Autonomic and Trusted Computing [[electronic resource] ] : 5th International Conference, ATC 2008, Oslo, Norway, June 23-25, 2008, Proceedings / / edited by Chunming Rong, Martin Gilje Jaatun, Frode Eika Sandnes, Laurence Tianruo Yang |
Edizione | [1st ed. 2008.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008 |
Descrizione fisica | 1 online resource (XV, 666 p.) |
Disciplina | 005.8 |
Collana | Programming and Software Engineering |
Soggetto topico |
Computer security
Software engineering Computer communication systems Data encryption (Computer science) Application software Management information systems Computer science Systems and Data Security Software Engineering Computer Communication Networks Cryptology Information Systems Applications (incl. Internet) Management of Computing and Information Systems |
ISBN | 3-540-69295-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Keynote Speech -- Sensor Network Applications Implemented by Industry and Their Security Challenges -- Regular Papers -- Detecting Stepping-Stone Intrusion and Resisting Evasion through TCP/IP Packets Cross-Matching -- Preventing DDoS Attacks Based on Credit Model for P2P Streaming System -- Design, Prototype, and Evaluation of a Network Monitoring Library -- Real-Time IP Checking and Packet Marking for Preventing ND-DoS Attack Employing Fake Source IP in IPv6 LAN -- A Semantic-Aware Ontology-Based Trust Model for Pervasive Computing Environments -- Using Automated Planning for Trusted Self-organising Organic Computing Systems -- A Trusted Group Signature Architecture in Virtual Computing Environment -- SepRep: A Novel Reputation Evaluation Model in Peer-to-Peer Networks -- Off-Line Keyword Guessing Attacks on Recent Public Key Encryption with Keyword Search Schemes -- An Integrated Solution for Policy Filtering and Traffic Anomaly Detection -- Secure Safety: Secure Remote Access to Critical Safety Systems in Offshore Installations -- SEMAP: Improving Multipath Security Based on Attacking Point in Ad Hoc Networks -- Scheduling for Reliable Execution in Autonomic Systems -- Measuring and Analyzing Emerging Properties for Autonomic Collaboration Service Adaptation -- Artificial Immune System Based Robot Anomaly Detection Engine for Fault Tolerant Robots -- Maximising Personal Utility Using Intelligent Strategy in Minority Game -- Simulation-Based Optimization Approach for Software Cost Model with Rejuvenation -- Organic Control of Traffic Lights -- Concepts for Autonomous Control Flow Checking for Embedded CPUs -- Autonomous Querying for Knowledge Networks -- Discovery of Useful Patterns from Tree-Structured Documents with Label-Projected Database -- Using Multiple Detectors to Detect the Backoff Time of the Selfish Node in Wireless Mesh Network -- Self-reconfiguration in Highly Available Pervasive Computing Systems -- Modeling Modern Social-Network-Based Epidemics: A Case Study of Rose -- An Evaluation Study of the Effectiveness of Modeling NASA Swarm-Based Exploration Missions with ASSL -- Special Session Papers -- Distributed Performance Control in Organic Embedded Systems -- An Operating System Architecture for Organic Computing in Embedded Real-Time Systems -- Towards an Autonomic Peer-to-Peer Middleware for Wireless Sensor Networks -- Embedding Dynamic Behaviour into a Self-configuring Software System -- Service Discovery of IP Cameras Using SIP and Zeroconf Protocols -- Adaptability of the TRSIM Model to Some Changes in Agents Behaviour -- Trusting Groups in Coalition Formation Using Social Distance -- Adjustable Trust Model for Access Control -- Towards Trustworthiness Establishment: A D-S Evidence Theory Based Scorer Reliability Tuned Method for Dishonest Feedback Filtering -- A User Behavior Based Trust Model for Mobile Applications -- Managing Contracts in Pleiades Using Trust Management -- A Semantic Foundation for Trust Management