LEADER 01172nam0-2200337 --450 001 9910769501303321 005 20240108084449.0 010 $a978-88-6242-860-6 100 $a20240108d2023----kmuy0itay5050 ba 101 2 $aita$aeng 102 $aIT 105 $aa 001yy 200 1 $aArchitettura porosa$eriflessioni e sperimentazioni progettuali a Napoli$f[a cura di] Alessandra Como$gcontributi di: Andrew Benjamin, Berenika Boberska, Alessandra Como, Luisa Smeragliuolo Perrotta 210 $aSiracusa$cLetteraVentidue$d2023 215 $a201 p.$cill.$d24 cm 225 1 $aAlleli/Research$v164 300 $aTesto in italiano con traduzione parallela in inglese 510 1 $aPorous architecture$ereflections and design experiments in Naples 610 0 $aArchitettura$aTeorie 676 $a720.1 702 1$aBenjamin,$bAndrew 702 1$aBoberska,$bBerenika 702 1$aComo,$bAlessandra 702 1$aSmeragliuolo Perrotta,$bLuisa 801 0$aIT$bUNINA$gREICAT$2UNIMARC 901 $aBK 912 $a9910769501303321 952 $aSEZ.NA B 4077$b980/2023$fFARBC 959 $aFARBC 996 $aArchitettura porosa$93660023 997 $aUNINA LEADER 05685nam 22009015 450 001 9910380748003321 005 20251225182032.0 010 $a3-030-42051-5 024 7 $a10.1007/978-3-030-42051-2 035 $a(CKB)4100000010480277 035 $a(DE-He213)978-3-030-42051-2 035 $a(MiAaPQ)EBC6120928 035 $a(PPN)242979270 035 $a(EXLCZ)994100000010480277 100 $a20200220d2020 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aComputer Security $eESORICS 2019 International Workshops, IOSec, MSTEC, and FINSEC, Luxembourg City, Luxembourg, September 26?27, 2019, Revised Selected Papers /$fedited by Apostolos P. Fournaris, Manos Athanatos, Konstantinos Lampropoulos, Sotiris Ioannidis, George Hatzivasilis, Ernesto Damiani, Habtamu Abie, Silvio Ranise, Luca Verderame, Alberto Siena, Joaquin Garcia-Alfaro 205 $a1st ed. 2020. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2020. 215 $a1 online resource (XVIII, 279 p. 270 illus., 65 illus. in color.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v11981 300 $aIncludes index. 311 08$a3-030-42050-7 327 $aInformation & Operational Technology (IT & OT) security systems (IOSec 2019) -- Model-driven Simulation and Training Environments (MSTEC 2019) -- Security for Financial Critical Infrastructures and Services (FINSEC 2019). 330 $aThis book constitutes the refereed post-conference proceedings of the Second International Workshop on Information & Operational Technology (IT & OT) security systems, IOSec 2019 , the First International Workshop on Model-driven Simulation and Training Environments, MSTEC 2019, and the First International Workshop on Security for Financial Critical Infrastructures and Services, FINSEC 2019, held in Luxembourg City, Luxembourg, in September 2019, in conjunction with the 24th European Symposium on Research in Computer Security, ESORICS 2019. The IOSec Workshop received 17 submissions from which 7 full papers were selected for presentation. They cover topics related to security architectures and frameworks for enterprises, SMEs, public administration or critical infrastructures, threat models for IT & OT systems and communication networks, cyber-threat detection, classification and pro ling, incident management, security training and awareness, risk assessment safety and security,hardware security, cryptographic engineering, secure software development, malicious code analysis as well as security testing platforms. From the MSTEC Workshop 7 full papers out of 15 submissions are included. The selected papers deal focus on the verification and validation (V&V) process, which provides the operational community with confidence in knowing that cyber models represent the real world, and discuss how defense training may benefit from cyber models. The FINSEC Workshop received 8 submissions from which 3 full papers and 1 short paper were accepted for publication. The papers reflect the objective to rethink cyber-security in the light of latest technology developments (e.g., FinTech, cloud computing, blockchain, BigData, AI, Internet-of-Things (IoT), mobile-first services, mobile payments). 410 0$aSecurity and Cryptology,$x2946-1863 ;$v11981 606 $aData protection 606 $aComputer networks 606 $aComputer engineering 606 $aComputer crimes 606 $aComputers$xLaw and legislation 606 $aInformation technology$xLaw and legislation 606 $aCryptography 606 $aData encryption (Computer science) 606 $aData and Information Security 606 $aComputer Communication Networks 606 $aComputer Engineering and Networks 606 $aComputer Crime 606 $aLegal Aspects of Computing 606 $aCryptology 615 0$aData protection. 615 0$aComputer networks. 615 0$aComputer engineering. 615 0$aComputer crimes. 615 0$aComputers$xLaw and legislation. 615 0$aInformation technology$xLaw and legislation. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 14$aData and Information Security. 615 24$aComputer Communication Networks. 615 24$aComputer Engineering and Networks. 615 24$aComputer Crime. 615 24$aLegal Aspects of Computing. 615 24$aCryptology. 676 $a005.8 676 $a005.8 702 $aFournaris$b Apostolos P$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aAthanatos$b Manos$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aLampropoulos$b Konstantinos$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aIoannidis$b Sotiris$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aHatzivasilis$b George$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aDamiani$b Ernesto$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aAbie$b Habtamu$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aRanise$b Silvio$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aVerderame$b Luca$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aSiena$b Alberto$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aGarcia-Alfaro$b Joaquin$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910380748003321 996 $aComputer & security$9878224 997 $aUNINA