The once-only principle : the TOOP Project / / editors, Robert Krimmer, Andriana Prentza, Szymon Mamrot |
Autore | Krimmer Robert |
Pubbl/distr/stampa | Cham, : Springer International Publishing AG, 2021 |
Descrizione fisica | 1 online resource (x, 241 pages) : illustrations (some color) |
Altri autori (Persone) |
KrimmerRobert
PrentzaAndriana MamrotSzymon |
Collana | Lecture notes in computer science |
Soggetto topico |
Government information - Law and legislation
Internet in public administration |
Soggetto non controllato |
Computer Applications
Special Purpose and Application-Based Systems Programming Techniques Software Engineering/Programming and Operating Systems Computer Application in Administrative Data Processing Computer and Information Systems Applications Software Engineering access control communication systems computer systems cryptography databases Field Programmable Gate Array (FPGA) gateways (computer networks) information systems internet protocols network protocols object-oriented design object-oriented programming object-oriented programming languages signal processing social networks software architecture software design system architectures Information technology: general issues Expert systems / knowledge-based systems Computer programming / software engineering Operating systems |
ISBN | 3-030-79851-8 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | The Once-Only Principle: A Matter of Trust Implementation of the 'once-only' principle in Europe national approaches Drivers for and Barriers to the Cross-Border Implementation of the Once-Only Princi pleOnce-Only Principle Good Practices in Europ eThe Single Digital Gateway Regulation as an Enabler and Constraint of Once-Only in EuropeLegal Basis and Regulatory Applications of the Once-Only Principle: the Italian CaseTOOP Trust ArchitectureThe Technical challenges in OOP application across the European Union and the TOOP OOP architectureTesting methodology for the TOOP pilotsTOOP pilot experiences: challenges and achievements in implementing once-only in different domains and Member StatesMeasuring the Impact of the Once Only Principle for Businesses Across BordersThe Future of the Once-Only Principle in Europe |
Record Nr. | UNISA-996464432203316 |
Krimmer Robert
![]() |
||
Cham, : Springer International Publishing AG, 2021 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Principles of Security and Trust [[electronic resource] ] : 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings / / edited by Lujo Bauer, Ralf Küsters |
Autore | Ralf Küsters |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Springer Nature, 2018 |
Descrizione fisica | 1 online resource (XIV, 347 p. 85 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Computers Data structures (Computer science) Computer system failures Systems and Data Security Theory of Computation Computing Milieux Data Structures and Information Theory System Performance and Evaluation |
Soggetto non controllato |
security analysis
cryptography privacy world wide web semantics programming languages formal specification program compilers specifications formal logic computer science separation logic formal methods data privacy security systems software engineering computer software selection and evaluation internet verification authentication |
ISBN | 3-319-89722-5 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Information Flow and Non-Intereference -- What's the Over/Under? Probabilistic Bounds on Information Leakage -- Secure Information Release in Timed Automata -- Compositional Non-Interference for Concurrent Programs via Separation and Framing -- The Meaning of Memory Safety -- Leakage, Information Flow, and Protocols -- Formal Verification of Integrity Preserving Countermeasures Against Cache Storage -- Leakage and Protocol Composition in a Game-theoretic Perspective -- Equivalence Properties by Typing in Cryptographic Branching Protocols -- Design, Formal Specification and Analysis of Multi-Factor Authentication Solutions with a Single Sign-On Experience -- Smart Contracts and Privacy -- SoK: Unraveling Bitcoin Smart Contracts -- A Semantic Framework for the Security Analysis of Ethereum Smart Contracts -- Tool Demonstration: FSolidM for Designing Secure Ethereum Smart Contracts -- UniTraX: Protecting Data Privacy with Discoverable Biases -- Firewalls and Attack-Defense Trees -- Transcompiling Firewalls -- On Quantitative Analysis of Attack-Defense Trees with Repeated Labels. |
Record Nr. | UNINA-9910293140103321 |
Ralf Küsters
![]() |
||
Springer Nature, 2018 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Principles of Security and Trust [[electronic resource] ] : 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings / / edited by Lujo Bauer, Ralf Küsters |
Autore | Ralf Küsters |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Springer Nature, 2018 |
Descrizione fisica | 1 online resource (XIV, 347 p. 85 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Computers Data structures (Computer science) Computer system failures Systems and Data Security Theory of Computation Computing Milieux Data Structures and Information Theory System Performance and Evaluation |
Soggetto non controllato |
security analysis
cryptography privacy world wide web semantics programming languages formal specification program compilers specifications formal logic computer science separation logic formal methods data privacy security systems software engineering computer software selection and evaluation internet verification authentication |
ISBN | 3-319-89722-5 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Information Flow and Non-Intereference -- What's the Over/Under? Probabilistic Bounds on Information Leakage -- Secure Information Release in Timed Automata -- Compositional Non-Interference for Concurrent Programs via Separation and Framing -- The Meaning of Memory Safety -- Leakage, Information Flow, and Protocols -- Formal Verification of Integrity Preserving Countermeasures Against Cache Storage -- Leakage and Protocol Composition in a Game-theoretic Perspective -- Equivalence Properties by Typing in Cryptographic Branching Protocols -- Design, Formal Specification and Analysis of Multi-Factor Authentication Solutions with a Single Sign-On Experience -- Smart Contracts and Privacy -- SoK: Unraveling Bitcoin Smart Contracts -- A Semantic Framework for the Security Analysis of Ethereum Smart Contracts -- Tool Demonstration: FSolidM for Designing Secure Ethereum Smart Contracts -- UniTraX: Protecting Data Privacy with Discoverable Biases -- Firewalls and Attack-Defense Trees -- Transcompiling Firewalls -- On Quantitative Analysis of Attack-Defense Trees with Repeated Labels. |
Record Nr. | UNISA-996465583103316 |
Ralf Küsters
![]() |
||
Springer Nature, 2018 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Real-Time Sensor Networks and Systems for the Industrial IoT |
Autore | Koulamas Christos |
Pubbl/distr/stampa | Basel, Switzerland, : MDPI - Multidisciplinary Digital Publishing Institute, 2020 |
Descrizione fisica | 1 electronic resource (242 p.) |
Soggetto topico | History of engineering & technology |
Soggetto non controllato |
anomaly detection
recurrent neural networks neural networks compression LHC WirelessHART network delay analysis real-time systems multi-channel processing simulation modeling transmission scheduling scheme industrial internet of things wireless networks industrial control systems wireless networked control systems industrial IoT security legacy production machinery real-time condition monitoring wireless local area network IEEE 802.11ah medium access control timeliness Wireless Sensor and Actuator Networks (WSANs) multipath retransmission resource scheduling realtime wireless communication monitoring and control system virtualization controller area network fieldbus real-time container Industrial Internet of Things (IIoT) LoRa WiFi HaLow Time Slotted Channel Hopping (TSCH) Narrowband IoT (NB-IoT) Bluetooth Low Energy (BLE) BLE Long Range WirelessHART ISA100.11a deep sparse coding convolutional neural networks signal analysis respiratory diseases medication adherence hardware design trust cryptography |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910557745003321 |
Koulamas Christos
![]() |
||
Basel, Switzerland, : MDPI - Multidisciplinary Digital Publishing Institute, 2020 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Recent Advances in Social Data and Artificial Intelligence 2019 |
Autore | Srivastava Hari Mohan |
Pubbl/distr/stampa | Basel, : MDPI - Multidisciplinary Digital Publishing Institute, 2022 |
Descrizione fisica | 1 electronic resource (498 p.) |
Soggetto topico |
Information technology industries
Computer science |
Soggetto non controllato |
centrality metric
graph visualisation visual analytics data processing social network stock market community detection complex networks Hadoop modularity increment geometric analysis lidar scanning signal micro-distortion detection technology TCD1209DG lossless signal transmission person re-identification multiple granularity features Siamese Multiple Granularity Network multi-channel weighted fusion loss temporal links prediction gravity model multilayer network label propagation algorithm H-index automatic speech recognition speech corpus text corpus data acquisition multi-layer neural network natural language processing markov switching breakpoint test crude oil price structural change artificial intelligence ice-snow tourism sustainable development Python text mining pancreatic cancer twin support vector machine linear kernel polynomial kernel RBF kernel cryptography RSA cryptosystem RSA cryptanalysis partial key exposure attack social network simulation ABMS Spark two-tier partition algorithm visual style context-aware preference analysis fashion recommendation Facebook advertising post social media marketing recommendation system topic model post engagement blockchain client/server electronic health records health information management privacy security innovation business machine learning decision tree predictive analytics social data science contingencies asymmetry tele-education digitalization ICT infrastructure digital teacher training replace face-to-face education telemedicine technology acceptance robust partial least squares path modeling data-mining techniques data-discretization methods feature-selection methods industry data applications advanced multicomponential discretization models social networks behavior analysis social behavior social networking satisfaction data science DBLP platform deep reinforcement learning keyphrase extraction unsupervised method feature selection weighted non-negative matrix factorization hierarchical information tag information deep factorization combinatorial optimization problem heuristics method nature-inspired algorithm NP-hard problem plant root healthcare data data management digital services cybernetics symmetrical designing overlapping community discovery gravitational degree greedy strategy two expansions cloud computing color revolution operator imperialist competitive algorithm quality of service service composition service time-cost |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910585943903321 |
Srivastava Hari Mohan
![]() |
||
