top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Autonomic and Trusted Computing [[electronic resource] ] : 5th International Conference, ATC 2008, Oslo, Norway, June 23-25, 2008, Proceedings / / edited by Chunming Rong, Martin Gilje Jaatun, Frode Eika Sandnes, Laurence Tianruo Yang
Autonomic and Trusted Computing [[electronic resource] ] : 5th International Conference, ATC 2008, Oslo, Norway, June 23-25, 2008, Proceedings / / edited by Chunming Rong, Martin Gilje Jaatun, Frode Eika Sandnes, Laurence Tianruo Yang
Edizione [1st ed. 2008.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008
Descrizione fisica 1 online resource (XV, 666 p.)
Disciplina 005.8
Collana Programming and Software Engineering
Soggetto topico Computer security
Software engineering
Computer communication systems
Data encryption (Computer science)
Application software
Management information systems
Computer science
Systems and Data Security
Software Engineering
Computer Communication Networks
Cryptology
Information Systems Applications (incl. Internet)
Management of Computing and Information Systems
ISBN 3-540-69295-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Keynote Speech -- Sensor Network Applications Implemented by Industry and Their Security Challenges -- Regular Papers -- Detecting Stepping-Stone Intrusion and Resisting Evasion through TCP/IP Packets Cross-Matching -- Preventing DDoS Attacks Based on Credit Model for P2P Streaming System -- Design, Prototype, and Evaluation of a Network Monitoring Library -- Real-Time IP Checking and Packet Marking for Preventing ND-DoS Attack Employing Fake Source IP in IPv6 LAN -- A Semantic-Aware Ontology-Based Trust Model for Pervasive Computing Environments -- Using Automated Planning for Trusted Self-organising Organic Computing Systems -- A Trusted Group Signature Architecture in Virtual Computing Environment -- SepRep: A Novel Reputation Evaluation Model in Peer-to-Peer Networks -- Off-Line Keyword Guessing Attacks on Recent Public Key Encryption with Keyword Search Schemes -- An Integrated Solution for Policy Filtering and Traffic Anomaly Detection -- Secure Safety: Secure Remote Access to Critical Safety Systems in Offshore Installations -- SEMAP: Improving Multipath Security Based on Attacking Point in Ad Hoc Networks -- Scheduling for Reliable Execution in Autonomic Systems -- Measuring and Analyzing Emerging Properties for Autonomic Collaboration Service Adaptation -- Artificial Immune System Based Robot Anomaly Detection Engine for Fault Tolerant Robots -- Maximising Personal Utility Using Intelligent Strategy in Minority Game -- Simulation-Based Optimization Approach for Software Cost Model with Rejuvenation -- Organic Control of Traffic Lights -- Concepts for Autonomous Control Flow Checking for Embedded CPUs -- Autonomous Querying for Knowledge Networks -- Discovery of Useful Patterns from Tree-Structured Documents with Label-Projected Database -- Using Multiple Detectors to Detect the Backoff Time of the Selfish Node in Wireless Mesh Network -- Self-reconfiguration in Highly Available Pervasive Computing Systems -- Modeling Modern Social-Network-Based Epidemics: A Case Study of Rose -- An Evaluation Study of the Effectiveness of Modeling NASA Swarm-Based Exploration Missions with ASSL -- Special Session Papers -- Distributed Performance Control in Organic Embedded Systems -- An Operating System Architecture for Organic Computing in Embedded Real-Time Systems -- Towards an Autonomic Peer-to-Peer Middleware for Wireless Sensor Networks -- Embedding Dynamic Behaviour into a Self-configuring Software System -- Service Discovery of IP Cameras Using SIP and Zeroconf Protocols -- Adaptability of the TRSIM Model to Some Changes in Agents Behaviour -- Trusting Groups in Coalition Formation Using Social Distance -- Adjustable Trust Model for Access Control -- Towards Trustworthiness Establishment: A D-S Evidence Theory Based Scorer Reliability Tuned Method for Dishonest Feedback Filtering -- A User Behavior Based Trust Model for Mobile Applications -- Managing Contracts in Pleiades Using Trust Management -- A Semantic Foundation for Trust Management Languages with Weights: An Application to the RT Family -- Annotation Markers for Runtime Replication Protocol Selection -- Enhanced Three-Round Smart Card-Based Key Exchange Protocol -- Assertions Signcryption Scheme in Decentralized Autonomous Trust Environments -- A Study of Information Security Practice in a Critical Infrastructure Application -- Web Search Results Clustering Based on a Novel Suffix Tree Structure -- Di-GAFR: Directed Greedy Adaptive Face-Based Routing -- Cooperative Management Framework for Inter-domain Routing System -- Performance Problem Determination Using Combined Dependency Analysis for Reliable System -- A Free-Roaming Mobile Agent Security Protocol Based on Anonymous Onion Routing and k Anonymous Hops Backwards -- Secure Ethernet Point-to-Point Links for Autonomous Electronic Ballot Boxes -- Wireless Sensor Network Assisted Dynamic Path Planning for Transportation Systems -- A Recoverable Semi-fragile Watermarking Scheme Using Cosine Transform and Adaptive Median Filter -- Intelligent VoIP System in Ad-Hoc Network with Embedded Pseudo SIP Server -- A Weighted Routing Protocol Using Grey Relational Analysis for Wireless Ad Hoc Networks.
