Cybersecurity of digital service chains : : challenges, methodologies, and tools / / editors, Joanna Kołodziej, Matteo Repetto, Armend Duzha.

This open access book presents the main scientific results from the H2020 GUARD project. The GUARD project aims at filling the current technological gap between software management paradigms and cybersecurity models, the latter still lacking orchestration and agility to effectively address the dynam...

Full description

Saved in:
Bibliographic Details
Superior document:Lecture notes in computer science v.13300
TeilnehmendeR:
Year of Publication:2022
Language:English
Series:Lecture Notes in Computer Science
Physical Description:1 online resource (xi, 257 pages) :; illustrations (chiefly color).
Notes:Description based upon print version of record.
Tags: Add Tag
No Tags, Be the first to tag this record!
id 993545159604498
ctrlnum (CKB)5590000000901950
EBL6949311
(AU-PeEL)EBL6949311
(MiAaPQ)EBC6949311
(oapen)https://directory.doabooks.org/handle/20.500.12854/81287
(PPN)262167549
(EXLCZ)995590000000901950
collection bib_alma
record_format marc
spelling Kołodziej, Joanna edt
Cybersecurity of digital service chains : challenges, methodologies, and tools / editors, Joanna Kołodziej, Matteo Repetto, Armend Duzha.
Cham : Springer International Publishing AG, 2022.
1 online resource (xi, 257 pages) : illustrations (chiefly color).
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
Lecture notes in computer science v.13300
Description based upon print version of record.
A Reference Architecture for Management of Security Operations in Digital Service Chains Efficient flow monitoring in digital services Intelligent Transportation Systems models, challenges, security aspects NAD: Machine Learning based Component for Unknown Attack Detection in Network Traffic Detecting unknown attacks through system behavior analysis Signature-based detection of botnet DDoS attacks Automatic Attack Pattern Mining for Generating Actionable CTI Applying Alert Aggregation Blockchain-based task and information management in computational cloud systems
This open access book presents the main scientific results from the H2020 GUARD project. The GUARD project aims at filling the current technological gap between software management paradigms and cybersecurity models, the latter still lacking orchestration and agility to effectively address the dynamicity of the former. This book provides a comprehensive review of the main concepts, architectures, algorithms, and non-technical aspects developed during three years of investigation; the description of the Smart Mobility use case developed at the end of the project gives a practical example of how the GUARD platform and related technologies can be deployed in practical scenarios. We expect the book to be interesting for the broad group of researchers, engineers, and professionals daily experiencing the inadequacy of outdated cybersecurity models for modern computing environments and cyber-physical systems.
English
Business Data processing Security measures.
Computer networks Security measures.
cloud computing
computer crime
computer networks
computer security
cryptography
cyber security
data communication systems
data flow architectures
data management systems
data security
electromagnetic interference and compatibility
general programming languages
health informatics
intrusion detection
network protocols
network security
network simulations
sensors and actuators
signal processing
telecommunication traffic
Kołodziej, Joanna editor.
3-031-04035-X
Repetto, Matteo.
Duzha, Armend.
Lecture Notes in Computer Science
language English
format eBook
author2 Kołodziej, Joanna
Repetto, Matteo.
Duzha, Armend.
author_facet Kołodziej, Joanna
Repetto, Matteo.
Duzha, Armend.
author2_variant j k jk
j k jk
m r mr
a d ad
author2_role TeilnehmendeR
TeilnehmendeR
TeilnehmendeR
author_sort Repetto, Matteo.
title Cybersecurity of digital service chains : challenges, methodologies, and tools /
spellingShingle Cybersecurity of digital service chains : challenges, methodologies, and tools /
Lecture notes in computer science
A Reference Architecture for Management of Security Operations in Digital Service Chains Efficient flow monitoring in digital services Intelligent Transportation Systems models, challenges, security aspects NAD: Machine Learning based Component for Unknown Attack Detection in Network Traffic Detecting unknown attacks through system behavior analysis Signature-based detection of botnet DDoS attacks Automatic Attack Pattern Mining for Generating Actionable CTI Applying Alert Aggregation Blockchain-based task and information management in computational cloud systems
title_sub challenges, methodologies, and tools /
title_full Cybersecurity of digital service chains : challenges, methodologies, and tools / editors, Joanna Kołodziej, Matteo Repetto, Armend Duzha.
title_fullStr Cybersecurity of digital service chains : challenges, methodologies, and tools / editors, Joanna Kołodziej, Matteo Repetto, Armend Duzha.
title_full_unstemmed Cybersecurity of digital service chains : challenges, methodologies, and tools / editors, Joanna Kołodziej, Matteo Repetto, Armend Duzha.
title_auth Cybersecurity of digital service chains : challenges, methodologies, and tools /
title_new Cybersecurity of digital service chains :
title_sort cybersecurity of digital service chains : challenges, methodologies, and tools /
series Lecture notes in computer science
series2 Lecture notes in computer science
publisher Springer International Publishing AG,
publishDate 2022
physical 1 online resource (xi, 257 pages) : illustrations (chiefly color).
contents A Reference Architecture for Management of Security Operations in Digital Service Chains Efficient flow monitoring in digital services Intelligent Transportation Systems models, challenges, security aspects NAD: Machine Learning based Component for Unknown Attack Detection in Network Traffic Detecting unknown attacks through system behavior analysis Signature-based detection of botnet DDoS attacks Automatic Attack Pattern Mining for Generating Actionable CTI Applying Alert Aggregation Blockchain-based task and information management in computational cloud systems
isbn 3-031-04036-8
3-031-04035-X
callnumber-first T - Technology
callnumber-subject TK - Electrical and Nuclear Engineering
callnumber-label TK5105
callnumber-sort TK 45105.5 45105.9
illustrated Illustrated
work_keys_str_mv AT kołodziejjoanna cybersecurityofdigitalservicechainschallengesmethodologiesandtools
AT repettomatteo cybersecurityofdigitalservicechainschallengesmethodologiesandtools
AT duzhaarmend cybersecurityofdigitalservicechainschallengesmethodologiesandtools
status_str n
