LEADER 06076nam 2200553 450 001 9910632994203321 005 20221223172949.0 010 $a1-00-333749-X 010 $a1-000-79218-8 010 $a1-003-33749-X 035 $a(CKB)5840000000093682 035 $a(NjHacI)995840000000093682 035 $a(oapen)https://directory.doabooks.org/handle/20.500.12854/94279 035 $a(MiAaPQ)EBC7245161 035 $a(Au-PeEL)EBL7245161 035 $a(EXLCZ)995840000000093682 100 $a20221223d2019 uy 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aChallenges in Cybersecurity and Privacy $ethe European Research Landscape /$fedited by Jorge Bernal Bernabe and Antonio Skarmeta 210 $cTaylor & Francis$d2019 210 1$aDenmark :$cRiver Publishers :$cCRC Press,$d2019. 215 $a1 online resource (xli, 328 pages) $cillustrations 311 $a1-000-79550-0 311 $a87-7022-088-3 327 $a1.Introducing the European Research Landscape on Cybersecurity and Privacy 2. Key Innovations in ANASTACIA: Advanced Networked Agents for Security and Trust Assessment in CPS / IOT Architectures 3. Statistical analysis and economic models for enhancing cyber-security in SAINT 4. The YAKSHA project 5. The FORTIKA edge solution for Automating SMEs Security 6. CYBECO: Supporting cyber-insurance from a behavioural choice perspective 7. Cyber Threat Intelligence from European-wide sensor network in SISSDEN 8. CIPSEC- Enhancing Critical Infrastructure Protection with innovative SECurity framework 9. A cybersecurity situational awareness and information sharing solution for local public administrations based on advanced big data analysis: The CS-AWARE project 10. Complex project to develop real tools for fighting counter terrorism: Real-time Early Detection and Alert System for Online Terrorist Content based on Natural Language Processing, Social Network Analysis, Artificial Intelligence and Complex Event 11. TRUESSEC: Trustworthiness Label Recommendations 12. An overview on ARIES: Reliable European Identity Ecosystem 13. The LIGHTest Project: Overview, Reference Architecture and Trust Scheme Publication Authority 14. Secure and Privacy-Preserving Identity and Access Management in CREDENTIAL 15. FutureTrust -- Future Trust Services for Trustworthy Global Transactions 16. LEPS. Leveraging eID in the Private Sector 330 $aCybersecurity and Privacy issues are becoming an important barrier for a trusted and dependable global digital society development. Cyber-criminals are continuously shifting their cyber-attacks specially against cyber-physical systems and IoT, since they present additional vulnerabilities due to their constrained capabilities, their unattended nature and the usage of potential untrustworthiness components. Likewise, identity-theft, fraud, personal data leakages, and other related cyber-crimes are continuously evolving, causing important damages and privacy problems for European citizens in both virtual and physical scenarios.In this context, new holistic approaches, methodologies, techniques and tools are needed to cope with those issues, and mitigate cyberattacks, by employing novel cyber-situational awareness frameworks, risk analysis and modeling, threat intelligent systems, cyber-threat information sharing methods, advanced big-data analysis techniques as well as exploiting the benefits from latest technologies such as SDN/NFV and Cloud systems. In addition, novel privacy-preserving techniques, and crypto-privacy mechanisms, identity and eID management systems, trust services, and recommendations are needed to protect citizens' privacy while keeping usability levels.The European Commission is addressing the challenge through different means, including the Horizon 2020 Research and Innovation program, thereby financing innovative projects that can cope with the increasing cyberthreat landscape. This book introduces several cybersecurity and privacy research challenges and how they are being addressed in the scope of 15 European research projects.Each chapter is dedicated to a different funded European Research project, which aims to cope with digital security and privacy aspects, risks, threats and cybersecurity issues from a different perspective. Each chapter includes the project's overviews and objectives, the particular challenges they are covering, research achievements on security and privacy, as well as the techniques, outcomes, and evaluations accomplished in the scope of the EU project.The book is the result of a collaborative effort among relative ongoing European Research projects in the field of privacy and security as well as related cybersecurity fields, and it is intended to explain how these projects meet the main cybersecurity and privacy challenges faced in Europe. Namely, the EU projects analyzed in the book are: ANASTACIA, SAINT, YAKSHA, FORTIKA, CYBECO, SISSDEN, CIPSEC, CS-AWARE. RED-Alert, Truessec.eu. ARIES, LIGHTest, CREDENTIAL, FutureTrust, LEPS. Challenges in Cybersecurity and Privacy - the European Research Landscape is ideal for personnel in computer/communication industries as well as academic staff and master/research students in computer science and communications networks interested in learning about cyber-security and privacy aspects. 606 $aComputer security 606 $aComputer crimes$xPrevention 606 $aPrivacy, Right of 607 $aEurope$2fast 610 $aComputer security 610 $aOnline safety and behaviour 615 0$aComputer security. 615 0$aComputer crimes$xPrevention. 615 0$aPrivacy, Right of. 676 $a323.448 700 $aBernabe$b Jorge Bernal$4edt$01354993 702 $aSkarmeta$b Antonio 702 $aBernabe$b Jorge Bernal 801 0$bNjHacI 801 1$bNjHacl 906 $aBOOK 912 $a9910632994203321 996 $aChallenges in Cybersecurity and Privacy$93358906 997 $aUNINA