chains = challenges, methodologies, and tools /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Cybersecurity of digital service chains/ edited by Joanna Kolodziej, Matteo Repetto, Armend Duzha.
其他題名:
challenges, methodologies, and tools /
其他作者:
Kolodziej, Joanna.
出版者:
Cham :Springer International Publishing : : 2022.,
面頁冊數:
xi, 257 p. :ill. (chiefly col.), digital ;24 cm.
內容註:
A Reference Architecture for Management of Security Operations in Digital Service Chains -- Efficient flow monitoring in digital services -- Intelligent Transportation Systems -- models, challenges, security aspects -- NAD: Machine Learning based Component for Unknown Attack Detection in Network Traffic -- Detecting unknown attacks through system behavior analysis -- Signature-based detection of botnet DDoS attacks -- Automatic Attack Pattern Mining for Generating Actionable CTI Applying Alert Aggregation -- Blockchain-based task and information management in computational cloud systems.
Contained By:
Springer Nature eBook
標題:
Computer security. -
電子資源:
https://doi.org/10.1007/978-3-031-04036-8
ISBN:
9783031040368
Cybersecurity of digital service chains = challenges, methodologies, and tools /
Cybersecurity of digital service chains
challenges, methodologies, and tools /[electronic resource] :edited by Joanna Kolodziej, Matteo Repetto, Armend Duzha. - Cham :Springer International Publishing :2022. - xi, 257 p. :ill. (chiefly col.), digital ;24 cm. - Lecture notes in computer science,133000302-9743 ;. - Lecture notes in computer science ;13300..
A Reference Architecture for Management of Security Operations in Digital Service Chains -- Efficient flow monitoring in digital services -- Intelligent Transportation Systems -- models, challenges, security aspects -- NAD: Machine Learning based Component for Unknown Attack Detection in Network Traffic -- Detecting unknown attacks through system behavior analysis -- Signature-based detection of botnet DDoS attacks -- Automatic Attack Pattern Mining for Generating Actionable CTI Applying Alert Aggregation -- Blockchain-based task and information management in computational cloud systems.
Open access.
This open access book presents the main scientific results from the H2020 GUARD project. The GUARD project aims at filling the current technological gap between software management paradigms and cybersecurity models, the latter still lacking orchestration and agility to effectively address the dynamicity of the former. This book provides a comprehensive review of the main concepts, architectures, algorithms, and non-technical aspects developed during three years of investigation; the description of the Smart Mobility use case developed at the end of the project gives a practical example of how the GUARD platform and related technologies can be deployed in practical scenarios. We expect the book to be interesting for the broad group of researchers, engineers, and professionals daily experiencing the inadequacy of outdated cybersecurity models for modern computing environments and cyber-physical systems.
ISBN: 9783031040368
Standard No.: 10.1007/978-3-031-04036-8doiSubjects--Topical Terms:
540555
Computer security.
LC Class. No.: QA76.9.A25 / C93 2022
Dewey Class. No.: 005.8
Cybersecurity of digital service chains = challenges, methodologies, and tools /
LDR
:02663nmm a2200349 a 4500
001
2299946
003
DE-He213
005
20220406151820.0
006
m d
007
cr nn 008maaau
008
230324s2022 sz s 0 eng d
020
$a
9783031040368
$q
(electronic bk.)
020
$a
9783031040351
$q
(paper)
024
7
$a
10.1007/978-3-031-04036-8
$2
doi
035
$a
978-3-031-04036-8
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
C93 2022
072
7
$a
UKN
$2
bicssc
072
7
$a
COM075000
$2
bisacsh
072
7
$a
UKN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
C994 2022
245
0 0
$a
Cybersecurity of digital service chains
$h
[electronic resource] :
$b
challenges, methodologies, and tools /
$c
edited by Joanna Kolodziej, Matteo Repetto, Armend Duzha.
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2022.
300
$a
xi, 257 p. :
$b
ill. (chiefly col.), digital ;
$c
24 cm.
490
1
$a
Lecture notes in computer science,
$x
0302-9743 ;
$v
13300
505
0
$a
A Reference Architecture for Management of Security Operations in Digital Service Chains -- Efficient flow monitoring in digital services -- Intelligent Transportation Systems -- models, challenges, security aspects -- NAD: Machine Learning based Component for Unknown Attack Detection in Network Traffic -- Detecting unknown attacks through system behavior analysis -- Signature-based detection of botnet DDoS attacks -- Automatic Attack Pattern Mining for Generating Actionable CTI Applying Alert Aggregation -- Blockchain-based task and information management in computational cloud systems.
506
$a
Open access.
520
$a
This open access book presents the main scientific results from the H2020 GUARD project. The GUARD project aims at filling the current technological gap between software management paradigms and cybersecurity models, the latter still lacking orchestration and agility to effectively address the dynamicity of the former. This book provides a comprehensive review of the main concepts, architectures, algorithms, and non-technical aspects developed during three years of investigation; the description of the Smart Mobility use case developed at the end of the project gives a practical example of how the GUARD platform and related technologies can be deployed in practical scenarios. We expect the book to be interesting for the broad group of researchers, engineers, and professionals daily experiencing the inadequacy of outdated cybersecurity models for modern computing environments and cyber-physical systems.
650
0
$a
Computer security.
$3
540555
650
0
$a
Business
$x
Data processing
$x
Security measures.
$3
812720
650
0
$a
Computer networks
$x
Security measures.
$3
579161
650
1 4
$a
Computer Communication Networks.
$3
775497
650
2 4
$a
Legal Aspects of Computing.
$3
892641
650
2 4
$a
Data and Information Security.
$3
3538510
650
2 4
$a
Computer and Information Systems Applications.
$3
3538505
700
1
$a
Kolodziej, Joanna.
$3
1619851
700
1
$a
Repetto, Matteo.
$3
3597888
700
1
$a
Duzha, Armend.
$3
3597889
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
Lecture notes in computer science ;
$v
13300.
$3
3597890
856
4 0
$u
https://doi.org/10.1007/978-3-031-04036-8
950
$a
Computer Science (SpringerNature-11645)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9441838
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25 C93 2022
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入