Cybersecurity of digital service chains : : challenges, methodologies, and tools / / editors, Joanna Kołodziej, Matteo Repetto, Armend Duzha.
This open access book presents the main scientific results from the H2020 GUARD project. The GUARD project aims at filling the current technological gap between software management paradigms and cybersecurity models, the latter still lacking orchestration and agility to effectively address the dynam...
Saved in:
Superior document: | Lecture notes in computer science v.13300 |
---|---|
TeilnehmendeR: | |
Year of Publication: | 2022 |
Language: | English |
Series: | Lecture Notes in Computer Science
|
Physical Description: | 1 online resource (xi, 257 pages) :; illustrations (chiefly color). |
Notes: | Description based upon print version of record. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
LEADER | 03782nam a22006853u 4500 | ||
---|---|---|---|
001 | 993545159604498 | ||
005 | 20231110224044.0 | ||
006 | m d | ||
007 | cr#|n|---||||| | ||
008 | 220617s2022||||sz a o 000|0 eng d | ||
020 | |a 3-031-04036-8 | ||
035 | |a (CKB)5590000000901950 | ||
035 | |a EBL6949311 | ||
035 | |a (AU-PeEL)EBL6949311 | ||
035 | |a (MiAaPQ)EBC6949311 | ||
035 | |a (oapen)https://directory.doabooks.org/handle/20.500.12854/81287 | ||
035 | |a (PPN)262167549 | ||
035 | |a (EXLCZ)995590000000901950 | ||
040 | |a AU-PeEL |b eng |c AU-PeEL |d AU-PeEL | ||
041 | 0 | |a eng | |
050 | 4 | |a TK5105.5-5105.9 | |
100 | 1 | |a Kołodziej, Joanna |4 edt | |
245 | 1 | 0 | |a Cybersecurity of digital service chains : |b challenges, methodologies, and tools / |c editors, Joanna Kołodziej, Matteo Repetto, Armend Duzha. |
260 | |a Cham : |b Springer International Publishing AG, |c 2022. | ||
300 | |a 1 online resource (xi, 257 pages) : |b illustrations (chiefly color). | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v v.13300 | |
500 | |a Description based upon print version of record. | ||
505 | 0 | |a A Reference Architecture for Management of Security Operations in Digital Service Chains Efficient flow monitoring in digital services Intelligent Transportation Systems models, challenges, security aspects NAD: Machine Learning based Component for Unknown Attack Detection in Network Traffic Detecting unknown attacks through system behavior analysis Signature-based detection of botnet DDoS attacks Automatic Attack Pattern Mining for Generating Actionable CTI Applying Alert Aggregation Blockchain-based task and information management in computational cloud systems | |
520 | |a This open access book presents the main scientific results from the H2020 GUARD project. The GUARD project aims at filling the current technological gap between software management paradigms and cybersecurity models, the latter still lacking orchestration and agility to effectively address the dynamicity of the former. This book provides a comprehensive review of the main concepts, architectures, algorithms, and non-technical aspects developed during three years of investigation; the description of the Smart Mobility use case developed at the end of the project gives a practical example of how the GUARD platform and related technologies can be deployed in practical scenarios. We expect the book to be interesting for the broad group of researchers, engineers, and professionals daily experiencing the inadequacy of outdated cybersecurity models for modern computing environments and cyber-physical systems. | ||
546 | |a English | ||
650 | 0 | |a Business |x Data processing |x Security measures. | |
650 | 0 | |a Computer networks |x Security measures. | |
653 | |a cloud computing | ||
653 | |a computer crime | ||
653 | |a computer networks | ||
653 | |a computer security | ||
653 | |a cryptography | ||
653 | |a cyber security | ||
653 | |a data communication systems | ||
653 | |a data flow architectures | ||
653 | |a data management systems | ||
653 | |a data security | ||
653 | |a electromagnetic interference and compatibility | ||
653 | |a general programming languages | ||
653 | |a health informatics | ||
653 | |a intrusion detection | ||
653 | |a network protocols | ||
653 | |a network security | ||
653 | |a network simulations | ||
653 | |a sensors and actuators | ||
653 | |a signal processing | ||
653 | |a telecommunication traffic | ||
700 | 1 | |a Kołodziej, Joanna |e editor. | |
776 | 1 | |z 3-031-04035-X | |
700 | 1 | |a Repetto, Matteo. | |
700 | 1 | |a Duzha, Armend. | |
830 | 0 | |a Lecture Notes in Computer Science | |
906 | |a BOOK | ||
ADM | |b 2023-11-11 06:09:53 Europe/Vienna |f system |c marc21 |a 2022-04-02 22:03:30 Europe/Vienna |g false | ||
AVE | |i DOAB Directory of Open Access Books |P DOAB Directory of Open Access Books |x https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&portfolio_pid=5337870400004498&Force_direct=true |Z 5337870400004498 |b Available |8 5337870400004498 |