top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Advances in Communication Networking [[electronic resource] ] : 20th EUNICE/IFIP EG 6.2, 6.6 International Workshop, Rennes, France, September 1-5, 2014, Revised Selected Papers / / edited by Yvon Kermarrec
Advances in Communication Networking [[electronic resource] ] : 20th EUNICE/IFIP EG 6.2, 6.6 International Workshop, Rennes, France, September 1-5, 2014, Revised Selected Papers / / edited by Yvon Kermarrec
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (X, 227 p. 76 illus.)
Disciplina 004.6
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Computer science
Computer Science, general
ISBN 3-319-13488-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto An Orchestrator-based SDN Framework With Its Northbound Interface -- A Tabu Search Optimization for Multicast Provisioning in Mixed-Line-Rate Optical Networks -- Consensus Based Report-Back Protocol for Improving the Network Lifetime in Underwater Sensor Networks -- Merging IEC CIM and DMTF CIM { A step towards an improved Smart Grid information model -- Approaches for offering QoS and specialized traffic treatment for WebRTC -- Identifying Operating System Using Flow-based Trafic Fingerprinting -- Towards an integrated SDN-NFV architecture for EPON Networks -- Towards an integrated SDN-NFV architecture for EPON Networks -- Towards validation of the Internet Census 2012.
Record Nr. UNISA-996211265603316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Advances in Communication Networking : 20th EUNICE/IFIP EG 6.2, 6.6 International Workshop, Rennes, France, September 1-5, 2014, Revised Selected Papers / / edited by Yvon Kermarrec
Advances in Communication Networking : 20th EUNICE/IFIP EG 6.2, 6.6 International Workshop, Rennes, France, September 1-5, 2014, Revised Selected Papers / / edited by Yvon Kermarrec
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (X, 227 p. 76 illus.)
Disciplina 004.6
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Computer science
Computer Science, general
ISBN 3-319-13488-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto An Orchestrator-based SDN Framework With Its Northbound Interface -- A Tabu Search Optimization for Multicast Provisioning in Mixed-Line-Rate Optical Networks -- Consensus Based Report-Back Protocol for Improving the Network Lifetime in Underwater Sensor Networks -- Merging IEC CIM and DMTF CIM { A step towards an improved Smart Grid information model -- Approaches for offering QoS and specialized traffic treatment for WebRTC -- Identifying Operating System Using Flow-based Trafic Fingerprinting -- Towards an integrated SDN-NFV architecture for EPON Networks -- Towards an integrated SDN-NFV architecture for EPON Networks -- Towards validation of the Internet Census 2012.
Record Nr. UNINA-9910484095303321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Foundations and Practice of Security : 17th International Symposium, FPS 2024, Montréal, QC, Canada, December 9–11, 2024, Revised Selected Papers, Part II / / edited by Kamel Adi, Simon Bourdeau, Christel Durand, Valérie Viet Triem Tong, Alina Dulipovici, Yvon Kermarrec, Joaquin Garcia-Alfaro
Foundations and Practice of Security : 17th International Symposium, FPS 2024, Montréal, QC, Canada, December 9–11, 2024, Revised Selected Papers, Part II / / edited by Kamel Adi, Simon Bourdeau, Christel Durand, Valérie Viet Triem Tong, Alina Dulipovici, Yvon Kermarrec, Joaquin Garcia-Alfaro
Autore Adi Kamel
Edizione [1st ed. 2025.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025
Descrizione fisica 1 online resource (319 pages)
Disciplina 005.8
Altri autori (Persone) BourdeauSimon
DurandChristel
Viet Triem TongValérie
DulipoviciAlina
KermarrecYvon
Garcia-AlfaroJoaquin
Collana Lecture Notes in Computer Science
Soggetto topico Data protection
Computer engineering
Computer networks
Data and Information Security
Computer Engineering and Networks
Computer Communication Networks
