LEADER 03972nam 22007453u 450 001 996472069303316 005 20231110224044.0 010 $a3-031-04036-8 035 $a(CKB)5590000000901950 035 $aEBL6949311 035 $a(AU-PeEL)EBL6949311 035 $a(MiAaPQ)EBC6949311 035 $a(oapen)https://directory.doabooks.org/handle/20.500.12854/81287 035 $a(PPN)262167549 035 $a(EXLCZ)995590000000901950 100 $a20220617d2022|||| uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCybersecurity of digital service chains $echallenges, methodologies, and tools /$feditors, Joanna Ko?odziej, Matteo Repetto, Armend Duzha 210 $aCham $cSpringer International Publishing AG$d2022 215 $a1 online resource (xi, 257 pages) $cillustrations (chiefly color) 225 1 $aLecture notes in computer science$vv.13300 300 $aDescription based upon print version of record. 311 1 $a3-031-04035-X 327 $aA Reference Architecture for Management of Security Operations in Digital Service Chains Efficient flow monitoring in digital services Intelligent Transportation Systems models, challenges, security aspects NAD: Machine Learning based Component for Unknown Attack Detection in Network Traffic Detecting unknown attacks through system behavior analysis Signature-based detection of botnet DDoS attacks Automatic Attack Pattern Mining for Generating Actionable CTI Applying Alert Aggregation Blockchain-based task and information management in computational cloud systems 330 $aThis open access book presents the main scientific results from the H2020 GUARD project. The GUARD project aims at filling the current technological gap between software management paradigms and cybersecurity models, the latter still lacking orchestration and agility to effectively address the dynamicity of the former. This book provides a comprehensive review of the main concepts, architectures, algorithms, and non-technical aspects developed during three years of investigation; the description of the Smart Mobility use case developed at the end of the project gives a practical example of how the GUARD platform and related technologies can be deployed in practical scenarios. We expect the book to be interesting for the broad group of researchers, engineers, and professionals daily experiencing the inadequacy of outdated cybersecurity models for modern computing environments and cyber-physical systems. 410 0$aLecture Notes in Computer Science 606 $aBusiness$xData processing$xSecurity measures 606 $aComputer networks$xSecurity measures 610 $acloud computing 610 $acomputer crime 610 $acomputer networks 610 $acomputer security 610 $acryptography 610 $acyber security 610 $adata communication systems 610 $adata flow architectures 610 $adata management systems 610 $adata security 610 $aelectromagnetic interference and compatibility 610 $ageneral programming languages 610 $ahealth informatics 610 $aintrusion detection 610 $anetwork protocols 610 $anetwork security 610 $anetwork simulations 610 $asensors and actuators 610 $asignal processing 610 $atelecommunication traffic 615 0$aBusiness$xData processing$xSecurity measures. 615 0$aComputer networks$xSecurity measures. 700 $aKo?odziej$b Joanna$4edt$01351245 701 $aRepetto$b Matteo$01239635 701 $aDuzha$b Armend$01239636 702 $aKo?odziej$b Joanna 801 0$bAU-PeEL 801 1$bAU-PeEL 801 2$bAU-PeEL 906 $aBOOK 912 $a996472069303316 996 $aCybersecurity of digital service chains$93358430 997 $aUNISA