LEADER 03588nam 2200745z- 450 001 9910557328103321 005 20231214133040.0 035 $a(CKB)5400000000042598 035 $a(oapen)https://directory.doabooks.org/handle/20.500.12854/76519 035 $a(EXLCZ)995400000000042598 100 $a20202201d2021 |y 0 101 0 $aeng 135 $aurmn|---annan 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aAdvanced Topics in Systems Safety and Security 210 $aBasel, Switzerland$cMDPI - Multidisciplinary Digital Publishing Institute$d2021 215 $a1 electronic resource (130 p.) 311 $a3-0365-1623-9 311 $a3-0365-1624-7 330 $aThis book presents valuable research results in the challenging field of systems (cyber)security. It is a reprint of the Information (MDPI, Basel) - Special Issue (SI) on Advanced Topics in Systems Safety and Security. The competitive review process of MDPI journals guarantees the quality of the presented concepts and results. The SI comprises high-quality papers focused on cutting-edge research topics in cybersecurity of computer networks and industrial control systems. The contributions presented in this book are mainly the extended versions of selected papers presented at the 7th and the 8th editions of the International Workshop on Systems Safety and Security?IWSSS. These two editions took place in Romania in 2019 and respectively in 2020. In addition to the selected papers from IWSSS, the special issue includes other valuable and relevant contributions. The papers included in this reprint discuss various subjects ranging from cyberattack or criminal activities detection, evaluation of the attacker skills, modeling of the cyber-attacks, and mobile application security evaluation. Given this diversity of topics and the scientific level of papers, we consider this book a valuable reference for researchers in the security and safety of systems. 606 $aTechnology: general issues$2bicssc 610 $aindustrial control safety 610 $aattack quantification 610 $acommon vulnerability scoring system 610 $aattack tree 610 $adistribution automation system 610 $aCommand and Control Citizen Security Center 610 $aCommand and Control Information System (C2IS) 610 $acrime detection 610 $ahomeland security 610 $aAndroid applications 610 $amulti-threading 610 $aoperational semantics 610 $areverse engineering 610 $aSmali+ 610 $acyber attack 610 $aattacker 610 $aattacker profile 610 $aattacker behaviour 610 $ametrics 610 $afeatures 610 $aattributes 610 $aintelligent data analysis 610 $aattack forecasting 610 $acomparative review 610 $aalert correlation 610 $aattack evaluation 610 $aattacker skill level 610 $aattack prediction 610 $aattack projection 610 $aearly-stage detection 610 $aBayesian network 615 7$aTechnology: general issues 700 $aPricop$b Emil$4edt$01264886 702 $aStamatescu$b Grigore$4edt 702 $aFattahi$b Jaouhar$4edt 702 $aPricop$b Emil$4oth 702 $aStamatescu$b Grigore$4oth 702 $aFattahi$b Jaouhar$4oth 906 $aBOOK 912 $a9910557328103321 996 $aAdvanced Topics in Systems Safety and Security$93022927 997 $aUNINA