ISBN 3-031-87496-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto -- Preserving privacy and maintaining trust for end users in a complex and numeric cyberspace. -- Another Walk for Monchi. -- An Innovative DSSE Framework: Ensuring Data Privacy and Query Verification in Untrusted Cloud Environments. -- Privacy-Preserving Machine Learning Inference for Intrusion Detection. -- Priv-IoT: Privacy-preserving Machine Learning in IoT Utilizing TEE and Lightweight Ciphers. -- Intersecting security, privacy, and machine learning techniques to detect, mitigate, and prevent threats. -- LocalIntel: Generating Organizational Threat Intelligence from Global and Local Cyber Knowledge. -- Intelligent Green Efficiency for Intrusion Detection. -- A Privacy-Preserving Behavioral Authentication System. -- Automated Exploration of Optimal Neural Network Structures for Deepfake Detection. -- An Empirical Study of Black-box based Membership Inference Attacks on a Real-World Dataset. -- New trends of machine leaning and AI applied to cybersecurity. -- ModelForge: Using GenAI to Improve the Development of Security Protocols. -- Detecting Energy Attacks in the Battery-less Internet of Things . -- Is Expert-Labeled Data Worth the Cost? Exploring Active and Semi-Supervised Learning Across Imbalance Scenarios in Financial Crime Detection. -- ExploitabilityBirthMark: An Early Predictor of the Likelihood of Exploitation.
Record Nr. UNINA-9911011655503321
Adi Kamel  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Foundations and Practice of Security : 17th International Symposium, FPS 2024, Montréal, QC, Canada, December 9–11, 2024, Revised Selected Papers, Part II / / edited by Kamel Adi, Simon Bourdeau, Christel Durand, Valérie Viet Triem Tong, Alina Dulipovici, Yvon Kermarrec, Joaquin Garcia-Alfaro
Foundations and Practice of Security : 17th International Symposium, FPS 2024, Montréal, QC, Canada, December 9–11, 2024, Revised Selected Papers, Part II / / edited by Kamel Adi, Simon Bourdeau, Christel Durand, Valérie Viet Triem Tong, Alina Dulipovici, Yvon Kermarrec, Joaquin Garcia-Alfaro
Autore Adi Kamel
Edizione [1st ed. 2025.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025
Descrizione fisica 1 online resource (319 pages)
Disciplina 005.8
Altri autori (Persone) BourdeauSimon
DurandChristel
Viet Triem TongValérie
DulipoviciAlina
KermarrecYvon
Garcia-AlfaroJoaquin
Collana Lecture Notes in Computer Science
Soggetto topico Data protection
Computer engineering
Computer networks
Data and Information Security
Computer Engineering and Networks
Computer Communication Networks
ISBN 3-031-87496-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto -- Preserving privacy and maintaining trust for end users in a complex and numeric cyberspace. -- Another Walk for Monchi. -- An Innovative DSSE Framework: Ensuring Data Privacy and Query Verification in Untrusted Cloud Environments. -- Privacy-Preserving Machine Learning Inference for Intrusion Detection. -- Priv-IoT: Privacy-preserving Machine Learning in IoT Utilizing TEE and Lightweight Ciphers. -- Intersecting security, privacy, and machine learning techniques to detect, mitigate, and prevent threats. -- LocalIntel: Generating Organizational Threat Intelligence from Global and Local Cyber Knowledge. -- Intelligent Green Efficiency for Intrusion Detection. -- A Privacy-Preserving Behavioral Authentication System. -- Automated Exploration of Optimal Neural Network Structures for Deepfake Detection. -- An Empirical Study of Black-box based Membership Inference Attacks on a Real-World Dataset. -- New trends of machine leaning and AI applied to cybersecurity. -- ModelForge: Using GenAI to Improve the Development of Security Protocols. -- Detecting Energy Attacks in the Battery-less Internet of Things . -- Is Expert-Labeled Data Worth the Cost? Exploring Active and Semi-Supervised Learning Across Imbalance Scenarios in Financial Crime Detection. -- ExploitabilityBirthMark: An Early Predictor of the Likelihood of Exploitation.