Record Nr. UNISA-996465299203316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Cloud Computing [[electronic resource] ] : First International Conference, CloudCom 2009, Beijing, China, December 1-4, 2009, Proceedings / / edited by Martin Gilje Jaatun, Gansen Zhao, Chunming Rong
Cloud Computing [[electronic resource] ] : First International Conference, CloudCom 2009, Beijing, China, December 1-4, 2009, Proceedings / / edited by Martin Gilje Jaatun, Gansen Zhao, Chunming Rong
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (XX, 707 p.)
Disciplina 004.67/82
Collana Computer Communication Networks and Telecommunications
Soggetto topico Computer communication systems
Computer organization
Computer system failures
Computer software—Reusability
Architecture, Computer
Software engineering
Computer Communication Networks
Computer Systems Organization and Communication Networks
System Performance and Evaluation
Performance and Reliability
Computer System Implementation
Software Engineering/Programming and Operating Systems
Soggetto genere / forma Kongress.
Online-Publikation
Peking (2009)
ISBN 3-642-10665-X
Classificazione DAT 060f
DAT 250f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Papers -- The Many Colors and Shapes of Cloud -- Biomedical Case Studies in Data Intensive Computing -- An Industrial Cloud: Integrated Operations in Oil and Gas in the Norwegian Continental Shelf -- Cloudbus Toolkit for Market-Oriented Cloud Computing -- Full Papers -- Self-healing and Hybrid Diagnosis in Cloud Computing -- Snow Leopard Cloud: A Multi-national Education Training and Experimentation Cloud and Its Security Challenges -- Trust Model to Enhance Security and Interoperability of Cloud Environment -- Dynamic Malicious Code Detection Based on Binary Translator -- A Privacy Manager for Cloud Computing -- Privacy in a Semantic Cloud: What’s Trust Got to Do with It? -- Data Protection-Aware Design for Cloud Services -- Accountability as a Way Forward for Privacy Protection in the Cloud -- Towards an Approach of Semantic Access Control for Cloud Computing -- Identity-Based Authentication for Cloud Computing -- Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography -- Availability Analysis of a Scalable Intrusion Tolerant Architecture with Two Detection Modes -- Data Center Consolidation: A Step towards Infrastructure Clouds -- Decentralized Service Allocation in a Broker Overlay Based Grid -- DisTec: Towards a Distributed System for Telecom Computing -- Cloud Computing Boosts Business Intelligence of Telecommunication Industry -- Composable IO: A Novel Resource Sharing Platform in Personal Clouds -- SLA-Driven Adaptive Resource Management for Web Applications on a Heterogeneous Compute Cloud -- Cost of Virtual Machine Live Migration in Clouds: A Performance Evaluation -- Cloud-Oriented Virtual Machine Management with MLN -- A Systematic Process for Developing High Quality SaaS Cloud Services -- Cloud Computing Service Composition and Search Based on Semantic -- Deploying Mobile Computation in Cloud Service -- A Novel Method for Mining SaaS Software Tag via Community Detection in Software Services Network -- Retrieving and Indexing Spatial Data in the Cloud Computing Environment -- Search Engine Prototype System Based on Cloud Computing -- Distributed Structured