1.

Record Nr.

UNINA9910712594003321

Titolo

Development of a flood-inundation map library and precipitation-runoff modeling for the Clear Fork Mohican River in and near Bellville, Ohio

Pubbl/distr/stampa

U.S. Department of the Interior, U.S. Geological Survey

Reston, Virginia

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

2.

Record Nr.

UNINA9910710498303321

Autore

Convegno internazionale di studi italo-tedeschi : 12. : <1972

Titolo

L'influenza del Rinascimento italiano nella cultura di lingua tedesca e in rapporto al mondo culturale europeo : atti del 12. Convegno internazionale di studi italo-tedeschi, Merano, 12-17 ottobre 1972

Pubbl/distr/stampa

[S. l., : s. n., 1972?] ( (Merano) : Hauger

Descrizione fisica

XIII, 234 p. ; 24 cm

Collana

Atti dell'Istituto culturale italo tedesco ; 12

Disciplina

940

Locazione

FLFBC

Collocazione

301 DIKM ATTI 12

Lingua di pubblicazione

Italiano

Tedesco

Formato

Materiale a stampa

Livello bibliografico

Monografia



3.

Record Nr.

UNISALENTO991004283938007536

Autore

Furetière, Antoine

Titolo

Dictionaire universel, contenant generalement tous les mots françois tant vieux que modernes, et les termes de toutes les sciences & des arts; ... Recueilli & compilé par seu messire Antoine Furetiere, ...Tome premiere [-second]

Pubbl/distr/stampa

A La Haye et a Rotterdam : chez Arnout et Reinier Leers, 1691

Edizione

[Seconde edition, revue, corrigée & augmentée]

Descrizione fisica

2 v. ;$c2º

Altri autori (Enti)

Leers, Arnout (2.) & Leers, Reinier

Lingua di pubblicazione

Francese (ca. 1400-1600)

Francese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

L'indicazione di edizione precede l'indicazione numerica del volume

Marca (figura femminile: Tenet meliora) sui front



4.

Record Nr.

UNINA9910815855003321

Autore

Rendu Victor

Titolo

Ampélographie française / / Victor Rendu

Pubbl/distr/stampa

[Place of publication not identified] : , : Ligaran, , [2015]

©2015

ISBN

2-335-16775-8

Descrizione fisica

1 online resource (317 p.)

Collana

Livre numérique

Disciplina

634.80944

Soggetti

Viticulture - France

Lingua di pubblicazione

Francese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Description based upon print version of record.

Nota di contenuto

Page de titre; Préface; Considérations générales sur la vigne; Division viticole de la France; Région du sud; Vins de corse; Vins du Roussillon; Vignoble de Banyuls-Sur-Mer; Vignoble de Perpignan; Vins du Languedoc; Crus distingués du département de L'Aude; Crus remarquables du département du Gard; Vignoble de Saint-Gilles; Vin de Tokai-Princesse; Crus remarquables de l'Hérault; Vignoble de Saint-Georges-d'Orques; Vins de Picardan; Vins muscats; Vignoble de Frontignan; Vignoble de Lunel; Muscats de Maraussan et d'Espagnac; Fabrication des trois-six et des eaux-de-vie de Montpellier

Vins de ProvenceVignoble de la Gaude; Vignoble de la Malgue; Vins de Bandol; Vignoble des Mées; Vignoble de Cassis; Vins de Saint-Louis, Séon-Saint-André et Séon-Saint-Henry; Vin cuit, Muscat et panses de Roquevaire; Région du sud-est; Vins de la Côte du Rhône; Vignoble de Châteauneuf-du-Pape; Vignoble de la Nerthe; Vignoble de Saint-Péray; Vin de Saint-Jean; Vins de Cornas et de Saint-Joseph; Vignoble de l'ermitage; Vignobles de Crozes, Larnage et Mercurol; Vignoble de Rochegude; Vignoble de la Rolière et Clairette de Die; Vignobles de Condrieu et de Côte-Rôtie; Vin blanc de Condrieu