Record Nr. UNISA-996664552803316
Adi Kamel  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Foundations and Practice of Security : 17th International Symposium, FPS 2024, Montréal, QC, Canada, December 9–11, 2024, Revised Selected Papers, Part I / / edited by Kamel Adi, Simon Bourdeau, Christel Durand, Valérie Viet Triem Tong, Alina Dulipovici, Yvon Kermarrec, Joaquin Garcia-Alfaro
Foundations and Practice of Security : 17th International Symposium, FPS 2024, Montréal, QC, Canada, December 9–11, 2024, Revised Selected Papers, Part I / / edited by Kamel Adi, Simon Bourdeau, Christel Durand, Valérie Viet Triem Tong, Alina Dulipovici, Yvon Kermarrec, Joaquin Garcia-Alfaro
Edizione [1st ed. 2025.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025
Descrizione fisica 1 online resource (XVI, 416 p. 113 illus., 79 illus. in color.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Data protection
Computer engineering
Computer networks
Data and Information Security
Computer Engineering and Networks
Computer Communication Networks
ISBN 3-031-87499-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto -- Critical issues of protecting systems against digital threats, considering financial, technological, and operational implications. -- The Perfect Victim? Family Offices as Targets for Cybercriminals. -- Advanced Real-Time Detection of Cyber Threat Information from Tweets. -- Mitigating spillover effects of ransomware in financial markets: Lessons from the LockBit attacks. -- Exploring Smart Speaker Disclosure and Adoption Intentions: A Privacy Adoption Calculus Perspective. -- ICoSSiuM: an Integrated Communication Security Simulator for Maritime operations. -- Automating and enhancing security mechanisms in software systems and data management. -- Lowering the Barrier: An Automatic Attack Flow Generation Framework for Non-Security Experts. -- An Approach to Determine a System’s Behavioural Security Posture. -- Secure Data Traceability for Mobile DataCollectors. -- Toward Automatic Enforcement of Security Patterns in Software Architecture Using Alloy. -- Cybersecurity and AI when applied to emerging technologies. -- Light-SABRE: A lightweight encrypted data distribution system for Internet of Things. -- Evaluating Large Language Models on Cybersecurity Knowledge and Skills: A Comparative Analysis. -- Drone Anomaly Detection: Dataset and Unsupervised Machine Learning. -- A Tool for Enabling Scalable Automation in Security Control Selection. -- Cybersecurity and Ethics. -- A Systematic Evaluation of Non-SDK Interface Restrictions in Android: Bridging the Gap Between Guidelines and Practice. -- An Approach for Handling Missing Attribute Values in Attribute-Based Access Control Policy Mining. -- Does Gender Matter? Examining and Mitigating Gender Bias in Fake News Detection. -- ProFineLlama: A Prompt and Fine-Tuned Transfer Learning Approach for Multi-Domain Fake News Detection. -- Parametric Automata for Dynamic Access Control Policies. -- Cybersecurity and privacy in connected and autonomous systems for IoT, smart environments, and critical infrastructure. -- Fingerprinting Connected Wi-Fi Devices Using Per-network MAC Addresses. -- Privacy Guard: Empowering Users with Privacy Labels and Intuitive Apps. -- Privacy Guard: Empowering Users with Privacy Labels and Intuitive Apps Substation Automation Security. -- Enhancing Autonomy of Context-Aware Self-Healing in Fog Native Environments. -- Detecting Cyber Attacks on Electric Vehicles Charging Stations. -- New trends in advanced cryptographic protocols. -- Secure Voting Protocol Using Balance Scale. -- Monitoring the execution of cryptographic functions. -- RouterORAM: An O(1)-latency and client-work ORAM.
