My Account Log in

1 option

Cybersecurity of Digital Service Chains : Challenges, Methodologies, and Tools / edited by Joanna Kołodziej, Matteo Repetto, Armend Duzha.

SpringerLink Books Computer Science (2011-2024) Available online

SpringerLink Books Computer Science (2011-2024)
Format:
Book
Contributor:
Kołodziej, Joanna, Editor.
Repetto, Matteo, Editor.
Duzha, Armend, Editor.
SpringerLink (Online service)
Series:
Computer Science (SpringerNature-11645)
Lecture notes in computer science 1611-3349 ; 13300
Lecture Notes in Computer Science, 1611-3349 ; 13300
Language:
English
Subjects (All):
Computer networks.
Computers-Law and legislation.
Information technology-Law and legislation.
Data protection.
Application software.
Computer Communication Networks.
Legal Aspects of Computing.
Data and Information Security.
Computer and Information Systems Applications.
Local Subjects:
Computer Communication Networks.
Legal Aspects of Computing.
Data and Information Security.
Computer and Information Systems Applications.
Physical Description:
1 online resource (XI, 257 pages) : 90 illustrations, 71 illustrations in color.
Edition:
1st ed. 2022.
Contained In:
Springer Nature eBook
Place of Publication:
Cham : Springer International Publishing : Imprint: Springer, 2022.
System Details:
text file PDF
Summary:
This open access book presents the main scientific results from the H2020 GUARD project. The GUARD project aims at filling the current technological gap between software management paradigms and cybersecurity models, the latter still lacking orchestration and agility to effectively address the dynamicity of the former. This book provides a comprehensive review of the main concepts, architectures, algorithms, and non-technical aspects developed during three years of investigation; the description of the Smart Mobility use case developed at the end of the project gives a practical example of how the GUARD platform and related technologies can be deployed in practical scenarios. We expect the book to be interesting for the broad group of researchers, engineers, and professionals daily experiencing the inadequacy of outdated cybersecurity models for modern computing environments and cyber-physical systems.
Contents:
A Reference Architecture for Management of Security Operations in Digital Service Chains
Efficient flow monitoring in digital services
Intelligent Transportation Systems
models, challenges, security aspects
NAD: Machine Learning based Component for Unknown Attack Detection in Network Traffic
Detecting unknown attacks through system behavior analysis
Signature-based detection of botnet DDoS attacks
Automatic Attack Pattern Mining for Generating Actionable CTI Applying Alert Aggregation
Blockchain-based task and information management in computational cloud systems.
Other Format:
Printed edition:
ISBN:
978-3-031-04036-8
9783031040368
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account