LEADER 01521cam0 2200301 450 001 E600200021675 005 20210520064355.0 100 $a20061017d1981 |||||ita|0103 ba 101 $aita 102 $aIT 200 1 $a<>programmazione educativa nel sistema del decentramento$eun'esperienza di lavoro$edocumenti della ricerca "mo.ter" (un modello territoriale di programmazione educativa) dell'Istituto di Pedagogia e Filosofia morale dell'Università di Napoli nel comprensorio flegreo del XXV Distretto scolastico della Campania (1977-1980)$fPaolo Orefice$gcur.Teresa Russo Agrusti$gVincenzo Sarracino$gpref. Raffaele Laporta$gcon contributi di Silvana Andolfi [et al.] 210 $aNapoli$cFerraro$d1981 215 $a606 p.$d22 cm 225 2 $aRicerche pedagogiche e metodologie educative 410 1$1001LAEC00022751$12001 $a*Ricerche pedagogiche e metodologie educative 700 1$aOrefice$b, Paolo$3AF00003355$4070$0445919 702 1$aRusso Agrusti, Teresa$3A600200038387$4070 702 1$aSarracino, Vincenzo$3AF00011123$4070 702 1$aLaporta, Raffaele$3AF00003450$4070 801 0$aIT$bUNISOB$c20210520$gRICA 850 $aUNISOB 852 $aUNISOB$j370|Coll|20|K$m37007 912 $aE600200021675 940 $aM 102 Monografia moderna SBN 941 $aM 957 $a370|Coll|20|K$b000002$gSi$d37007$racquisto$1pregresso1$2UNISOB$3UNISOB$420061017084221.0$520190621112645.0$6Spinosa 996 $aProgrammazione educativa nel sistema del decentramento$91691527 997 $aUNISOB LEADER 04305oam 2200457 450 001 996464527903316 005 20210706174758.0 010 $a3-030-68887-9 024 7 $a10.1007/978-3-030-68887-5 035 $a(CKB)4100000011763285 035 $a(DE-He213)978-3-030-68887-5 035 $a(MiAaPQ)EBC6478292 035 $a(PPN)253858674 035 $a(EXLCZ)994100000011763285 100 $a20210706d2021 uy 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aRisks and security of Internet and systems $e15th international conference, CRiSIS 2020, Paris, France, November 4-6, 2020, revised selected papers /$fJoaquin Garcia-Alfaro [and three others] editors 205 $a1st ed. 2021. 210 1$aCham, Switzerland :$cSpringer,$d[2021] 210 4$d©2021 215 $a1 online resource (XI, 378 p. 93 illus., 56 illus. in color.) 225 1 $aInformation Systems and Applications, incl. Internet/Web, and HCI ;$v12528 311 $a3-030-68886-0 327 $aKeynote Talk -- New Dimensions of Information Warfare: The Economic Pillar ? Fintech and Cryptocurrencies -- Vulnerabilities, Attacks and Intrusion Detection -- Measuring and Modeling Software Vulnerability Security Advisory Platforms -- Frequency Hopping Spread Spectrum to Counter Relay Attacks in PKESs -- A Deeper Analysis of Adversarial Examples in Intrusion Detection -- TLS, Openness and Security Control -- Implementation Flaws in TLS Stacks: Lessons Learned and Study of TLS 1.3 Benefits -- Security through Transparency and Openness in Computer Design -- An ML Behavior-based Security Control for Smart Home Systems -- Access Control, Risk Assessment and Security Knowledge -- A Posteriori Analysis of Policy Temporal Compliance -- Asset-driven Approach for Security Risk Assessment in IoT Systems -- Heterogeneous security events prioritization using auto-encoders -- Community Knowledge about Security: Identification and Classification of User Contributions -- Risk Analysis, Neural Networks and Web Protection -- Modelling Security Risk Scenarios using Subjective Attack Trees -- Premium Access to Convolutional Neural Networks -- An OWASP Top Ten Driven Survey for Web Application Protection Methods -- Infrastructure Security and Malware Detection -- Autonomous Vehicle Security: Literature Review of Real Attack Experiments -- New Dataset for Industry 4.0 to address the change in threat landscape -- Toward Semantic-Based Android Malware Detection Using Model Checking and Machine Learning -- Short Papers -- Augmented Voting Reality -- Malicious Http Request Detection using Code-Level Convolutional Neural Network -- Enhancement of a business model with a Business Contextual Risk Model -- Secure Data Processing for Industrial Remote Diagnosis and Maintenance -- Towards Attacker Attribution for Risk Analysis -- Modelling and Verification of Safety of Access Control in SCADA Systems -- Security Assessment and Hardening of Autonomous Vehicles. 330 $aThis book constitutes the proceedings of the 15th International Conference on Risks and Security of Internet and Systems, CRiTIS 2020, which took place during November 4-6, 2020. The conference was originally planned to take place in Paris, France, but had to change to an online format due to the COVID-19 pandemic. The 16 full and 7 short papers included in this volume were carefully reviewed and selected from 44 submissions. In addition, the book contains one invited talk in full paper length. The papers were organized in topical sections named: vulnerabilities, attacks and intrusion detection; TLS, openness and security control; access control, risk assessment and security knowledge; risk analysis, neural networks and Web protection; infrastructure security and malware detection. 410 0$aInformation Systems and Applications, incl. Internet/Web, and HCI ;$v12528 606 $aComputer security$vCongresses 615 0$aComputer security 676 $a005.8 702 $aGarcia-Alfaro$b Joaquin 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bUtOrBLW 906 $aBOOK 912 $a996464527903316 996 $aRisks and Security of Internet and Systems$92102247 997 $aUNISA