LEADER 04113nam 22007455 450 001 9910558694303321 005 20251202162428.0 010 $a3-031-04036-8 024 7 $a10.1007/978-3-031-04036-8 035 $a(CKB)5590000000901950 035 $aEBL6949311 035 $a(AU-PeEL)EBL6949311 035 $a(MiAaPQ)EBC6949311 035 $a(oapen)https://directory.doabooks.org/handle/20.500.12854/81287 035 $a(PPN)262167549 035 $a(Au-PeEL)EBL6949311 035 $a(OCoLC)1310782928 035 $a(DE-He213)978-3-031-04036-8 035 $a(EXLCZ)995590000000901950 100 $a20220406d2022 u| 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCybersecurity of Digital Service Chains $eChallenges, Methodologies, and Tools /$fedited by Joanna Ko?odziej, Matteo Repetto, Armend Duzha 205 $a1st ed. 2022. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2022. 215 $a1 online resource (xi, 257 pages) $cillustrations (chiefly color) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v13300 300 $aDescription based upon print version of record. 311 1 $a3-031-04035-X 327 $aA Reference Architecture for Management of Security Operations in Digital Service Chains -- Efficient flow monitoring in digital services -- Intelligent Transportation Systems -- models, challenges, security aspects -- NAD: Machine Learning based Component for Unknown Attack Detection in Network Traffic -- Detecting unknown attacks through system behavior analysis -- Signature-based detection of botnet DDoS attacks -- Automatic Attack Pattern Mining for Generating Actionable CTI Applying Alert Aggregation -- Blockchain-based task and information management in computational cloud systems. 330 $aThis open access book presents the main scientific results from the H2020 GUARD project. The GUARD project aims at filling the current technological gap between software management paradigms and cybersecurity models, the latter still lacking orchestration and agility to effectively address the dynamicity of the former. This book provides a comprehensive review of the main concepts, architectures, algorithms, and non-technical aspects developed during three years of investigation; the description of the Smart Mobility use case developed at the end of the project gives a practical example of how the GUARD platform and related technologies can be deployed in practical scenarios. We expect the book to be interesting for the broad group of researchers, engineers, and professionals daily experiencing the inadequacy of outdated cybersecurity models for modern computing environments and cyber-physical systems. 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v13300 606 $aComputer networks 606 $aComputers$xLaw and legislation 606 $aInformation technology$xLaw and legislation 606 $aData protection 606 $aApplication software 606 $aComputer Communication Networks 606 $aLegal Aspects of Computing 606 $aData and Information Security 606 $aComputer and Information Systems Applications 615 0$aComputer networks. 615 0$aComputers$xLaw and legislation. 615 0$aInformation technology$xLaw and legislation. 615 0$aData protection. 615 0$aApplication software. 615 14$aComputer Communication Networks. 615 24$aLegal Aspects of Computing. 615 24$aData and Information Security. 615 24$aComputer and Information Systems Applications. 676 $a004.6 700 $aKo?odziej$b Joanna$4edt$01351245 701 $aRepetto$b Matteo$01239635 701 $aDuzha$b Armend$01239636 702 $aKo?odziej$b Joanna 801 0$bAU-PeEL 801 1$bAU-PeEL 801 2$bAU-PeEL 906 $aBOOK 912 $a9910558694303321 996 $aCybersecurity of digital service chains$93358430 997 $aUNINA