Cybersecurity of digital service chains : : challenges, methodologies, and tools / / editors, Joanna Kołodziej, Matteo Repetto, Armend Duzha.
This open access book presents the main scientific results from the H2020 GUARD project. The GUARD project aims at filling the current technological gap between software management paradigms and cybersecurity models, the latter still lacking orchestration and agility to effectively address the dynam...
Saved in:
Superior document: | Lecture notes in computer science v.13300 |
---|---|
TeilnehmendeR: | |
Year of Publication: | 2022 |
Language: | English |
Series: | Lecture Notes in Computer Science
|
Physical Description: | 1 online resource (xi, 257 pages) :; illustrations (chiefly color). |
Notes: | Description based upon print version of record. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
993545159604498 |
---|---|
ctrlnum |
(CKB)5590000000901950 EBL6949311 (AU-PeEL)EBL6949311 (MiAaPQ)EBC6949311 (oapen)https://directory.doabooks.org/handle/20.500.12854/81287 (PPN)262167549 (EXLCZ)995590000000901950 |
collection |
bib_alma |
record_format |
marc |
spelling |
Kołodziej, Joanna edt Cybersecurity of digital service chains : challenges, methodologies, and tools / editors, Joanna Kołodziej, Matteo Repetto, Armend Duzha. Cham : Springer International Publishing AG, 2022. 1 online resource (xi, 257 pages) : illustrations (chiefly color). text txt rdacontent computer c rdamedia online resource cr rdacarrier Lecture notes in computer science v.13300 Description based upon print version of record. A Reference Architecture for Management of Security Operations in Digital Service Chains Efficient flow monitoring in digital services Intelligent Transportation Systems models, challenges, security aspects NAD: Machine Learning based Component for Unknown Attack Detection in Network Traffic Detecting unknown attacks through system behavior analysis Signature-based detection of botnet DDoS attacks Automatic Attack Pattern Mining for Generating Actionable CTI Applying Alert Aggregation Blockchain-based task and information management in computational cloud systems This open access book presents the main scientific results from the H2020 GUARD project. The GUARD project aims at filling the current technological gap between software management paradigms and cybersecurity models, the latter still lacking orchestration and agility to effectively address the dynamicity of the former. This book provides a comprehensive review of the main concepts, architectures, algorithms, and non-technical aspects developed during three years of investigation; the description of the Smart Mobility use case developed at the end of the project gives a practical example of how the GUARD platform and related technologies can be deployed in practical scenarios. We expect the book to be interesting for the broad group of researchers, engineers, and professionals daily experiencing the inadequacy of outdated cybersecurity models for modern computing environments and cyber-physical systems. English Business Data processing Security measures. Computer networks Security measures. cloud computing computer crime computer networks computer security cryptography cyber security data communication systems data flow architectures data management systems data security electromagnetic interference and compatibility general programming languages health informatics intrusion detection network protocols network security network simulations sensors and actuators signal processing telecommunication traffic Kołodziej, Joanna editor. 3-031-04035-X Repetto, Matteo. Duzha, Armend. Lecture Notes in Computer Science |
language |
English |
format |
eBook |
author2 |
Kołodziej, Joanna Repetto, Matteo. Duzha, Armend. |
author_facet |
Kołodziej, Joanna Repetto, Matteo. Duzha, Armend. |
author2_variant |
j k jk j k jk m r mr a d ad |
author2_role |
TeilnehmendeR TeilnehmendeR TeilnehmendeR |
author_sort |
Repetto, Matteo. |
title |
Cybersecurity of digital service chains : challenges, methodologies, and tools / |
spellingShingle |
Cybersecurity of digital service chains : challenges, methodologies, and tools / Lecture notes in computer science A Reference Architecture for Management of Security Operations in Digital Service Chains Efficient flow monitoring in digital services Intelligent Transportation Systems models, challenges, security aspects NAD: Machine Learning based Component for Unknown Attack Detection in Network Traffic Detecting unknown attacks through system behavior analysis Signature-based detection of botnet DDoS attacks Automatic Attack Pattern Mining for Generating Actionable CTI Applying Alert Aggregation Blockchain-based task and information management in computational cloud systems |
title_sub |
challenges, methodologies, and tools / |
title_full |
Cybersecurity of digital service chains : challenges, methodologies, and tools / editors, Joanna Kołodziej, Matteo Repetto, Armend Duzha. |
title_fullStr |
Cybersecurity of digital service chains : challenges, methodologies, and tools / editors, Joanna Kołodziej, Matteo Repetto, Armend Duzha. |
title_full_unstemmed |
Cybersecurity of digital service chains : challenges, methodologies, and tools / editors, Joanna Kołodziej, Matteo Repetto, Armend Duzha. |
title_auth |
Cybersecurity of digital service chains : challenges, methodologies, and tools / |
title_new |
Cybersecurity of digital service chains : |
title_sort |
cybersecurity of digital service chains : challenges, methodologies, and tools / |
series |
Lecture notes in computer science |
series2 |
Lecture notes in computer science |
publisher |
Springer International Publishing AG, |
publishDate |
2022 |
physical |
1 online resource (xi, 257 pages) : illustrations (chiefly color). |
contents |
A Reference Architecture for Management of Security Operations in Digital Service Chains Efficient flow monitoring in digital services Intelligent Transportation Systems models, challenges, security aspects NAD: Machine Learning based Component for Unknown Attack Detection in Network Traffic Detecting unknown attacks through system behavior analysis Signature-based detection of botnet DDoS attacks Automatic Attack Pattern Mining for Generating Actionable CTI Applying Alert Aggregation Blockchain-based task and information management in computational cloud systems |
isbn |
3-031-04036-8 3-031-04035-X |
callnumber-first |
T - Technology |
callnumber-subject |
TK - Electrical and Nuclear Engineering |
callnumber-label |
TK5105 |
callnumber-sort |
TK 45105.5 45105.9 |
illustrated |
Illustrated |
work_keys_str_mv |
AT kołodziejjoanna cybersecurityofdigitalservicechainschallengesmethodologiesandtools AT repettomatteo cybersecurityofdigitalservicechainschallengesmethodologiesandtools AT duzhaarmend cybersecurityofdigitalservicechainschallengesmethodologiesandtools |