Languages with Weights: An Application to the RT Family -- Annotation Markers for Runtime Replication Protocol Selection -- Enhanced Three-Round Smart Card-Based Key Exchange Protocol -- Assertions Signcryption Scheme in Decentralized Autonomous Trust Environments -- A Study of Information Security Practice in a Critical Infrastructure Application -- Web Search Results Clustering Based on a Novel Suffix Tree Structure -- Di-GAFR: Directed Greedy Adaptive Face-Based Routing -- Cooperative Management Framework for Inter-domain Routing System -- Performance Problem Determination Using Combined Dependency Analysis for Reliable System -- A Free-Roaming Mobile Agent Security Protocol Based on Anonymous Onion Routing and k Anonymous Hops Backwards -- Secure Ethernet Point-to-Point Links for Autonomous Electronic Ballot Boxes -- Wireless Sensor Network Assisted Dynamic Path Planning for Transportation Systems -- A Recoverable Semi-fragile Watermarking Scheme Using Cosine Transform and Adaptive Median Filter -- Intelligent VoIP System in Ad-Hoc Network with Embedded Pseudo SIP Server -- A Weighted Routing Protocol Using Grey Relational Analysis for Wireless Ad Hoc Networks. |
Record Nr. | UNISA-996465299203316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Cloud Computing [[electronic resource] ] : First International Conference, CloudCom 2009, Beijing, China, December 1-4, 2009, Proceedings / / edited by Martin Gilje Jaatun, Gansen Zhao, Chunming Rong |
Edizione | [1st ed. 2009.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 |
Descrizione fisica | 1 online resource (XX, 707 p.) |
Disciplina | 004.67/82 |
Collana | Computer Communication Networks and Telecommunications |
Soggetto topico |
Computer communication systems
Computer organization Computer system failures Computer software—Reusability Architecture, Computer Software engineering Computer Communication Networks Computer Systems Organization and Communication Networks System Performance and Evaluation Performance and Reliability Computer System Implementation Software Engineering/Programming and Operating Systems |
Soggetto genere / forma |
Kongress.
Online-Publikation Peking (2009) |
ISBN | 3-642-10665-X |
Classificazione |
DAT 060f
DAT 250f SS 4800 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Invited Papers -- The Many Colors and Shapes of Cloud -- Biomedical Case Studies in Data Intensive Computing -- An Industrial Cloud: Integrated Operations in Oil and Gas in the Norwegian Continental Shelf -- Cloudbus Toolkit for Market-Oriented Cloud Computing -- Full Papers -- Self-healing and Hybrid Diagnosis in Cloud Computing -- Snow Leopard Cloud: A Multi-national Education Training and Experimentation Cloud and Its Security Challenges -- Trust Model to Enhance Security and Interoperability of Cloud Environment -- Dynamic Malicious Code Detection Based on Binary Translator -- A Privacy Manager for Cloud Computing -- Privacy in a Semantic Cloud: What’s Trust Got to Do with It? -- Data Protection-Aware Design for Cloud Services -- Accountability as a Way Forward for Privacy Protection in the Cloud -- Towards an Approach of Semantic Access Control for Cloud Computing -- Identity-Based Authentication for Cloud Computing -- Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography -- Availability Analysis of a Scalable Intrusion Tolerant Architecture with Two Detection Modes -- Data Center Consolidation: A Step towards Infrastructure Clouds -- Decentralized Service Allocation in a Broker Overlay Based Grid -- DisTec: Towards a Distributed System for Telecom Computing -- Cloud Computing Boosts Business Intelligence of Telecommunication Industry -- Composable IO: A Novel Resource Sharing Platform in Personal Clouds -- SLA-Driven Adaptive Resource Management for Web Applications on a Heterogeneous Compute Cloud -- Cost of Virtual Machine Live Migration in Clouds: A Performance Evaluation -- Cloud-Oriented Virtual Machine Management with MLN -- A Systematic Process for Developing High Quality SaaS Cloud Services -- Cloud Computing Service Composition and Search Based on Semantic -- Deploying Mobile Computation in Cloud Service -- A Novel Method for Mining SaaS Software Tag via Community Detection in Software Services Network -- Retrieving and Indexing Spatial Data in the Cloud Computing Environment -- Search Engine Prototype System Based on Cloud Computing -- Distributed Structured Database System HugeTable -- Cloud Computing: A Statistics Aspect of Users -- An Efficient Cloud Computing-Based Architecture for Freight System Application in China Railway -- Web Server Farm in the Cloud: Performance Evaluation and Dynamic Architecture -- SPECI, a Simulation Tool Exploring Cloud-Scale Data Centres -- CloudWF: A Computational Workflow System for Clouds Based on Hadoop -- A Novel Multipath Load Balancing Algorithm in Fat-Tree Data Center -- Scheduling Active Services in Clustered JBI Environment -- Task Parallel Scheduling over Multi-core System -- Cost-Minimizing Scheduling of Workflows on a Cloud of Memory Managed Multicore Machines -- Green Cloud on the Horizon -- Industrial Cloud: Toward Inter-enterprise Integration -- Community Cloud Computing -- A Semantic Grid Oriented to E-Tourism -- Irregular Community Discovery for Social CRM in Cloud Computing -- A Contextual Information Acquisition Approach Based on Semantics and Mashup Technology -- Evaluating MapReduce on Virtual Machines: The Hadoop Case -- APFA: Asynchronous Parallel Finite Automaton for Deep Packet Inspection in Cloud Computing -- Short Papers -- Secure Document Service for Cloud Computing -- Privacy of Value-Added Context-Aware Service Cloud -- A Simple Technique for Securing Data at Rest Stored in a Computing Cloud -- Access Control of Cloud Service Based on UCON -- Replica Replacement Strategy Evaluation Based on Grid Locality -- Performance Evaluation of Cloud Service Considering Fault Recovery -- BlueSky Cloud Framework: An E-Learning Framework Embracing Cloud Computing -- Cloud Infrastructure & Applications – CloudIA -- One Program Model for Cloud Computing -- Enterprise Cloud Architecture for Chinese Ministry of Railway -- Research on Cloud Computing Based on Deep Analysis to Typical Platforms -- Automatic Construction of SP Problem-Solving Resource Space -- An Idea of Special Cloud Computing in Forest Pests’ Control -- IBM Cloud Computing Powering a Smarter Planet -- Cloud Computing: An Overview -- Integrating Cloud-Computing-Specific Model into Aircraft Design -- Towards a Theory of Universally Composable Cloud Computing -- A Service-Oriented Qos-Assured and Multi-Agent Cloud Computing Architecture -- Price-Oriented Trading Optimization for Grid Resource -- A Requirements Recommendation Method Based on Service Description -- Extending YML to Be a Middleware for Scientific Cloud Computing -- Power-Aware Management in Cloud Data Centers -- Parallel K-Means Clustering Based on MapReduce -- Storage and Retrieval of Large RDF Graph Using Hadoop and MapReduce -- Distributed Scheduling Extension on Hadoop -- A Data Distribution Aware Task Scheduling Strategy for MapReduce System -- Cloud Computing Based Internet Data Center. |
Record Nr. | UNISA-996465582703316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Cloud computing : first International Conference, CloudCom 2009, Beijing, China, December 1-4, 2009, proceedings / / Martin Gilje Jaatun, Gansen Zhao, Chunming Rong (eds.) |
Edizione | [1st ed. 2009.] |
Pubbl/distr/stampa | Berlin, : Springer, 2009 |
Descrizione fisica | 1 online resource (XX, 707 p.) |
Disciplina | 004.67/82 |
Altri autori (Persone) |
JaatunMartin Gilje
ZhaoGansen RongChunming |
Collana | Lecture notes in computer science |
Soggetto topico |
Cloud computing
Computer science |
ISBN | 3-642-10665-X |
