000 03884nam a22006255i 4500
001 978-3-031-04036-8
003 DE-He213
005 20240423125521.0
007 cr nn 008mamaa
008 220406s2022 sz | s |||| 0|eng d
020 _a9783031040368
_9978-3-031-04036-8
024 7 _a10.1007/978-3-031-04036-8
_2doi
050 4 _aTK5105.5-5105.9
072 7 _aUKN
_2bicssc
072 7 _aCOM043000
_2bisacsh
072 7 _aUKN
_2thema
082 0 4 _a004.6
_223
245 1 0 _aCybersecurity of Digital Service Chains
_h[electronic resource] :
_bChallenges, Methodologies, and Tools /
_cedited by Joanna Kołodziej, Matteo Repetto, Armend Duzha.
250 _a1st ed. 2022.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2022.
300 _aXI, 257 p. 90 illus., 71 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes in Computer Science,
_x1611-3349 ;
_v13300
505 0 _aA Reference Architecture for Management of Security Operations in Digital Service Chains -- Efficient flow monitoring in digital services -- Intelligent Transportation Systems -- models, challenges, security aspects -- NAD: Machine Learning based Component for Unknown Attack Detection in Network Traffic -- Detecting unknown attacks through system behavior analysis -- Signature-based detection of botnet DDoS attacks -- Automatic Attack Pattern Mining for Generating Actionable CTI Applying Alert Aggregation -- Blockchain-based task and information management in computational cloud systems.
506 0 _aOpen Access
520 _aThis open access book presents the main scientific results from the H2020 GUARD project. The GUARD project aims at filling the current technological gap between software management paradigms and cybersecurity models, the latter still lacking orchestration and agility to effectively address the dynamicity of the former. This book provides a comprehensive review of the main concepts, architectures, algorithms, and non-technical aspects developed during three years of investigation; the description of the Smart Mobility use case developed at the end of the project gives a practical example of how the GUARD platform and related technologies can be deployed in practical scenarios. We expect the book to be interesting for the broad group of researchers, engineers, and professionals daily experiencing the inadequacy of outdated cybersecurity models for modern computing environments and cyber-physical systems.
650 0 _aComputer networks .
650 0 _aComputers
_xLaw and legislation.
650 0 _aInformation technology
_xLaw and legislation.
650 0 _aData protection.
650 0 _aApplication software.
650 1 4 _aComputer Communication Networks.
650 2 4 _aLegal Aspects of Computing.
650 2 4 _aData and Information Security.
650 2 4 _aComputer and Information Systems Applications.
700 1 _aKołodziej, Joanna.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aRepetto, Matteo.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aDuzha, Armend.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783031040351
776 0 8 _iPrinted edition:
_z9783031040375
830 0 _aLecture Notes in Computer Science,
_x1611-3349 ;
_v13300
856 4 0 _uhttps://doi.org/10.1007/978-3-031-04036-8
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
912 _aZDB-2-SOB
942 _cSPRINGER
999 _c178807
_d178807