Database System HugeTable -- Cloud Computing: A Statistics Aspect of Users -- An Efficient Cloud Computing-Based Architecture for Freight System Application in China Railway -- Web Server Farm in the Cloud: Performance Evaluation and Dynamic Architecture -- SPECI, a Simulation Tool Exploring Cloud-Scale Data Centres -- CloudWF: A Computational Workflow System for Clouds Based on Hadoop -- A Novel Multipath Load Balancing Algorithm in Fat-Tree Data Center -- Scheduling Active Services in Clustered JBI Environment -- Task Parallel Scheduling over Multi-core System -- Cost-Minimizing Scheduling of Workflows on a Cloud of Memory Managed Multicore Machines -- Green Cloud on the Horizon -- Industrial Cloud: Toward Inter-enterprise Integration -- Community Cloud Computing -- A Semantic Grid Oriented to E-Tourism -- Irregular Community Discovery for Social CRM in Cloud Computing -- A Contextual Information Acquisition Approach Based on Semantics and Mashup Technology -- Evaluating MapReduce on Virtual Machines: The Hadoop Case -- APFA: Asynchronous Parallel Finite Automaton for Deep Packet Inspection in Cloud Computing -- Short Papers -- Secure Document Service for Cloud Computing -- Privacy of Value-Added Context-Aware Service Cloud -- A Simple Technique for Securing Data at Rest Stored in a Computing Cloud -- Access Control of Cloud Service Based on UCON -- Replica Replacement Strategy Evaluation Based on Grid Locality -- Performance Evaluation of Cloud Service Considering Fault Recovery -- BlueSky Cloud Framework: An E-Learning Framework Embracing Cloud Computing -- Cloud Infrastructure & Applications – CloudIA -- One Program Model for Cloud Computing -- Enterprise Cloud Architecture for Chinese Ministry of Railway -- Research on Cloud Computing Based on Deep Analysis to Typical Platforms -- Automatic Construction of SP Problem-Solving Resource Space -- An Idea of Special Cloud Computing in Forest Pests’ Control -- IBM Cloud Computing Powering a Smarter Planet -- Cloud Computing: An Overview -- Integrating Cloud-Computing-Specific Model into Aircraft Design -- Towards a Theory of Universally Composable Cloud Computing -- A Service-Oriented Qos-Assured and Multi-Agent Cloud Computing Architecture -- Price-Oriented Trading Optimization for Grid Resource -- A Requirements Recommendation Method Based on Service Description -- Extending YML to Be a Middleware for Scientific Cloud Computing -- Power-Aware Management in Cloud Data Centers -- Parallel K-Means Clustering Based on MapReduce -- Storage and Retrieval of Large RDF Graph Using Hadoop and MapReduce -- Distributed Scheduling Extension on Hadoop -- A Data Distribution Aware Task Scheduling Strategy for MapReduce System -- Cloud Computing Based Internet Data Center.
Record Nr. UNISA-996465582703316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Cloud computing : first International Conference, CloudCom 2009, Beijing, China, December 1-4, 2009, proceedings / / Martin Gilje Jaatun, Gansen Zhao, Chunming Rong (eds.)
Cloud computing : first International Conference, CloudCom 2009, Beijing, China, December 1-4, 2009, proceedings / / Martin Gilje Jaatun, Gansen Zhao, Chunming Rong (eds.)
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, : Springer, 2009
Descrizione fisica 1 online resource (XX, 707 p.)
