LEADER 03972nam 22007453u 450 001 996472069303316 005 20231110224044.0 010 $a3-031-04036-8 035 $a(CKB)5590000000901950 035 $aEBL6949311 035 $a(AU-PeEL)EBL6949311 035 $a(MiAaPQ)EBC6949311 035 $a(oapen)https://directory.doabooks.org/handle/20.500.12854/81287 035 $a(PPN)262167549 035 $a(EXLCZ)995590000000901950 100 $a20220617d2022|||| uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCybersecurity of digital service chains $echallenges, methodologies, and tools /$feditors, Joanna Ko?odziej, Matteo Repetto, Armend Duzha 210 $aCham $cSpringer International Publishing AG$d2022 215 $a1 online resource (xi, 257 pages) $cillustrations (chiefly color) 225 1 $aLecture notes in computer science$vv.13300 300 $aDescription based upon print version of record. 311 1 $a3-031-04035-X 327 $aA Reference Architecture for Management of Security Operations in Digital Service Chains Efficient flow monitoring in digital services Intelligent Transportation Systems models, challenges, security aspects NAD: Machine Learning based Component for Unknown Attack Detection in Network Traffic Detecting unknown attacks through system behavior analysis Signature-based detection of botnet DDoS attacks Automatic Attack Pattern Mining for Generating Actionable CTI Applying Alert Aggregation Blockchain-based task and information management in computational cloud systems 330 $aThis open access book presents the main scientific results from the H2020 GUARD project. The GUARD project aims at filling the current technological gap between software management paradigms and cybersecurity models, the latter still lacking orchestration and agility to effectively address the dynamicity of the former. This book provides a comprehensive review of the main concepts, architectures, algorithms, and non-technical aspects developed during three years of investigation; the description of the Smart Mobility use case developed at the end of the project gives a practical example of how the GUARD platform and related technologies can be deployed in practical scenarios. We expect the book to be interesting for the broad group of researchers, engineers, and professionals daily experiencing the inadequacy of outdated cybersecurity models for modern computing environments and cyber-physical systems. 410 0$aLecture Notes in Computer Science 606 $aBusiness$xData processing$xSecurity measures 606 $aComputer networks$xSecurity measures 610 $acloud computing 610 $acomputer crime 610 $acomputer networks 610 $acomputer security 610 $acryptography 610 $acyber security 610 $adata communication systems 610 $adata flow architectures 610 $adata management systems 610 $adata security 610 $aelectromagnetic interference and compatibility 610 $ageneral programming languages 610 $ahealth informatics 610 $aintrusion detection 610 $anetwork protocols 610 $anetwork security 610 $anetwork simulations 610 $asensors and actuators 610 $asignal processing 610 $atelecommunication traffic 615 0$aBusiness$xData processing$xSecurity measures. 615 0$aComputer networks$xSecurity measures. 700 $aKo?odziej$b Joanna$4edt$01351245 701 $aRepetto$b Matteo$01239635 701 $aDuzha$b Armend$01239636 702 $aKo?odziej$b Joanna 801 0$bAU-PeEL 801 1$bAU-PeEL 801 2$bAU-PeEL 906 $aBOOK 912 $a996472069303316 996 $aCybersecurity of digital service chains$93358430 997 $aUNISA LEADER 03260nam 2200793z- 450 001 9910557467403321 005 20210501 035 $a(CKB)5400000000043124 035 $a(oapen)https://directory.doabooks.org/handle/20.500.12854/68984 035 $a(oapen)doab68984 035 $a(EXLCZ)995400000000043124 100 $a20202105d2020 |y 0 101 0 $aeng 135 $aurmn|---annan 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aInnovation in Energy Security and Long-Term Energy Efficiency 210 $aBasel, Switzerland$cMDPI - Multidisciplinary Digital Publishing Institute$d2020 215 $a1 online resource (138 p.) 311 08$a3-03936-902-4 311 08$a3-03936-903-2 330 $aThe sustainable development of our planet depends on the use of energy. The growing population of the world inevitably causes an increase in the demand for energy, which, on the one hand, threatens the potential for shortages of energy supply, and, on the other hand, causes the deterioration of the environment.Therefore, our task is to reduce this demand through different innovative solutions (i.e., both technological and social). Social marketing and economic policies can also play a role in affecting the behavior of households and companies, by causing behavioral change oriented to energy stewardship, and an overall switch to renewable energy resources. This book provides a platform for the exchange of a wide range of ideas, which, ultimately, would facilitate the driving of societies to long-term energy efficiency. 606 $aResearch and information: general$2bicssc 610 $aairline industry 610 $aairline issues 610 $aanalytical hierarchy process (AHP) 610 $abehavioral change 610 $abusiness risks 610 $acollective behavior 610 $aCOM-B 610 $aconscripts 610 $acosts 610 $aD investment 610 $adevelopment 610 $aelectricity 610 $aendogenous relationship 610 $aenergy consumption 610 $aenergy efficiency 610 $aenergy enterprises 610 $aenergy management 610 $aenergy security 610 $aenergy usage 610 $aEuropean Union 610 $aexecutive incentive 610 $afinancially sustainable performance 610 $agas trading companies 610 $aGDP per capita 610 $agreen investments 610 $agreenhouse gas emissions 610 $aindustry growth 610 $aKazakhstan 610 $aliberalized energy market 610 $alow-cost carrier 610 $amilitary energy behavior 610 $apro-environmental behavior 610 $aprofessional soldiers 610 $aR& 610 $arenewable energy 610 $arenewable energy sources 610 $asustainable development 610 $atransport industry 615 7$aResearch and information: general 700 $aTvaronavi?ien?$b Manuela$4edt$01323412 702 $aTvaronavi?ien?$b Manuela$4oth 906 $aBOOK 912 $a9910557467403321 996 $aInnovation in Energy Security and Long-Term Energy Efficiency$93035520 997 $aUNINA