Skip to content
You are not logged in |Login  
     
Limit search to available items
Book Cover
Bestseller
BestsellerE-Book

Title Cybersecurity of digital service chains : challenges, methodologies, and tools / Joanna Kołodziej, Matteo Repetto, Armend Duzha (eds.).

Publication Info. Cham : Springer, [2022]
©2022

Copies

Location Call No. Status
 University of Saint Joseph: Pope Pius XII Library - Internet  WORLD WIDE WEB E-BOOK Springer    Downloadable
Please click here to access this Springer resource
Description 1 online resource (xi, 257 pages) : illustrations (chiefly color).
Series Lecture notes in computer science, 1611-3349 ; 13300
Lecture notes in computer science ; 13300. 1611-3349
Access Open access GW5XE
Bibliography Includes bibliographical references and author index.
Summary This open access book presents the main scientific results from the H2020 GUARD project. The GUARD project aims at filling the current technological gap between software management paradigms and cybersecurity models, the latter still lacking orchestration and agility to effectively address the dynamicity of the former. This book provides a comprehensive review of the main concepts, architectures, algorithms, and non-technical aspects developed during three years of investigation; the description of the Smart Mobility use case developed at the end of the project gives a practical example of how the GUARD platform and related technologies can be deployed in practical scenarios. We expect the book to be interesting for the broad group of researchers, engineers, and professionals daily experiencing the inadequacy of outdated cybersecurity models for modern computing environments and cyber-physical systems.
Contents A Reference Architecture for Management of Security Operations in Digital Service Chains -- Efficient flow monitoring in digital services -- Intelligent Transportation Systems -- models, challenges, security aspects -- NAD: Machine Learning based Component for Unknown Attack Detection in Network Traffic -- Detecting unknown attacks through system behavior analysis -- Signature-based detection of botnet DDoS attacks -- Automatic Attack Pattern Mining for Generating Actionable CTI Applying Alert Aggregation -- Blockchain-based task and information management in computational cloud systems.
Note Online resource; title from PDF title page (SpringerLink, viewed April 14, 2022).
Local Note Springer Nature Springer Nature Open Access eBooks
Subject Computer security.
Business -- Data processing -- Security measures.
Computer networks -- Security measures.
Computer Security.
Business -- Data processing -- Security measures. (OCoLC)fst00842307
Computer networks -- Security measures. (OCoLC)fst00872341
Computer security. (OCoLC)fst00872484
Genre/Form Electronic books.
Added Author Kołodziej, Joanna, editor.
Repetto, Matteo, editor.
Duzha, Armend, editor.
ISBN 9783031040368 (electronic book)
3031040368 (electronic book)
9783031040351
Standard No. 10.1007/978-3-031-04036-8 doi
-->
Add a Review