Vin rouge de Côte-RôtieRégion de l'est; Vins du Beaujolais, du Maconnais et de la Côte Chalonnaise; Beaujolais; Maconnais; Côte Chalonnaise; Vins de la Haute Bourgogne; Vins de la Basse Bourgogne; Vins du Tonnerrois; Vins de l'Auxerrois; Principaux crus de l'Avallonnais; Vignoble de Joigny; Vignoble des Riceys; Vins du Jura; Vins d'Alsace; Vins de Lorraine; Vignobles de Thiaucourt et de Pagny-



sur-Moselle; Vignoble de Scy; Vignobles de Bar-le-Duc et de Bussy-la-Côte; Vins de Champagne; Vins d'Aubigny et de Montsaujeon; Région du centre; Vignoble de la côte des Grouets; Vignoble de Pouilly

Vignoble de Saint-PourçainVignoble de Chanturgues; Région de l'ouest; Vignoble de Joué; Vignoble de Bourgueil; Vignoble de Vouvray; Vin blanc des Coteaux de Saumur; Eaux-de-vie de Cognac; Région du sud-ouest; Vins de Bordeaux; Vins de Médoc; Vins de Graves; Vins de côtes. Vignoble de Saint-Émilion; Vins de Palus; Vins de la côte de Bergerac; Vins de sable; Vignobles de Gan, Gelos, Sainfos et Jurançon; Vignoble de Madiran; Eaux-de-vie de l'Armagnac ou du Gers; Vignobles de Fronton et de Villaudric; Vignobles de Gaillac, Cunac et Caysaguet; Vignoble de Pech-Langlade; Vignoble de Cahors

Vignobles de Clairac et de BuzetDe la culture du Chasselas à Thomery, près Fontainebleau; Indication des cépages dont il est fait mention dans cet ouvrage; Région du sud; Région du sud-est; Région de l'est; Région du centre; Région de l'ouest; Région du sud-ouest; Nomenclature des vignobles secondaires produisant des vins d'ordinaire estimés; Classification générale des vins de France; Vins rouges; Vins rouges; Vins rouges; Vins rouges; Vins rouges; Première section; Deuxième section; Vins blancs; Vins blancs; Vins blancs; Vins blancs; Vins blancs; Première section; Deuxième section

Vins de liqueur



5.

Record Nr.

UNINA9910865252703321

Autore

Ait Wakrime Abderrahim

Titolo

Risks and Security of Internet and Systems : 18th International Conference, CRiSIS 2023, Rabat, Morocco, December 6–8, 2023, Revised Selected Papers / / edited by Abderrahim Ait Wakrime, Guillermo Navarro-Arribas, Frédéric Cuppens, Nora Cuppens, Redouane Benaini

Pubbl/distr/stampa

Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024

ISBN

9783031612312

9783031612305

Edizione

[1st ed. 2024.]

Descrizione fisica

1 online resource (294 pages)

Collana

Lecture Notes in Computer Science, , 1611-3349 ; ; 14529

Altri autori (Persone)

Navarro-ArribasGuillermo

Cuppensédéric

CuppensNora

BenainiRedouane

Disciplina

005.8

Soggetti

Data protection

Data and Information Security

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Nota di contenuto

Intro -- Preface -- Organization -- Contents -- Keynote Talks -- A Review of the Progressive Odyssey of AI-Driven Intrusion Detection Within Embedded Systems -- 1 Introduction -- 2 Background -- 3 Review of Recent IDSs for ES -- 3.1 Host-Based IDS -- 3.2 Network-Based IDS -- 4 Current State of IDS in ES -- 5 Key Challenges and Trends in IDS for ES -- 6 Research Gaps and Opportunities -- 7 Conclusion -- References -- Securing Autonomous Vehicles: Fundamentals, Challenges, and Perspectives -- 1 Introduction -- 2 Fundamentals -- 3 Challenges -- 3.1 Modeling and Communication Challenges -- 3.2 Security and Safety Challenges -- 4 Perspectives -- 5 Conclusion -- References -- Towards a B-Method Framework for Smart Contract Verification: The Case of ACTUS Financial Contracts -- 1 Introduction -- 2 Smart Contracts Scalability and the Rationale Behind the FeverTokens Open-Source Package-Oriented Framework -- 3 Overview of the Actus Standard and Financial Contracts -- 4 A



Preliminary B-Method Framework for Financial Smart Contracts Under the Actus Standard -- 5 Conclusion and Perspectives -- References -- Security and Transportation Systems -- FERROMOBILE and Security for Low Moment of Traffic Level Crossing -- 1 Introduction -- 2 Objectives of the ``Ferromobile'' Project -- 3 A Solution to Ensure Safe Crossing for ``Ferromobiles'' -- 3.1 Overview of the Global Architecture -- 3.2 Wireless Communication Abilities and Contributions -- 3.3 Cryptography -- 4 Conclusion and Perspectives -- References -- Improvement and Evaluation of Resilience of Adaptive Cruise Control Against Spoofing Attacks Using Intrusion Detection System -- 1 Introduction -- 2 Related Work -- 2.1 Cyber-Attacks on Adaptive Cruise Control -- 2.2 Cyber-Resilience of Adaptive Cruise Control -- 3 Extending Adaptive Cruise Control with ML-Based Intrusion Detection System.