ids_txt_mv (CKB)5590000000901950
EBL6949311
(AU-PeEL)EBL6949311
(MiAaPQ)EBC6949311
(oapen)https://directory.doabooks.org/handle/20.500.12854/81287
(PPN)262167549
(EXLCZ)995590000000901950
carrierType_str_mv cr
hierarchy_parent_title Lecture notes in computer science v.13300
is_hierarchy_title Cybersecurity of digital service chains : challenges, methodologies, and tools /
container_title Lecture notes in computer science v.13300
author2_original_writing_str_mv noLinkedField
noLinkedField
noLinkedField
_version_ 1787548734801838080
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03782nam a22006853u 4500</leader><controlfield tag="001">993545159604498</controlfield><controlfield tag="005">20231110224044.0</controlfield><controlfield tag="006">m d </controlfield><controlfield tag="007">cr#|n|---|||||</controlfield><controlfield tag="008">220617s2022||||sz a o 000|0 eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3-031-04036-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)5590000000901950</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">EBL6949311</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(AU-PeEL)EBL6949311</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)EBC6949311</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(oapen)https://directory.doabooks.org/handle/20.500.12854/81287</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PPN)262167549</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)995590000000901950</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">AU-PeEL</subfield><subfield code="b">eng</subfield><subfield code="c">AU-PeEL</subfield><subfield code="d">AU-PeEL</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK5105.5-5105.9</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Kołodziej, Joanna</subfield><subfield code="4">edt</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cybersecurity of digital service chains :</subfield><subfield code="b">challenges, methodologies, and tools /</subfield><subfield code="c">editors, Joanna Kołodziej, Matteo Repetto, Armend Duzha.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Cham :</subfield><subfield code="b">Springer International Publishing AG,</subfield><subfield code="c">2022.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xi, 257 pages) :</subfield><subfield code="b">illustrations (chiefly color).</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">v.13300</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based upon print version of record.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">A Reference Architecture for Management of Security Operations in Digital Service Chains Efficient flow monitoring in digital services Intelligent Transportation Systems models, challenges, security aspects NAD: Machine Learning based Component for Unknown Attack Detection in Network Traffic Detecting unknown attacks through system behavior analysis Signature-based detection of botnet DDoS attacks Automatic Attack Pattern Mining for Generating Actionable CTI Applying Alert Aggregation Blockchain-based task and information management in computational cloud systems</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This open access book presents the main scientific results from the H2020 GUARD project. The GUARD project aims at filling the current technological gap between software management paradigms and cybersecurity models, the latter still lacking orchestration and agility to effectively address the dynamicity of the former. This book provides a comprehensive review of the main concepts, architectures, algorithms, and non-technical aspects developed during three years of investigation; the description of the Smart Mobility use case developed at the end of the project gives a practical example of how the GUARD platform and related technologies can be deployed in practical scenarios. We expect the book to be interesting for the broad group of researchers, engineers, and professionals daily experiencing the inadequacy of outdated cybersecurity models for modern computing environments and cyber-physical systems.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Business</subfield><subfield code="x">Data processing</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">cloud computing</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">computer crime</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">computer networks</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">computer security</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">cryptography</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">cyber security</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">data communication systems</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">data flow architectures</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">data management systems</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">data security</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">electromagnetic interference and compatibility</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">general programming languages</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">health informatics</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">intrusion detection</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">network protocols</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">network security</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">network simulations</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">sensors and actuators</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">signal processing</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">telecommunication traffic</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kołodziej, Joanna</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">3-031-04035-X</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Repetto, Matteo.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Duzha, Armend.</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture Notes in Computer Science </subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2023-11-11 06:09:53 Europe/Vienna</subfield><subfield code="f">system</subfield><subfield code="c">marc21</subfield><subfield code="a">2022-04-02 22:03:30 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="i">DOAB Directory of Open Access Books</subfield><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&amp;portfolio_pid=5337870400004498&amp;Force_direct=true</subfield><subfield code="Z">5337870400004498</subfield><subfield code="b">Available</subfield><subfield code="8">5337870400004498</subfield></datafield></record></collection>