status_str |
n |
ids_txt_mv |
(CKB)5590000000901950 EBL6949311 (AU-PeEL)EBL6949311 (MiAaPQ)EBC6949311 (oapen)https://directory.doabooks.org/handle/20.500.12854/81287 (PPN)262167549 (EXLCZ)995590000000901950 |
carrierType_str_mv |
cr |
hierarchy_parent_title |
Lecture notes in computer science v.13300 |
is_hierarchy_title |
Cybersecurity of digital service chains : challenges, methodologies, and tools / |
container_title |
Lecture notes in computer science v.13300 |
author2_original_writing_str_mv |
noLinkedField noLinkedField noLinkedField |
_version_ |
1787548734801838080 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03782nam a22006853u 4500</leader><controlfield tag="001">993545159604498</controlfield><controlfield tag="005">20231110224044.0</controlfield><controlfield tag="006">m d </controlfield><controlfield tag="007">cr#|n|---|||||</controlfield><controlfield tag="008">220617s2022||||sz a o 000|0 eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3-031-04036-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)5590000000901950</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">EBL6949311</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(AU-PeEL)EBL6949311</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)EBC6949311</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(oapen)https://directory.doabooks.org/handle/20.500.12854/81287</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PPN)262167549</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)995590000000901950</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">AU-PeEL</subfield><subfield code="b">eng</subfield><subfield code="c">AU-PeEL</subfield><subfield code="d">AU-PeEL</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK5105.5-5105.9</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Kołodziej, Joanna</subfield><subfield code="4">edt</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cybersecurity of digital service chains :</subfield><subfield code="b">challenges, methodologies, and tools /</subfield><subfield code="c">editors, Joanna Kołodziej, Matteo Repetto, Armend Duzha.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Cham :</subfield><subfield code="b">Springer International Publishing AG,</subfield><subfield code="c">2022.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xi, 257 pages) :</subfield><subfield code="b">illustrations (chiefly color).</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">v.13300</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based upon print version of record.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">A Reference Architecture for Management of Security Operations in Digital Service Chains Efficient flow monitoring in digital services Intelligent Transportation Systems models, challenges, security aspects NAD: Machine Learning based Component for Unknown Attack Detection in Network Traffic Detecting unknown attacks through system behavior analysis Signature-based detection of botnet DDoS attacks Automatic Attack Pattern Mining for Generating Actionable CTI Applying Alert Aggregation Blockchain-based task and information management in computational cloud systems</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This open access book presents the main scientific results from the H2020 GUARD project. The GUARD project aims at filling the current technological gap between software management paradigms and cybersecurity models, the latter still lacking orchestration and agility to effectively address the dynamicity of the former. This book provides a comprehensive review of the main concepts, architectures, algorithms, and non-technical aspects developed during three years of investigation; the description of the Smart Mobility use case developed at the end of the project gives a practical example of how the GUARD platform and related technologies can be deployed in practical scenarios. We expect the book to be interesting for the broad group of researchers, engineers, and professionals daily experiencing the inadequacy of outdated cybersecurity models for modern computing environments and cyber-physical systems.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Business</subfield><subfield code="x">Data processing</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">cloud computing</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">computer crime</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">computer networks</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">computer security</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">cryptography</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">cyber security</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">data communication systems</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">data flow architectures</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">data management systems</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">data security</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">electromagnetic interference and compatibility</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">general programming languages</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">health informatics</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">intrusion detection</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">network protocols</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">network security</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">network simulations</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">sensors and actuators</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">signal processing</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">telecommunication traffic</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kołodziej, Joanna</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">3-031-04035-X</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Repetto, Matteo.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Duzha, Armend.</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture Notes in Computer Science </subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2023-11-11 06:09:53 Europe/Vienna</subfield><subfield code="f">system</subfield><subfield code="c">marc21</subfield><subfield code="a">2022-04-02 22:03:30 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="i">DOAB Directory of Open Access Books</subfield><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&portfolio_pid=5337870400004498&Force_direct=true</subfield><subfield code="Z">5337870400004498</subfield><subfield code="b">Available</subfield><subfield code="8">5337870400004498</subfield></datafield></record></collection> |