3.1 Overview of the Adaptive Cruise Control -- 3.2 Architecture of the Extended Adaptive Cruise Control -- 4 Evaluation of the ACC-IDS Using CARLA Simulation -- 4.1 Simulation Setup -- 4.2 Result and Analysis of the Simulation Experiments -- 4.3 Impacts and Limitations of the Study -- 5 Conclusion -- References -- A New Efficient PUF-Based Mutual Authentication Scheme for Drones -- 1 Introduction -- 2 Related Work -- 3 Preliminaries -- 4 The Proposed Scheme -- 4.1 System Model -- 4.2 Description of the Proposed Scheme -- 5 Security Analysis -- 5.1 Privacy Model -- 5.2 Formal Security Analysis -- 5.3 Informal Security Analysis -- 6 Practical Results and Comparison -- 7 Conclusion -- References -- Formalizing for Proving the System Safety of the Software Component for a Small Sized Guided Transport System -- 1 Introduction -- 2 Autonomous Train Control -- 3 Railway Signalling Systems -- 3.1 Danger Related to Train Movements -- 3.2 The Protective Safety Distance in an ATP System -- 4 Hybrid System Modeling with Event-B -- 4.1 Event-B Modeling of Hybrid Train Dynamics -- 4.2 Potential Solutions -- 5 Managing Uncertainties of a Real Cyber Physical System -- 5.1 Traction/Brake Control -- 5.2 Previous Step Towards Implementation -- 6 Conclusion -- References -- Blockchain and Distributed Ledger Technologies -- Smart Contracts for a Secure and Privacy-Preserving Smart Grid -- 1 Introduction -- 1.1 Related Work -- 1.2 Contribution and Plan of This Paper -- 2 Architecture and System Overview -- 2.1 General Architecture -- 2.2 Overview of the Proposal -- 3 The Proposed System in Detail -- 3.1 Main Smart Contract -- 3.2 Group Smart Contracts -- 3.3 Initialization -- 3.4 Price Calculation -- 3.5 Energy Trading -- 3.6 Debt Liquidation -- 4 Dealing with Security and Privacy Threats -- 5 Conclusions and Future Work -- References.

EHRVault: A Secure, Patient-Centric, Privacy-Preserving and Blockchain-Based Platform for EHR Management -- 1 Introduction -- 2 Related Work -- 3 Preliminaries -- 3.1 PHI Standards and Regulations -- 3.2 Security Requirements for Health Data Management -- 3.3 Blockchain Technology -- 3.4 IPFS -- 3.5 Anonymization Technique -- 3.6 Cryptographic Primitives -- 4 EHRVault Platform Description -- 4.1 Architecture -- 4.2 System Functionalities -- 5 Discussion -- 6 Conclusion -- References -- Distributed Transactive Energy Management in Microgrids Based on Blockchain -- 1 Introduction -- 2 Background -- 2.1 Integration of DERs in Microgrids -- 2.2 Blockchain Structure -- 3 Related Work -- 3.1 Blockchain in Energy Trading -- 3.2 Blockchain for Secure Data Exchange, Aggregation, and Privacy -- 3.3 Learned Lessons -- 4 A Distributed Energy Trading Management Framework -- 4.1 Energy System Structure -- 4.2 Blockchain Energy System Structure -- 5 Implementation and Experimental Results -- 5.1 Tool's Implementation -- 5.2 Case Study on a 55 Bus Distribution



