Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Cybersecurity of digital service cha...
~
Kolodziej, Joanna.
Linked to FindBook
Google Book
Amazon
博客來
Cybersecurity of digital service chains = challenges, methodologies, and tools /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Cybersecurity of digital service chains/ edited by Joanna Kolodziej, Matteo Repetto, Armend Duzha.
Reminder of title:
challenges, methodologies, and tools /
other author:
Kolodziej, Joanna.
Published:
Cham :Springer International Publishing : : 2022.,
Description:
xi, 257 p. :ill. (chiefly col.), digital ;24 cm.
[NT 15003449]:
A Reference Architecture for Management of Security Operations in Digital Service Chains -- Efficient flow monitoring in digital services -- Intelligent Transportation Systems -- models, challenges, security aspects -- NAD: Machine Learning based Component for Unknown Attack Detection in Network Traffic -- Detecting unknown attacks through system behavior analysis -- Signature-based detection of botnet DDoS attacks -- Automatic Attack Pattern Mining for Generating Actionable CTI Applying Alert Aggregation -- Blockchain-based task and information management in computational cloud systems.
Contained By:
Springer Nature eBook
Subject:
Computer security. -
Online resource:
https://doi.org/10.1007/978-3-031-04036-8
ISBN:
9783031040368
Cybersecurity of digital service chains = challenges, methodologies, and tools /
Cybersecurity of digital service chains
challenges, methodologies, and tools /[electronic resource] :edited by Joanna Kolodziej, Matteo Repetto, Armend Duzha. - Cham :Springer International Publishing :2022. - xi, 257 p. :ill. (chiefly col.), digital ;24 cm. - Lecture notes in computer science,133000302-9743 ;. - Lecture notes in computer science ;13300..
A Reference Architecture for Management of Security Operations in Digital Service Chains -- Efficient flow monitoring in digital services -- Intelligent Transportation Systems -- models, challenges, security aspects -- NAD: Machine Learning based Component for Unknown Attack Detection in Network Traffic -- Detecting unknown attacks through system behavior analysis -- Signature-based detection of botnet DDoS attacks -- Automatic Attack Pattern Mining for Generating Actionable CTI Applying Alert Aggregation -- Blockchain-based task and information management in computational cloud systems.
Open access.
This open access book presents the main scientific results from the H2020 GUARD project. The GUARD project aims at filling the current technological gap between software management paradigms and cybersecurity models, the latter still lacking orchestration and agility to effectively address the dynamicity of the former. This book provides a comprehensive review of the main concepts, architectures, algorithms, and non-technical aspects developed during three years of investigation; the description of the Smart Mobility use case developed at the end of the project gives a practical example of how the GUARD platform and related technologies can be deployed in practical scenarios. We expect the book to be interesting for the broad group of researchers, engineers, and professionals daily experiencing the inadequacy of outdated cybersecurity models for modern computing environments and cyber-physical systems.
ISBN: 9783031040368
Standard No.: 10.1007/978-3-031-04036-8doiSubjects--Topical Terms:
540555
Computer security.
LC Class. No.: QA76.9.A25 / C93 2022
Dewey Class. No.: 005.8
Cybersecurity of digital service chains = challenges, methodologies, and tools /
LDR
:02663nmm a2200349 a 4500
001
2299946
003
DE-He213
005
20220406151820.0
006
m d
007
cr nn 008maaau
008
230324s2022 sz s 0 eng d
020
$a
9783031040368
$q
(electronic bk.)
020
$a
9783031040351
$q
(paper)
024
7
$a
10.1007/978-3-031-04036-8
$2
doi
035
$a
978-3-031-04036-8
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
C93 2022
072
7
$a
UKN
$2
bicssc
072
7
$a
COM075000
$2
bisacsh
072
7
$a
UKN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
C994 2022
245
0 0
$a
Cybersecurity of digital service chains
$h
[electronic resource] :
$b
challenges, methodologies, and tools /
$c
edited by Joanna Kolodziej, Matteo Repetto, Armend Duzha.
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2022.
300
$a
xi, 257 p. :
$b
ill. (chiefly col.), digital ;
$c
24 cm.
490
1
$a
Lecture notes in computer science,
$x
0302-9743 ;
$v
13300
505
0
$a
A Reference Architecture for Management of Security Operations in Digital Service Chains -- Efficient flow monitoring in digital services -- Intelligent Transportation Systems -- models, challenges, security aspects -- NAD: Machine Learning based Component for Unknown Attack Detection in Network Traffic -- Detecting unknown attacks through system behavior analysis -- Signature-based detection of botnet DDoS attacks -- Automatic Attack Pattern Mining for Generating Actionable CTI Applying Alert Aggregation -- Blockchain-based task and information management in computational cloud systems.
506
$a
Open access.
520
$a
This open access book presents the main scientific results from the H2020 GUARD project. The GUARD project aims at filling the current technological gap between software management paradigms and cybersecurity models, the latter still lacking orchestration and agility to effectively address the dynamicity of the former. This book provides a comprehensive review of the main concepts, architectures, algorithms, and non-technical aspects developed during three years of investigation; the description of the Smart Mobility use case developed at the end of the project gives a practical example of how the GUARD platform and related technologies can be deployed in practical scenarios. We expect the book to be interesting for the broad group of researchers, engineers, and professionals daily experiencing the inadequacy of outdated cybersecurity models for modern computing environments and cyber-physical systems.
650
0
$a
Computer security.
$3
540555
650
0
$a
Business
$x
Data processing
$x
Security measures.
$3
812720
650
0
$a
Computer networks
$x
Security measures.
$3
579161
650
1 4
$a
Computer Communication Networks.
$3
775497
650
2 4
$a
Legal Aspects of Computing.
$3
892641
650
2 4
$a
Data and Information Security.
$3
3538510
650
2 4
$a
Computer and Information Systems Applications.
$3
3538505
700
1
$a
Kolodziej, Joanna.
$3
1619851
700
1
$a
Repetto, Matteo.
$3
3597888
700
1
$a
Duzha, Armend.
$3
3597889
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
Lecture notes in computer science ;
$v
13300.
$3
3597890
856
4 0
$u
https://doi.org/10.1007/978-3-031-04036-8
950
$a
Computer Science (SpringerNature-11645)
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9441838
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25 C93 2022
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login