Classificazione |
DAT 060f
DAT 250f SS 4800 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Invited Papers -- The Many Colors and Shapes of Cloud -- Biomedical Case Studies in Data Intensive Computing -- An Industrial Cloud: Integrated Operations in Oil and Gas in the Norwegian Continental Shelf -- Cloudbus Toolkit for Market-Oriented Cloud Computing -- Full Papers -- Self-healing and Hybrid Diagnosis in Cloud Computing -- Snow Leopard Cloud: A Multi-national Education Training and Experimentation Cloud and Its Security Challenges -- Trust Model to Enhance Security and Interoperability of Cloud Environment -- Dynamic Malicious Code Detection Based on Binary Translator -- A Privacy Manager for Cloud Computing -- Privacy in a Semantic Cloud: What’s Trust Got to Do with It? -- Data Protection-Aware Design for Cloud Services -- Accountability as a Way Forward for Privacy Protection in the Cloud -- Towards an Approach of Semantic Access Control for Cloud Computing -- Identity-Based Authentication for Cloud Computing -- Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography -- Availability Analysis of a Scalable Intrusion Tolerant Architecture with Two Detection Modes -- Data Center Consolidation: A Step towards Infrastructure Clouds -- Decentralized Service Allocation in a Broker Overlay Based Grid -- DisTec: Towards a Distributed System for Telecom Computing -- Cloud Computing Boosts Business Intelligence of Telecommunication Industry -- Composable IO: A Novel Resource Sharing Platform in Personal Clouds -- SLA-Driven Adaptive Resource Management for Web Applications on a Heterogeneous Compute Cloud -- Cost of Virtual Machine Live Migration in Clouds: A Performance Evaluation -- Cloud-Oriented Virtual Machine Management with MLN -- A Systematic Process for Developing High Quality SaaS Cloud Services -- Cloud Computing Service Composition and Search Based on Semantic -- Deploying Mobile Computation in Cloud Service -- A Novel Method for Mining SaaS Software Tag via Community Detection in Software Services Network -- Retrieving and Indexing Spatial Data in the Cloud Computing Environment -- Search Engine Prototype System Based on Cloud Computing -- Distributed Structured Database System HugeTable -- Cloud Computing: A Statistics Aspect of Users -- An Efficient Cloud Computing-Based Architecture for Freight System Application in China Railway -- Web Server Farm in the Cloud: Performance Evaluation and Dynamic Architecture -- SPECI, a Simulation Tool Exploring Cloud-Scale Data Centres -- CloudWF: A Computational Workflow System for Clouds Based on Hadoop -- A Novel Multipath Load Balancing Algorithm in Fat-Tree Data Center -- Scheduling Active Services in Clustered JBI Environment -- Task Parallel Scheduling over Multi-core System -- Cost-Minimizing Scheduling of Workflows on a Cloud of Memory Managed Multicore Machines -- Green Cloud on the Horizon -- Industrial Cloud: Toward Inter-enterprise Integration -- Community Cloud Computing -- A Semantic Grid Oriented to E-Tourism -- Irregular Community Discovery for Social CRM in Cloud Computing -- A Contextual Information Acquisition Approach Based on Semantics and Mashup Technology -- Evaluating MapReduce on Virtual Machines: The Hadoop Case -- APFA: Asynchronous Parallel Finite Automaton for Deep Packet Inspection in Cloud Computing -- Short Papers -- Secure Document Service for Cloud Computing -- Privacy of Value-Added Context-Aware Service Cloud -- A Simple Technique for Securing Data at Rest Stored in a Computing Cloud -- Access Control of Cloud Service Based on UCON -- Replica Replacement Strategy Evaluation Based on Grid Locality -- Performance Evaluation of Cloud Service Considering Fault Recovery -- BlueSky Cloud Framework: An E-Learning Framework Embracing Cloud Computing -- Cloud Infrastructure & Applications – CloudIA -- One Program Model for Cloud Computing -- Enterprise Cloud Architecture for Chinese Ministry of Railway -- Research on Cloud Computing Based on Deep Analysis to Typical Platforms -- Automatic Construction of SP Problem-Solving Resource Space -- An Idea of Special Cloud Computing in Forest Pests’ Control -- IBM Cloud Computing Powering a Smarter Planet -- Cloud Computing: An Overview -- Integrating Cloud-Computing-Specific Model into Aircraft Design -- Towards a Theory of Universally Composable Cloud Computing -- A Service-Oriented Qos-Assured and Multi-Agent Cloud Computing Architecture -- Price-Oriented Trading Optimization for Grid Resource -- A Requirements Recommendation Method Based on Service Description -- Extending YML to Be a Middleware for Scientific Cloud Computing -- Power-Aware Management in Cloud Data Centers -- Parallel K-Means Clustering Based on MapReduce -- Storage and Retrieval of Large RDF Graph Using Hadoop and MapReduce -- Distributed Scheduling Extension on Hadoop -- A Data Distribution Aware Task Scheduling Strategy for MapReduce System -- Cloud Computing Based Internet Data Center. |
Altri titoli varianti | CloudCom 2009 |
Record Nr. | UNINA-9910483687203321 |
Berlin, : Springer, 2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Empirical research for software security : foundations and experience / / edited by Lotfi ben Othmane, Martin Gilje Jaatun, Edgar Weippl |
Pubbl/distr/stampa | Boca Raton, FL : , : CRC Press, , [2018] |
Descrizione fisica | 1 online resource (323 pages) |
Disciplina | 005.8 |
Collana | CRC series in security, privacy and trust |
Soggetto topico |
Computer security
Computer networks - Security measures |
Soggetto genere / forma | Electronic books. |
ISBN |
1-351-65088-2
1-315-15485-4 1-4987-7642-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | chapter 1 Empirical Research on Security and Privacy by Design / Koen Yskout -- chapter 2 Guidelines for Systematic Mapping Studies in Security Engineering / Michael Felderer -- chapter 3 An Introduction to Data Analytics for Software Security -- chapter 4 Generating Software Security Knowledge Through Empirical Methods / Rene´ Noe¨l, Santiago Matalonga, Gilberto Pedraza, Herna´n Astudillo, and Eduardo B. Fernandez -- chapter 5 Visual Analytics: Foundations and Experiences in Malware Analysis / Markus Wagner -- chapter 6 Analysis of Metrics for Classification Accuracy in Intrusion Detection / Natalia Stakhanova -- chapter 7 The Building Security in Maturity Model as a Research Tool / Martin Gilje Jaatun -- chapter 8 Agile Test Automation for Web Applications — A Security Perspective / Sandra Domenique Ringmann -- chapter 9 Benchmark for Empirical Evaluation of Web Application Anomaly Detectors / Robert Bronte -- chapter 10 Threats to Validity in Empirical Software Security Research / Daniela S. Cruzes and Lotfi ben Othmane. |
Record Nr. | UNINA-9910466754103321 |
Boca Raton, FL : , : CRC Press, , [2018] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Empirical research for software security : foundations and experience / / edited by Lotfi ben Othmane, Martin Gilje Jaatun, Edgar Weippl |
Pubbl/distr/stampa | Boca Raton, FL : , : CRC Press, , [2018] |
Descrizione fisica | 1 online resource (323 pages) |
Disciplina | 005.8 |
Collana | CRC series in security, privacy and trust |
Soggetto topico |
Computer security
Computer networks - Security measures |
ISBN |
1-351-65088-2
1-315-15485-4 1-4987-7642-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | chapter 1 Empirical Research on Security and Privacy by Design / Koen Yskout -- chapter 2 Guidelines for Systematic Mapping Studies in Security Engineering / Michael Felderer -- chapter 3 An Introduction to Data Analytics for Software Security -- chapter 4 Generating Software Security Knowledge Through Empirical Methods / Rene´ Noe¨l, Santiago Matalonga, Gilberto Pedraza, Herna´n Astudillo, and Eduardo B. Fernandez -- chapter 5 Visual Analytics: Foundations and Experiences in Malware Analysis / Markus Wagner -- chapter 6 Analysis of Metrics for Classification Accuracy in Intrusion Detection / Natalia Stakhanova -- chapter 7 The Building Security in Maturity Model as a Research Tool / Martin Gilje Jaatun -- chapter 8 Agile Test Automation for Web Applications — A Security Perspective / Sandra Domenique Ringmann -- chapter 9 Benchmark for Empirical Evaluation of Web Application Anomaly Detectors / Robert Bronte -- chapter 10 Threats to Validity in Empirical Software Security Research / Daniela S. Cruzes and Lotfi ben Othmane. |
Record Nr. | UNINA-9910796400803321 |
Boca Raton, FL : , : CRC Press, , [2018] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Empirical research for software security : foundations and experience / / edited by Lotfi ben Othmane, Martin Gilje Jaatun, Edgar Weippl |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Boca Raton, FL : , : CRC Press, , [2018] |
Descrizione fisica | 1 online resource (323 pages) |
Disciplina | 005.8 |
Collana | CRC series in security, privacy and trust |
Soggetto topico |
Computer security
Computer networks - Security measures |
ISBN |
1-351-65088-2
1-315-15485-4 1-4987-7642-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | chapter 1 Empirical Research on Security and Privacy by Design / Koen Yskout -- chapter 2 Guidelines for Systematic Mapping Studies in Security Engineering / Michael Felderer -- chapter 3 An Introduction to Data Analytics for Software Security -- chapter 4 Generating Software Security Knowledge Through Empirical Methods / Rene´ Noe¨l, Santiago Matalonga, Gilberto Pedraza, Herna´n Astudillo, and Eduardo B. Fernandez -- chapter 5 Visual Analytics: Foundations and Experiences in Malware Analysis / Markus Wagner -- chapter 6 Analysis of Metrics for Classification Accuracy in Intrusion Detection / Natalia Stakhanova -- chapter 7 The Building Security in Maturity Model as a Research Tool / Martin Gilje Jaatun -- chapter 8 Agile Test Automation for Web Applications — A Security Perspective / Sandra Domenique Ringmann -- chapter 9 Benchmark for Empirical Evaluation of Web Application Anomaly Detectors / Robert Bronte -- chapter 10 Threats to Validity in Empirical Software Security Research / Daniela S. Cruzes and Lotfi ben Othmane. |
Record Nr. | UNINA-9910818071603321 |
Boca Raton, FL : , : CRC Press, , [2018] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media : Cyber Science 2023; 03–04 July; University of Aalborg, Copenhagen, Denmark / / edited by Cyril Onwubiko, Pierangelo Rosati, Aunshul Rege, Arnau Erola, Xavier Bellekens, Hanan Hindy, Martin Gilje Jaatun |
Autore | Onwubiko Cyril |
Edizione | [1st ed. 2024.] |
Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024 |
Descrizione fisica | 1 online resource (410 pages) |
Disciplina | 530.1 |
Altri autori (Persone) |
RosatiPierangelo
RegeAunshul ErolaArnau BellekensXavier HindyHanan JaatunMartin Gilje |
Collana | Springer Proceedings in Complexity |
Soggetto topico |
System theory
Artificial intelligence Cooperating objects (Computer systems) Computer crimes Security systems Blockchains (Databases) Complex Systems Artificial Intelligence Cyber-Physical Systems Cybercrime Security Science and Technology Blockchain |
ISBN | 981-9969-74-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Section 1: Data Science and Artificial Intelligence -- Section 2: Blockchain, Cyber Threat Intel and Malware Analysis -- Section 3: Cybersecurity, Usability and Ethics -- Section 4: Regional and National Cybersecurity -- Section 5: Critical Infrastructure Cybersecurity -- Section 6: Cybersecurity Research and Innovation -- Section 7: Cyber Fraud, Privacy and Education -- Section 8: Extended Abstracts. |
Record Nr. | UNINA-9910838274903321 |
Onwubiko Cyril | ||
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|