Network -- 5.3 Results -- 6 Conclusion -- References -- Blockchain-Based Exchange Place: Genericity vs Performance -- 1 Introduction -- 2 Blockchain Based Marketplaces -- 2.1 Blockchain Background -- 2.2 Current Status of Blockchain-Based Marketplace Solutions -- 3 ODEP -- 3.1 Ecosystem and Architecture -- 3.2 On-Chain/Off-Chain Approach -- 4 Implementation -- 4.1 Network Configuration -- 4.2 Smart Contracts Design -- 5 Performance Evaluation -- 5.1 Throughput -- 5.2 Gas Used -- 5.3 Block Size -- 6 Conclusions -- References -- Security Approaches and Infrastructure -- A Privacy-Preserving Infrastructure to Monitor Encrypted DNS Logs -- 1 Introduction and Motivation -- 2 DNS Use Case -- 2.1 Description -- 2.2 Security Properties -- 3 Searchable Encryption -- 4 Application of Searchable Encryption to DNS Logs.

4.1 Studied Schemes -- 4.2 Platform Implementation -- 5 Evaluation -- 5.1 Security -- 5.2 Benchmarking -- 5.3 Discussion About Token Collision -- 5.4 Summary -- 6 Related Work -- 7 Conclusion -- References -- VAE-GAN for Robust IoT Malware Detection and Classification in Intelligent Urban Environments: An Image Analysis Approach -- 1 Introduction -- 2 Related Work -- 3 Methods -- 3.1 Visualisation of Software Characteristics -- 3.2 Generative Attack Network -- 3.3 Generative Models: AE and Variations -- 3.4 Transfer Learning-Based Discriminator -- 4 Experiment and Discussion -- 4.1 Baselines -- 4.2 Reconstruction Results -- 4.3 Classification Results -- 4.4 Discussion: Practicality and Applicability -- 5 Conclusion -- References -- A Novel Software Defined Security Framework for SDN -- 1 Introduction -- 2 Related Work -- 3 Proposed SDS Framework -- 3.1 Architecture -- 3.2 Implementation -- 4 Results and Discussion -- 4.1 Firewall Application -- 4.2 DDoS Detection and Prevention Application -- 5 Conclusion -- References -- A Process-Centric Approach to Insider Threats Identification in Information Systems -- 1 Introduction -- 2 Separation of Concerns -- 2.1 Functional Modeling -- 2.2 Security Modeling -- 3 Dealing with Business Processes -- 3.1 Animation in B4MSecure -- 3.2 A CSPB Approach -- 3.3 Insider Threats Identification -- 4 Related Works -- 5 Conclusion -- References -- Machine Learning and Security -- Deep Learning-Based Outliers Detection in Compressed Trajectories -- 1 Introduction -- 2 Anomalies Detection and Trajectories Compression Algorithms -- 2.1 Anomalies Detection: GM-VSAE and ATD-RNN -- 2.2 Trajectories Compression Algorithms -- 3 Experimental Setup -- 4 Results -- 5 Conclusion -- References -- Experimental Toolkit for Manipulating Executable Packing -- 1 Introduction -- 2 Background -- 3 Toolkit -- 4 Experiments.

4.1 Detectors Performance -- 4.2 Model Training -- 5 Conclusion -- References -- A Collaborative Real-Time Object Detection and Data Association Framework for Autonomous Robots Using Federated Graph Neural Network -- 1 Introduction -- 2 CoRODDA Framework -- 3 Experimental Results -- 3.1 GNN Model Architecture -- 3.2 Enhancements via FL -- 3.3 Integration with YOLOv5 and Performance Insights -- 4 Conclusion -- References -- Author Index.

Sommario/riassunto

This book constitutes the revised selected papers of the 18th International Conference on Risks and Security of Internet and Systems, CRiSIS 2023, which took place in Rabat, Morocco, during December 6–8, 2023. The 13 full papers and 2 short papers included in this volume were carefully reviewed and selected from 25 submissions. The papers detail security issues in internet-related applications, networks and systems. .



6.

Record Nr.

UNINA9911022359203321

Autore

Esu Aide

Titolo

Occupying Island : Resisting Militarization in a No-War Zone

Pubbl/distr/stampa

Cham : , : Palgrave Macmillan, , 2025

©2025

ISBN

3-032-00419-5

Edizione

[1st ed.]

Descrizione fisica

1 online resource (235 pages)

Collana

Social Sciences Series

Altri autori (Persone)

MaddanuSimone

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Sommario/riassunto

This book offers an analytical perspective of the unfolding militarization in the Italian island of Sardinia, grounded in extensive ethnographic fieldwork, and using in-depth documentation analysis.