Disciplina 004.67/82
Altri autori (Persone) JaatunMartin Gilje
ZhaoGansen
RongChunming
Collana Lecture notes in computer science
Soggetto topico Cloud computing
Computer science
ISBN 3-642-10665-X
Classificazione DAT 060f
DAT 250f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Papers -- The Many Colors and Shapes of Cloud -- Biomedical Case Studies in Data Intensive Computing -- An Industrial Cloud: Integrated Operations in Oil and Gas in the Norwegian Continental Shelf -- Cloudbus Toolkit for Market-Oriented Cloud Computing -- Full Papers -- Self-healing and Hybrid Diagnosis in Cloud Computing -- Snow Leopard Cloud: A Multi-national Education Training and Experimentation Cloud and Its Security Challenges -- Trust Model to Enhance Security and Interoperability of Cloud Environment -- Dynamic Malicious Code Detection Based on Binary Translator -- A Privacy Manager for Cloud Computing -- Privacy in a Semantic Cloud: What’s Trust Got to Do with It? -- Data Protection-Aware Design for Cloud Services -- Accountability as a Way Forward for Privacy Protection in the Cloud -- Towards an Approach of Semantic Access Control for Cloud Computing -- Identity-Based Authentication for Cloud Computing -- Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography -- Availability Analysis of a Scalable Intrusion Tolerant Architecture with Two Detection Modes -- Data Center Consolidation: A Step towards Infrastructure Clouds -- Decentralized Service Allocation in a Broker Overlay Based Grid -- DisTec: Towards a Distributed System for Telecom Computing -- Cloud Computing Boosts Business Intelligence of Telecommunication Industry -- Composable IO: A Novel Resource Sharing Platform in Personal Clouds -- SLA-Driven Adaptive Resource Management for Web Applications on a Heterogeneous Compute Cloud -- Cost of Virtual Machine Live Migration in Clouds: A Performance Evaluation -- Cloud-Oriented Virtual Machine Management with MLN -- A Systematic Process for Developing High Quality SaaS Cloud Services -- Cloud Computing Service Composition and Search Based on Semantic -- Deploying Mobile Computation in Cloud Service -- A Novel Method for Mining SaaS Software Tag via Community Detection in Software Services Network -- Retrieving and Indexing Spatial Data in the Cloud Computing Environment -- Search Engine Prototype System Based on Cloud Computing -- Distributed Structured Database System HugeTable -- Cloud Computing: A Statistics Aspect of Users -- An Efficient Cloud Computing-Based Architecture for Freight System Application in China Railway -- Web Server Farm in the Cloud: Performance Evaluation and Dynamic Architecture -- SPECI, a Simulation Tool Exploring Cloud-Scale Data Centres -- CloudWF: A Computational Workflow System for Clouds Based on Hadoop -- A Novel Multipath Load Balancing Algorithm in Fat-Tree Data Center -- Scheduling Active Services in Clustered JBI Environment -- Task Parallel Scheduling over Multi-core System -- Cost-Minimizing Scheduling of Workflows on a Cloud of Memory Managed Multicore Machines -- Green Cloud on the Horizon -- Industrial Cloud: Toward Inter-enterprise Integration -- Community Cloud Computing -- A Semantic Grid Oriented to E-Tourism -- Irregular Community Discovery for Social CRM in Cloud Computing -- A Contextual Information Acquisition Approach Based on Semantics and Mashup Technology -- Evaluating MapReduce on Virtual Machines: The Hadoop Case -- APFA: Asynchronous Parallel Finite Automaton for Deep Packet Inspection in Cloud Computing -- Short Papers -- Secure Document Service for Cloud Computing -- Privacy of Value-Added Context-Aware Service Cloud -- A Simple Technique for Securing Data at Rest Stored in a Computing Cloud -- Access Control of Cloud Service Based on UCON -- Replica Replacement Strategy Evaluation Based on Grid Locality -- Performance Evaluation of Cloud Service Considering Fault Recovery -- BlueSky Cloud Framework: An E-Learning Framework Embracing Cloud Computing -- Cloud Infrastructure & Applications – CloudIA -- One Program Model for Cloud Computing -- Enterprise Cloud Architecture for Chinese Ministry of Railway -- Research on Cloud Computing Based on Deep Analysis to Typical Platforms -- Automatic Construction of SP Problem-Solving Resource Space -- An Idea of Special Cloud Computing in Forest Pests’ Control -- IBM Cloud Computing Powering a Smarter Planet -- Cloud Computing: An Overview -- Integrating Cloud-Computing-Specific Model into Aircraft Design -- Towards a Theory of Universally Composable Cloud Computing -- A Service-Oriented Qos-Assured and Multi-Agent Cloud Computing Architecture -- Price-Oriented Trading Optimization for Grid Resource -- A Requirements Recommendation Method Based on Service Description -- Extending YML to Be a Middleware for Scientific Cloud Computing -- Power-Aware Management in Cloud Data Centers -- Parallel K-Means Clustering Based on MapReduce -- Storage and Retrieval of Large RDF Graph Using Hadoop and MapReduce -- Distributed Scheduling Extension on Hadoop -- A Data Distribution Aware Task Scheduling Strategy for MapReduce System -- Cloud Computing Based Internet Data Center.
Altri titoli varianti CloudCom 2009
Record Nr. UNINA-9910483687203321
Berlin, : Springer, 2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Empirical research for software security : foundations and experience / / edited by Lotfi ben Othmane, Martin Gilje Jaatun, Edgar Weippl
Empirical research for software security : foundations and experience / / edited by Lotfi ben Othmane, Martin Gilje Jaatun, Edgar Weippl
Pubbl/distr/stampa Boca Raton, FL : , : CRC Press, , [2018]
Descrizione fisica 1 online resource (323 pages)
Disciplina 005.8
Collana CRC series in security, privacy and trust
Soggetto topico Computer security
Computer networks - Security measures
Soggetto genere / forma Electronic books.
ISBN 1-351-65088-2
1-315-15485-4
1-4987-7642-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto chapter 1 Empirical Research on Security and Privacy by Design / Koen Yskout -- chapter 2 Guidelines for Systematic Mapping Studies in Security Engineering / Michael Felderer -- chapter 3 An Introduction to Data Analytics for Software Security -- chapter 4 Generating Software Security Knowledge Through Empirical Methods / Rene´ Noe¨l, Santiago Matalonga, Gilberto Pedraza, Herna´n Astudillo, and Eduardo B. Fernandez -- chapter 5 Visual Analytics: Foundations and Experiences in Malware Analysis / Markus Wagner -- chapter 6 Analysis of Metrics for Classification Accuracy in Intrusion Detection / Natalia Stakhanova -- chapter 7 The Building Security in Maturity Model as a Research Tool / Martin Gilje Jaatun -- chapter 8 Agile Test Automation for Web Applications — A Security Perspective / Sandra Domenique Ringmann -- chapter 9 Benchmark for Empirical Evaluation of Web Application Anomaly Detectors / Robert Bronte -- chapter 10 Threats to Validity in Empirical Software Security Research / Daniela S. Cruzes and Lotfi ben Othmane.
Record Nr. UNINA-9910466754103321
Boca Raton, FL : , : CRC Press, , [2018]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Empirical research for software security : foundations and experience / / edited by Lotfi ben Othmane, Martin Gilje Jaatun, Edgar Weippl
Empirical research for software security : foundations and experience / / edited by Lotfi ben Othmane, Martin Gilje Jaatun, Edgar Weippl
Pubbl/distr/stampa Boca Raton, FL : , : CRC Press, , [2018]
Descrizione fisica 1 online resource (323 pages)
Disciplina 005.8
Collana CRC series in security, privacy and trust
Soggetto topico Computer security
Computer networks - Security measures
ISBN 1-351-65088-2
1-315-15485-4
1-4987-7642-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto chapter 1 Empirical Research on Security and Privacy by Design / Koen Yskout -- chapter 2 Guidelines for Systematic Mapping Studies in Security Engineering / Michael Felderer -- chapter 3 An Introduction to Data Analytics for Software Security -- chapter 4 Generating Software Security Knowledge Through Empirical Methods / Rene´ Noe¨l, Santiago Matalonga, Gilberto Pedraza, Herna´n Astudillo, and Eduardo B. Fernandez -- chapter 5 Visual Analytics: Foundations and Experiences in Malware Analysis / Markus Wagner -- chapter 6 Analysis of Metrics for Classification Accuracy in Intrusion Detection / Natalia Stakhanova -- chapter 7 The Building Security in Maturity Model as a Research Tool / Martin Gilje Jaatun -- chapter 8 Agile Test Automation for Web Applications — A Security Perspective / Sandra Domenique Ringmann -- chapter 9 Benchmark for Empirical Evaluation of Web Application Anomaly Detectors / Robert Bronte -- chapter 10 Threats to Validity in Empirical Software Security Research / Daniela S. Cruzes and Lotfi ben Othmane.
Record Nr. UNINA-9910796400803321
Boca Raton, FL : , : CRC Press, , [2018]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Empirical research for software security : foundations and experience / / edited by Lotfi ben Othmane, Martin Gilje Jaatun, Edgar Weippl
Empirical research for software security : foundations and experience / / edited by Lotfi ben Othmane, Martin Gilje Jaatun, Edgar Weippl
Edizione [1st ed.]
Pubbl/distr/stampa Boca Raton, FL : , : CRC Press, , [2018]
Descrizione fisica 1 online resource (323 pages)
Disciplina 005.8
Collana CRC series in security, privacy and trust
Soggetto topico Computer security
Computer networks - Security measures
ISBN 1-351-65088-2
1-315-15485-4
1-4987-7642-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto chapter 1 Empirical Research on Security and Privacy by Design / Koen Yskout -- chapter 2 Guidelines for Systematic Mapping Studies in Security Engineering / Michael Felderer -- chapter 3 An Introduction to Data Analytics for Software Security -- chapter 4 Generating Software Security Knowledge Through Empirical Methods / Rene´ Noe¨l, Santiago Matalonga, Gilberto Pedraza, Herna´n Astudillo, and Eduardo B. Fernandez -- chapter 5 Visual Analytics: Foundations and Experiences in Malware Analysis / Markus Wagner -- chapter 6 Analysis of Metrics for Classification Accuracy in Intrusion Detection / Natalia Stakhanova -- chapter 7 The Building Security in Maturity Model as a Research Tool / Martin Gilje Jaatun -- chapter 8 Agile Test Automation for Web Applications — A Security Perspective / Sandra Domenique Ringmann -- chapter 9 Benchmark for Empirical Evaluation of Web Application Anomaly Detectors / Robert Bronte -- chapter 10 Threats to Validity in Empirical Software Security Research / Daniela S. Cruzes and Lotfi ben Othmane.
Record Nr. UNINA-9910818071603321
Boca Raton, FL : , : CRC Press, , [2018]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media : Cyber Science 2023; 03–04 July; University of Aalborg, Copenhagen, Denmark / / edited by Cyril Onwubiko, Pierangelo Rosati, Aunshul Rege, Arnau Erola, Xavier Bellekens, Hanan Hindy, Martin Gilje Jaatun
Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media : Cyber Science 2023; 03–04 July; University of Aalborg, Copenhagen, Denmark / / edited by Cyril Onwubiko, Pierangelo Rosati, Aunshul Rege, Arnau Erola, Xavier Bellekens, Hanan Hindy, Martin Gilje Jaatun
Autore Onwubiko Cyril
Edizione [1st ed. 2024.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024
Descrizione fisica 1 online resource (410 pages)
Disciplina 530.1
Altri autori (Persone) RosatiPierangelo
RegeAunshul
ErolaArnau
BellekensXavier
HindyHanan
JaatunMartin Gilje
Collana Springer Proceedings in Complexity
Soggetto topico System theory
Artificial intelligence
Cooperating objects (Computer systems)
Computer crimes
Security systems
Blockchains (Databases)
Complex Systems
Artificial Intelligence
Cyber-Physical Systems
Cybercrime
Security Science and Technology
Blockchain
ISBN 981-9969-74-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Section 1: Data Science and Artificial Intelligence -- Section 2: Blockchain, Cyber Threat Intel and Malware Analysis -- Section 3: Cybersecurity, Usability and Ethics -- Section 4: Regional and National Cybersecurity -- Section 5: Critical Infrastructure Cybersecurity -- Section 6: Cybersecurity Research and Innovation -- Section 7: Cyber Fraud, Privacy and Education -- Section 8: Extended Abstracts.
Record Nr. UNINA-9910838274903321
Onwubiko Cyril  
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui