000 | 03884nam a22006255i 4500 | ||
---|---|---|---|
001 | 978-3-031-04036-8 | ||
003 | DE-He213 | ||
005 | 20240423125521.0 | ||
007 | cr nn 008mamaa | ||
008 | 220406s2022 sz | s |||| 0|eng d | ||
020 |
_a9783031040368 _9978-3-031-04036-8 |
||
024 | 7 |
_a10.1007/978-3-031-04036-8 _2doi |
|
050 | 4 | _aTK5105.5-5105.9 | |
072 | 7 |
_aUKN _2bicssc |
|
072 | 7 |
_aCOM043000 _2bisacsh |
|
072 | 7 |
_aUKN _2thema |
|
082 | 0 | 4 |
_a004.6 _223 |
245 | 1 | 0 |
_aCybersecurity of Digital Service Chains _h[electronic resource] : _bChallenges, Methodologies, and Tools / _cedited by Joanna Kołodziej, Matteo Repetto, Armend Duzha. |
250 | _a1st ed. 2022. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2022. |
|
300 |
_aXI, 257 p. 90 illus., 71 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v13300 |
|
505 | 0 | _aA Reference Architecture for Management of Security Operations in Digital Service Chains -- Efficient flow monitoring in digital services -- Intelligent Transportation Systems -- models, challenges, security aspects -- NAD: Machine Learning based Component for Unknown Attack Detection in Network Traffic -- Detecting unknown attacks through system behavior analysis -- Signature-based detection of botnet DDoS attacks -- Automatic Attack Pattern Mining for Generating Actionable CTI Applying Alert Aggregation -- Blockchain-based task and information management in computational cloud systems. | |
506 | 0 | _aOpen Access | |
520 | _aThis open access book presents the main scientific results from the H2020 GUARD project. The GUARD project aims at filling the current technological gap between software management paradigms and cybersecurity models, the latter still lacking orchestration and agility to effectively address the dynamicity of the former. This book provides a comprehensive review of the main concepts, architectures, algorithms, and non-technical aspects developed during three years of investigation; the description of the Smart Mobility use case developed at the end of the project gives a practical example of how the GUARD platform and related technologies can be deployed in practical scenarios. We expect the book to be interesting for the broad group of researchers, engineers, and professionals daily experiencing the inadequacy of outdated cybersecurity models for modern computing environments and cyber-physical systems. | ||
650 | 0 | _aComputer networks . | |
650 | 0 |
_aComputers _xLaw and legislation. |
|
650 | 0 |
_aInformation technology _xLaw and legislation. |
|
650 | 0 | _aData protection. | |
650 | 0 | _aApplication software. | |
650 | 1 | 4 | _aComputer Communication Networks. |
650 | 2 | 4 | _aLegal Aspects of Computing. |
650 | 2 | 4 | _aData and Information Security. |
650 | 2 | 4 | _aComputer and Information Systems Applications. |
700 | 1 |
_aKołodziej, Joanna. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aRepetto, Matteo. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aDuzha, Armend. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783031040351 |
776 | 0 | 8 |
_iPrinted edition: _z9783031040375 |
830 | 0 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v13300 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-031-04036-8 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
912 | _aZDB-2-SOB | ||
942 | _cSPRINGER | ||
999 |
_c178807 _d178807 |