Record Nr. UNINA-9911001465803321
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Foundations and Practice of Security : 17th International Symposium, FPS 2024, Montréal, QC, Canada, December 9–11, 2024, Revised Selected Papers, Part I / / edited by Kamel Adi, Simon Bourdeau, Christel Durand, Valérie Viet Triem Tong, Alina Dulipovici, Yvon Kermarrec, Joaquin Garcia-Alfaro
Foundations and Practice of Security : 17th International Symposium, FPS 2024, Montréal, QC, Canada, December 9–11, 2024, Revised Selected Papers, Part I / / edited by Kamel Adi, Simon Bourdeau, Christel Durand, Valérie Viet Triem Tong, Alina Dulipovici, Yvon Kermarrec, Joaquin Garcia-Alfaro
Edizione [1st ed. 2025.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025
Descrizione fisica 1 online resource (XVI, 416 p. 113 illus., 79 illus. in color.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Data protection
Computer engineering
Computer networks
Data and Information Security
Computer Engineering and Networks
Computer Communication Networks
ISBN 3-031-87499-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto -- Critical issues of protecting systems against digital threats, considering financial, technological, and operational implications. -- The Perfect Victim? Family Offices as Targets for Cybercriminals. -- Advanced Real-Time Detection of Cyber Threat Information from Tweets. -- Mitigating spillover effects of ransomware in financial markets: Lessons from the LockBit attacks. -- Exploring Smart Speaker Disclosure and Adoption Intentions: A Privacy Adoption Calculus Perspective. -- ICoSSiuM: an Integrated Communication Security Simulator for Maritime operations. -- Automating and enhancing security mechanisms in software systems and data management. -- Lowering the Barrier: An Automatic Attack Flow Generation Framework for Non-Security Experts. -- An Approach to Determine a System’s Behavioural Security Posture. -- Secure Data Traceability for Mobile DataCollectors. -- Toward Automatic Enforcement of Security Patterns in Software Architecture Using Alloy. -- Cybersecurity and AI when applied to emerging technologies. -- Light-SABRE: A lightweight encrypted data distribution system for Internet of Things. -- Evaluating Large Language Models on Cybersecurity Knowledge and Skills: A Comparative Analysis. -- Drone Anomaly Detection: Dataset and Unsupervised Machine Learning. -- A Tool for Enabling Scalable Automation in Security Control Selection. -- Cybersecurity and Ethics. -- A Systematic Evaluation of Non-SDK Interface Restrictions in Android: Bridging the Gap Between Guidelines and Practice. -- An Approach for Handling Missing Attribute Values in Attribute-Based Access Control Policy Mining. -- Does Gender Matter? Examining and Mitigating Gender Bias in Fake News Detection. -- ProFineLlama: A Prompt and Fine-Tuned Transfer Learning Approach for Multi-Domain Fake News Detection. -- Parametric Automata for Dynamic Access Control Policies. -- Cybersecurity and privacy in connected and autonomous systems for IoT, smart environments, and critical infrastructure. -- Fingerprinting Connected Wi-Fi Devices Using Per-network MAC Addresses. -- Privacy Guard: Empowering Users with Privacy Labels and Intuitive Apps. -- Privacy Guard: Empowering Users with Privacy Labels and Intuitive Apps Substation Automation Security. -- Enhancing Autonomy of Context-Aware Self-Healing in Fog Native Environments. -- Detecting Cyber Attacks on Electric Vehicles Charging Stations. -- New trends in advanced cryptographic protocols. -- Secure Voting Protocol Using Balance Scale. -- Monitoring the execution of cryptographic functions. -- RouterORAM: An O(1)-latency and client-work ORAM.
Record Nr. UNISA-996660365103316
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Reliable Software Technologies - Ada-Europe 2009 [[electronic resource] ] : 14th Ada-Europe International Conference, Brest, France, June 8-12, 2009, Proceedings / / edited by Fabrice Kordon, Yvon Kermarrec
Reliable Software Technologies - Ada-Europe 2009 [[electronic resource] ] : 14th Ada-Europe International Conference, Brest, France, June 8-12, 2009, Proceedings / / edited by Fabrice Kordon, Yvon Kermarrec
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (XIV, 283 p.)
Disciplina 005.13322gerDNB
Collana Programming and Software Engineering
Soggetto topico Software engineering
Computer programming
Programming languages (Electronic computers)
Computer system failures
Computer software—Reusability
Software Engineering/Programming and Operating Systems
Software Engineering
Programming Techniques
Programming Languages, Compilers, Interpreters
System Performance and Evaluation
Performance and Reliability
Soggetto genere / forma Brest (Bretagne, 2009)
Kongress.
ISBN 3-642-01924-2
Classificazione DAT 263f
DAT 343f
DAT 356f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Requirements on the Target Programming Language for High-Integrity MDE -- A Restricted Middleware Profile for High-Integrity Distributed Real-Time Systems -- Validating Safety and Security Requirements for Partitioned Architectures -- On Comparing Testing Criteria for Logical Decisions -- Model Checking Techniques for Test Generation from Business Process Models -- An Experience on Ada Programming Using On-Line Judging -- Weak Fairness Semantic Drawbacks in Java Multithreading -- Implementation of the Ada 2005 Task Dispatching Model in MaRTE OS and GNAT -- Combining EDF and FP Scheduling: Analysis and Implementation in Ada 2005 -- Predicated Worst-Case Execution-Time Analysis -- Implementing Reactive Systems with UML State Machines and Ada 2005 -- Modelling and Evaluating Real-Time Software Architectures -- A Formal Foundation for Metamodeling -- Modeling AADL Data Communication with BIP -- Formal Verification of AADL Specifications in the Topcased Environment -- Process-Algebraic Interpretation of AADL Models -- Ocarina : An Environment for AADL Models Analysis and Automatic Code Generation for High Integrity Applications -- Conceptual Modeling for System Requirements Enhancement -- Coloured Petri Nets for Chronicle Recognition.
Record Nr. UNISA-996465606503316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Reliable software technologies - Ada-Europe 2009 : 14th Ada-Europe International Conference on Reliable Software Technologies, Brest, France, June 8-12, 2009 ; proceedings / / Fabrice Kordon, Yvon Kermarrec (eds.)
Reliable software technologies - Ada-Europe 2009 : 14th Ada-Europe International Conference on Reliable Software Technologies, Brest, France, June 8-12, 2009 ; proceedings / / Fabrice Kordon, Yvon Kermarrec (eds.)
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin ; ; New York, : Springer, 2009
Descrizione fisica 1 online resource (XIV, 283 p.)
Disciplina 005.13322gerDNB
Altri autori (Persone) KordonFabrice
KermarrecYvon
Collana Lecture notes in computer science
LNCS sublibrary. SL 2, Programming and software engineering
Soggetto topico Computer software - Reliability
Ada (Computer program language)
ISBN 3-642-01924-2
Classificazione DAT 263f
DAT 343f
DAT 356f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Requirements on the Target Programming Language for High-Integrity MDE -- A Restricted Middleware Profile for High-Integrity Distributed Real-Time Systems -- Validating Safety and Security Requirements for Partitioned Architectures -- On Comparing Testing Criteria for Logical Decisions -- Model Checking Techniques for Test Generation from Business Process Models -- An Experience on Ada Programming Using On-Line Judging -- Weak Fairness Semantic Drawbacks in Java Multithreading -- Implementation of the Ada 2005 Task Dispatching Model in MaRTE OS and GNAT -- Combining EDF and FP Scheduling: Analysis and Implementation in Ada 2005 -- Predicated Worst-Case Execution-Time Analysis -- Implementing Reactive Systems with UML State Machines and Ada 2005 -- Modelling and Evaluating Real-Time Software Architectures -- A Formal Foundation for Metamodeling -- Modeling AADL Data Communication with BIP -- Formal Verification of AADL Specifications in the Topcased Environment -- Process-Algebraic Interpretation of AADL Models -- Ocarina : An Environment for AADL Models Analysis and Automatic Code Generation for High Integrity Applications -- Conceptual Modeling for System Requirements Enhancement -- Coloured Petri Nets for Chronicle Recognition.
Altri titoli varianti Ada-Europe 2009
Ada-Europe International Conference on Reliable Software Technologies
Fourteenth Ada-Europe International Conference on Reliable Software Technologies
Record Nr. UNINA-9910484097603321
Berlin ; ; New York, : Springer, 2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui