Advanced Topics in Systems Safety and Security
This book presents valuable research results in the challenging field of systems (cyber)security. It is a reprint of the Information (MDPI, Basel) - Special Issue (SI) on Advanced Topics in Systems Safety and Security. The competitive review process of MDPI journals guarantees the quality of the pr...
Saved in:
HerausgeberIn: | |
---|---|
Sonstige: | |
Year of Publication: | 2021 |
Language: | English |
Physical Description: | 1 electronic resource (130 p.) |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
993545411704498 |
---|---|
ctrlnum |
(CKB)5400000000042598 (oapen)https://directory.doabooks.org/handle/20.500.12854/76519 (EXLCZ)995400000000042598 |
collection |
bib_alma |
record_format |
marc |
spelling |
Pricop, Emil edt Advanced Topics in Systems Safety and Security Basel, Switzerland MDPI - Multidisciplinary Digital Publishing Institute 2021 1 electronic resource (130 p.) text txt rdacontent computer c rdamedia online resource cr rdacarrier Open access Unrestricted online access star This book presents valuable research results in the challenging field of systems (cyber)security. It is a reprint of the Information (MDPI, Basel) - Special Issue (SI) on Advanced Topics in Systems Safety and Security. The competitive review process of MDPI journals guarantees the quality of the presented concepts and results. The SI comprises high-quality papers focused on cutting-edge research topics in cybersecurity of computer networks and industrial control systems. The contributions presented in this book are mainly the extended versions of selected papers presented at the 7th and the 8th editions of the International Workshop on Systems Safety and Security—IWSSS. These two editions took place in Romania in 2019 and respectively in 2020. In addition to the selected papers from IWSSS, the special issue includes other valuable and relevant contributions. The papers included in this reprint discuss various subjects ranging from cyberattack or criminal activities detection, evaluation of the attacker skills, modeling of the cyber-attacks, and mobile application security evaluation. Given this diversity of topics and the scientific level of papers, we consider this book a valuable reference for researchers in the security and safety of systems. English Technology: general issues bicssc industrial control safety attack quantification common vulnerability scoring system attack tree distribution automation system Command and Control Citizen Security Center Command and Control Information System (C2IS) crime detection homeland security Android applications multi-threading operational semantics reverse engineering Smali+ cyber attack attacker attacker profile attacker behaviour metrics features attributes intelligent data analysis attack forecasting comparative review alert correlation attack evaluation attacker skill level attack prediction attack projection early-stage detection Bayesian network 3-0365-1623-9 3-0365-1624-7 Stamatescu, Grigore edt Fattahi, Jaouhar edt Pricop, Emil oth Stamatescu, Grigore oth Fattahi, Jaouhar oth |
language |
English |
format |
eBook |
author2 |
Stamatescu, Grigore Fattahi, Jaouhar Pricop, Emil Stamatescu, Grigore Fattahi, Jaouhar |
author_facet |
Stamatescu, Grigore Fattahi, Jaouhar Pricop, Emil Stamatescu, Grigore Fattahi, Jaouhar |
author2_variant |
e p ep g s gs j f jf |
author2_role |
HerausgeberIn HerausgeberIn Sonstige Sonstige Sonstige |
title |
Advanced Topics in Systems Safety and Security |
spellingShingle |
Advanced Topics in Systems Safety and Security |
title_full |
Advanced Topics in Systems Safety and Security |
title_fullStr |
Advanced Topics in Systems Safety and Security |
title_full_unstemmed |
Advanced Topics in Systems Safety and Security |
title_auth |
Advanced Topics in Systems Safety and Security |
title_new |
Advanced Topics in Systems Safety and Security |
title_sort |
advanced topics in systems safety and security |
publisher |
MDPI - Multidisciplinary Digital Publishing Institute |
publishDate |
2021 |
physical |
1 electronic resource (130 p.) |
isbn |
3-0365-1623-9 3-0365-1624-7 |
illustrated |
Not Illustrated |
work_keys_str_mv |
AT pricopemil advancedtopicsinsystemssafetyandsecurity AT stamatescugrigore advancedtopicsinsystemssafetyandsecurity AT fattahijaouhar advancedtopicsinsystemssafetyandsecurity |
status_str |
n |
ids_txt_mv |
(CKB)5400000000042598 (oapen)https://directory.doabooks.org/handle/20.500.12854/76519 (EXLCZ)995400000000042598 |
carrierType_str_mv |
cr |
is_hierarchy_title |
Advanced Topics in Systems Safety and Security |
author2_original_writing_str_mv |
noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField |
_version_ |
