LEADER 02197nam 2200553Ia 450 001 9910455769903321 005 20200520144314.0 010 $a0-309-51046-5 035 $a(CKB)111069351124310 035 $a(EBL)3375499 035 $a(SSID)ssj0000145899 035 $a(PQKBManifestationID)11155715 035 $a(PQKBTitleCode)TC0000145899 035 $a(PQKBWorkID)10182282 035 $a(PQKB)10207148 035 $a(MiAaPQ)EBC3375499 035 $a(Au-PeEL)EBL3375499 035 $a(CaPaEBR)ebr10038777 035 $a(OCoLC)923256820 035 $a(EXLCZ)99111069351124310 100 $a20020605d2001 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 00$aEmerging information technologies for facilities owners$b[electronic resource] $eresearch and practical applications : symposium proceedings /$f[Federal Facilities Council] 210 $aWashington, D.C. $cNational Academy Press$dc2001 215 $a1 online resource (43 p.) 225 1 $aFederal Facilities Council technical report ;$vno. 144 300 $aDescription based upon print version of record. 311 $a0-309-07643-9 327 $a""Front Matter""; ""ACKNOWLEDGEMENTS""; ""Contents""; ""1 Introduction""; ""2 Emerging Information Technologies for Facilities Owners""; ""3 Information Technologies and the Architecture- Engineering-Construction Industry""; ""4 Information Technologies and Knowledge Management""; ""5 New Tools for Fully Integrated and Automated Facilities Management Processes"" 410 0$aTechnical report (Federal Facilities Council) ;$v#144. 606 $aConstruction industry$xData processing 606 $aInformation technology 606 $aManagement information systems 608 $aElectronic books. 615 0$aConstruction industry$xData processing. 615 0$aInformation technology. 615 0$aManagement information systems. 676 $a725/.4 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910455769903321 996 $aEmerging information technologies for facilities owners$92250128 997 $aUNINA LEADER 05170nam 22006855 450 001 9910483824403321 005 20251225173545.0 010 $a3-030-68887-9 024 7 $a10.1007/978-3-030-68887-5 035 $a(CKB)4100000011763285 035 $a(DE-He213)978-3-030-68887-5 035 $a(MiAaPQ)EBC6478292 035 $a(PPN)253858674 035 $a(EXLCZ)994100000011763285 100 $a20210211d2021 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aRisks and Security of Internet and Systems $e15th International Conference, CRiSIS 2020, Paris, France, November 4?6, 2020, Revised Selected Papers /$fedited by Joaquin Garcia-Alfaro, Jean Leneutre, Nora Cuppens, Reda Yaich 205 $a1st ed. 2021. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2021. 215 $a1 online resource (XI, 378 p. 93 illus., 56 illus. in color.) 225 1 $aInformation Systems and Applications, incl. Internet/Web, and HCI,$x2946-1642 ;$v12528 311 08$a3-030-68886-0 327 $aKeynote Talk -- New Dimensions of Information Warfare: The Economic Pillar ? Fintech and Cryptocurrencies -- Vulnerabilities, Attacks and Intrusion Detection -- Measuring and Modeling Software Vulnerability Security Advisory Platforms -- Frequency Hopping Spread Spectrum to Counter Relay Attacks in PKESs -- A Deeper Analysis of Adversarial Examples in Intrusion Detection -- TLS, Openness and Security Control -- Implementation Flaws in TLS Stacks: Lessons Learned and Study of TLS 1.3 Benefits -- Security through Transparency and Openness in Computer Design -- An ML Behavior-based Security Control for Smart Home Systems -- Access Control, Risk Assessment and Security Knowledge -- A Posteriori Analysis of Policy Temporal Compliance -- Asset-driven Approach for Security Risk Assessment in IoT Systems -- Heterogeneous security events prioritization using auto-encoders -- Community Knowledge about Security: Identification and Classification of User Contributions -- Risk Analysis, Neural Networks and Web Protection -- Modelling Security Risk Scenarios using Subjective Attack Trees -- Premium Access to Convolutional Neural Networks -- An OWASP Top Ten Driven Survey for Web Application Protection Methods -- Infrastructure Security and Malware Detection -- Autonomous Vehicle Security: Literature Review of Real Attack Experiments -- New Dataset for Industry 4.0 to address the change in threat landscape -- Toward Semantic-Based Android Malware Detection Using Model Checking and Machine Learning -- Short Papers -- Augmented Voting Reality -- Malicious Http Request Detection using Code-Level Convolutional Neural Network -- Enhancement of a business model with a Business Contextual Risk Model -- Secure Data Processing for Industrial Remote Diagnosis and Maintenance -- Towards Attacker Attribution for Risk Analysis -- Modelling and Verification of Safety of Access Control in SCADA Systems -- Security Assessment and Hardening of Autonomous Vehicles. 330 $aThis book constitutes the proceedings of the 15th International Conference on Risks and Security of Internet and Systems, CRiTIS 2020, which took place during November 4-6, 2020. The conference was originally planned to take place in Paris, France, but had to change to an online format due to the COVID-19 pandemic. The 16 full and 7 short papers included in this volume were carefully reviewed and selected from 44 submissions. In addition, the book contains one invited talk in full paper length. The papers were organized in topical sections named: vulnerabilities, attacks and intrusion detection; TLS, openness and security control; access control, risk assessment and security knowledge; risk analysis, neural networks and Web protection; infrastructure security and malware detection. 410 0$aInformation Systems and Applications, incl. Internet/Web, and HCI,$x2946-1642 ;$v12528 606 $aData protection 606 $aApplication software 606 $aSoftware engineering 606 $aComputer networks 606 $aCryptography 606 $aData encryption (Computer science) 606 $aData and Information Security 606 $aComputer and Information Systems Applications 606 $aSoftware Engineering 606 $aComputer Communication Networks 606 $aCryptology 615 0$aData protection. 615 0$aApplication software. 615 0$aSoftware engineering. 615 0$aComputer networks. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 14$aData and Information Security. 615 24$aComputer and Information Systems Applications. 615 24$aSoftware Engineering. 615 24$aComputer Communication Networks. 615 24$aCryptology. 676 $a005.8 702 $aGarcia-Alfaro$b Joaquin 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910483824403321 996 $aRisks and Security of Internet and Systems$92102247 997 $aUNINA