Basel, : MDPI - Multidisciplinary Digital Publishing Institute, 2022 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Security in computer and information sciences : second International Symposium, EuroCybersec 2021, Nice, France, October 25-26, 2021, revised selected papers / / editors, Erol Gelenbe [et al.] |
Autore | Gelenbe Erol <1945-> |
Pubbl/distr/stampa | Cham, : Springer Nature, 2022 |
Descrizione fisica | 1 online resource (145 pages) |
Altri autori (Persone) |
JankovicMarija
KehagiasDionysios MartonAnna VilmosAndras |
Collana | Communications in computer and information science |
Soggetto topico |
Computer networks - Security measures
Computer security |
Soggetto non controllato |
architecture types
artificial intelligence communication systems computer crime computer hardware computer networks computer security computer systems cryptography data security Internet of Things (IoT) network protocols network security signal processing software architecture software design software engineering telecommunication networks telecommunication systems |
ISBN | 3-031-09357-7 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | AI and Quality of Service Driven Attack Detection, Mitigation and Energy Optimization: A Review of Some EU Project Results Application of a Human-Centric Approach in Security by Design for IoT Architecture Development An Empirical Evaluation of the Usefulness of Word Embedding Techniques in Deep Learning-based Vulnerability Prediction Correlation-based Anomaly Detection for the CAN Bus Botnet Attack Detection with Incremental Online Learning Optimizing Energy Usage for an Electric Drone T-RAID: TEE-based Remote Attestation for IoT Devices Secure Authentication for everyone! Enabling 2nd-factor Authentication under Real-world constraints Energy, QoS and Security Aware Services at the Edge Mitigating the Massive Access Problem in the IoT |
Record Nr. | UNISA-996478861203316 |
Gelenbe Erol <1945->
![]() |
||
Cham, : Springer Nature, 2022 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Security in computer and information sciences : second International Symposium, EuroCybersec 2021, Nice, France, October 25-26, 2021, revised selected papers / / editors, Erol Gelenbe [et al.] |
Autore | Gelenbe Erol <1945-> |
Pubbl/distr/stampa | Cham, : Springer Nature, 2022 |
Descrizione fisica | 1 online resource (145 pages) |
Altri autori (Persone) |
JankovicMarija
KehagiasDionysios MartonAnna VilmosAndras |
Collana | Communications in computer and information science |
Soggetto topico |
Computer networks - Security measures
Computer security |
Soggetto non controllato |
architecture types
artificial intelligence communication systems computer crime computer hardware computer networks computer security computer systems cryptography data security Internet of Things (IoT) network protocols network security signal processing software architecture software design software engineering telecommunication networks telecommunication systems |
ISBN | 3-031-09357-7 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | AI and Quality of Service Driven Attack Detection, Mitigation and Energy Optimization: A Review of Some EU Project Results Application of a Human-Centric Approach in Security by Design for IoT Architecture Development An Empirical Evaluation of the Usefulness of Word Embedding Techniques in Deep Learning-based Vulnerability Prediction Correlation-based Anomaly Detection for the CAN Bus Botnet Attack Detection with Incremental Online Learning Optimizing Energy Usage for an Electric Drone T-RAID: TEE-based Remote Attestation for IoT Devices Secure Authentication for everyone! Enabling 2nd-factor Authentication under Real-world constraints Energy, QoS and Security Aware Services at the Edge Mitigating the Massive Access Problem in the IoT |
Record Nr. | UNINA-9910580293203321 |
Gelenbe Erol <1945->
![]() |
||
Cham, : Springer Nature, 2022 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Sensors Fault Diagnosis Trends and Applications |
Autore | Witczak Piotr |
Pubbl/distr/stampa | Basel, Switzerland, : MDPI - Multidisciplinary Digital Publishing Institute, 2021 |
Descrizione fisica | 1 electronic resource (236 p.) |
Soggetto topico | Technology: general issues |
Soggetto non controllato |
rolling bearing
performance degradation hybrid kernel function krill herd algorithm SVR acoustic-based diagnosis gear fault diagnosis attention mechanism convolutional neural network stacked auto-encoder weighting strategy deep learning bearing fault diagnosis intelligent leak detection acoustic emission signals statistical parameters support vector machine wavelet denoising Shannon entropy adaptive noise reducer gaussian reference signal gearbox fault diagnosis one against on multiclass support vector machine varying rotational speed fault detection and diagnosis faults estimation actuator and sensor fault observer design Takagi-Sugeno fuzzy systems automotive perception sensor lidar fault detection fault isolation fault identification fault recovery fault diagnosis fault detection and isolation (FDIR) autonomous vehicle model predictive control path tracking control fault detection and isolation braking control nonlinear systems fault tolerant control iterative learning control neural networks cryptography wireless sensor networks machine learning scan-chain diagnosis artificial neural network NARX control valve decision tree signature matrix |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910557506603321 |
Witczak Piotr
![]() |
||
Basel, Switzerland, : MDPI - Multidisciplinary Digital Publishing Institute, 2021 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|