1796652272339386369 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03514nam-a2200721z--4500</leader><controlfield tag="001">993545411704498</controlfield><controlfield tag="005">20231214133040.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr|mn|---annan</controlfield><controlfield tag="008">202201s2021 xx |||||o ||| 0|eng d</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)5400000000042598</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(oapen)https://directory.doabooks.org/handle/20.500.12854/76519</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)995400000000042598</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Pricop, Emil</subfield><subfield code="4">edt</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Advanced Topics in Systems Safety and Security</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Basel, Switzerland</subfield><subfield code="b">MDPI - Multidisciplinary Digital Publishing Institute</subfield><subfield code="c">2021</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 electronic resource (130 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="506" ind1=" " ind2=" "><subfield code="a">Open access</subfield><subfield code="f">Unrestricted online access</subfield><subfield code="2">star</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This book presents valuable research results in the challenging field of systems (cyber)security. It is a reprint of the Information (MDPI, Basel) - Special Issue (SI) on Advanced Topics in Systems Safety and Security. The competitive review process of MDPI journals guarantees the quality of the presented concepts and results. The SI comprises high-quality papers focused on cutting-edge research topics in cybersecurity of computer networks and industrial control systems. The contributions presented in this book are mainly the extended versions of selected papers presented at the 7th and the 8th editions of the International Workshop on Systems Safety and Security—IWSSS. These two editions took place in Romania in 2019 and respectively in 2020. In addition to the selected papers from IWSSS, the special issue includes other valuable and relevant contributions. The papers included in this reprint discuss various subjects ranging from cyberattack or criminal activities detection, evaluation of the attacker skills, modeling of the cyber-attacks, and mobile application security evaluation. Given this diversity of topics and the scientific level of papers, we consider this book a valuable reference for researchers in the security and safety of systems.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Technology: general issues</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">industrial control safety</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">attack quantification</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">common vulnerability scoring system</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">attack tree</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">distribution automation system</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Command and Control Citizen Security Center</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Command and Control Information System (C2IS)</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">crime detection</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">homeland security</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Android applications</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">multi-threading</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">operational semantics</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">reverse engineering</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Smali+</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">cyber attack</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">attacker</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">attacker profile</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">attacker behaviour</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">metrics</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">features</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">attributes</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">intelligent data analysis</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">attack forecasting</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">comparative review</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">alert correlation</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">attack evaluation</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">attacker skill level</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">attack prediction</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">attack projection</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">early-stage detection</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Bayesian network</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">3-0365-1623-9</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">3-0365-1624-7</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Stamatescu, Grigore</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Fattahi, Jaouhar</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Pricop, Emil</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Stamatescu, Grigore</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Fattahi, Jaouhar</subfield><subfield code="4">oth</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2023-12-15 05:40:46 Europe/Vienna</subfield><subfield code="f">system</subfield><subfield code="c">marc21</subfield><subfield code="a">2022-04-04 09:22:53 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="i">DOAB Directory of Open Access Books</subfield><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&portfolio_pid=5337896070004498&Force_direct=true</subfield><subfield code="Z">5337896070004498</subfield><subfield code="b">Available</subfield><subfield code="8">5337896070004498</subfield></datafield></record></collection> |