Advances in Communication Networking [[electronic resource] ] : 20th EUNICE/IFIP EG 6.2, 6.6 International Workshop, Rennes, France, September 1-5, 2014, Revised Selected Papers / / edited by Yvon Kermarrec
| Advances in Communication Networking [[electronic resource] ] : 20th EUNICE/IFIP EG 6.2, 6.6 International Workshop, Rennes, France, September 1-5, 2014, Revised Selected Papers / / edited by Yvon Kermarrec |
| Edizione | [1st ed. 2014.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 |
| Descrizione fisica | 1 online resource (X, 227 p. 76 illus.) |
| Disciplina | 004.6 |
| Collana | Information Systems and Applications, incl. Internet/Web, and HCI |
| Soggetto topico |
Computer science
Computer Science, general |
| ISBN | 3-319-13488-4 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | An Orchestrator-based SDN Framework With Its Northbound Interface -- A Tabu Search Optimization for Multicast Provisioning in Mixed-Line-Rate Optical Networks -- Consensus Based Report-Back Protocol for Improving the Network Lifetime in Underwater Sensor Networks -- Merging IEC CIM and DMTF CIM { A step towards an improved Smart Grid information model -- Approaches for offering QoS and specialized traffic treatment for WebRTC -- Identifying Operating System Using Flow-based Trafic Fingerprinting -- Towards an integrated SDN-NFV architecture for EPON Networks -- Towards an integrated SDN-NFV architecture for EPON Networks -- Towards validation of the Internet Census 2012. |
| Record Nr. | UNISA-996211265603316 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Advances in Communication Networking : 20th EUNICE/IFIP EG 6.2, 6.6 International Workshop, Rennes, France, September 1-5, 2014, Revised Selected Papers / / edited by Yvon Kermarrec
| Advances in Communication Networking : 20th EUNICE/IFIP EG 6.2, 6.6 International Workshop, Rennes, France, September 1-5, 2014, Revised Selected Papers / / edited by Yvon Kermarrec |
| Edizione | [1st ed. 2014.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 |
| Descrizione fisica | 1 online resource (X, 227 p. 76 illus.) |
| Disciplina | 004.6 |
| Collana | Information Systems and Applications, incl. Internet/Web, and HCI |
| Soggetto topico |
Computer science
Computer Science, general |
| ISBN | 3-319-13488-4 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | An Orchestrator-based SDN Framework With Its Northbound Interface -- A Tabu Search Optimization for Multicast Provisioning in Mixed-Line-Rate Optical Networks -- Consensus Based Report-Back Protocol for Improving the Network Lifetime in Underwater Sensor Networks -- Merging IEC CIM and DMTF CIM { A step towards an improved Smart Grid information model -- Approaches for offering QoS and specialized traffic treatment for WebRTC -- Identifying Operating System Using Flow-based Trafic Fingerprinting -- Towards an integrated SDN-NFV architecture for EPON Networks -- Towards an integrated SDN-NFV architecture for EPON Networks -- Towards validation of the Internet Census 2012. |
| Record Nr. | UNINA-9910484095303321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Foundations and Practice of Security : 17th International Symposium, FPS 2024, Montréal, QC, Canada, December 9–11, 2024, Revised Selected Papers, Part II / / edited by Kamel Adi, Simon Bourdeau, Christel Durand, Valérie Viet Triem Tong, Alina Dulipovici, Yvon Kermarrec, Joaquin Garcia-Alfaro
| Foundations and Practice of Security : 17th International Symposium, FPS 2024, Montréal, QC, Canada, December 9–11, 2024, Revised Selected Papers, Part II / / edited by Kamel Adi, Simon Bourdeau, Christel Durand, Valérie Viet Triem Tong, Alina Dulipovici, Yvon Kermarrec, Joaquin Garcia-Alfaro |
| Autore | Adi Kamel |
| Edizione | [1st ed. 2025.] |
| Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025 |
| Descrizione fisica | 1 online resource (319 pages) |
| Disciplina | 005.8 |
| Altri autori (Persone) |
BourdeauSimon
DurandChristel Viet Triem TongValérie DulipoviciAlina KermarrecYvon Garcia-AlfaroJoaquin |
| Collana | Lecture Notes in Computer Science |
| Soggetto topico |
Data protection
Computer engineering Computer networks Data and Information Security Computer Engineering and Networks Computer Communication Networks |
| ISBN | 3-031-87496-X |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | -- Preserving privacy and maintaining trust for end users in a complex and numeric cyberspace. -- Another Walk for Monchi. -- An Innovative DSSE Framework: Ensuring Data Privacy and Query Verification in Untrusted Cloud Environments. -- Privacy-Preserving Machine Learning Inference for Intrusion Detection. -- Priv-IoT: Privacy-preserving Machine Learning in IoT Utilizing TEE and Lightweight Ciphers. -- Intersecting security, privacy, and machine learning techniques to detect, mitigate, and prevent threats. -- LocalIntel: Generating Organizational Threat Intelligence from Global and Local Cyber Knowledge. -- Intelligent Green Efficiency for Intrusion Detection. -- A Privacy-Preserving Behavioral Authentication System. -- Automated Exploration of Optimal Neural Network Structures for Deepfake Detection. -- An Empirical Study of Black-box based Membership Inference Attacks on a Real-World Dataset. -- New trends of machine leaning and AI applied to cybersecurity. -- ModelForge: Using GenAI to Improve the Development of Security Protocols. -- Detecting Energy Attacks in the Battery-less Internet of Things . -- Is Expert-Labeled Data Worth the Cost? Exploring Active and Semi-Supervised Learning Across Imbalance Scenarios in Financial Crime Detection. -- ExploitabilityBirthMark: An Early Predictor of the Likelihood of Exploitation. |
| Record Nr. | UNINA-9911011655503321 |
Adi Kamel
|
||
| Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Foundations and Practice of Security : 17th International Symposium, FPS 2024, Montréal, QC, Canada, December 9–11, 2024, Revised Selected Papers, Part II / / edited by Kamel Adi, Simon Bourdeau, Christel Durand, Valérie Viet Triem Tong, Alina Dulipovici, Yvon Kermarrec, Joaquin Garcia-Alfaro
| Foundations and Practice of Security : 17th International Symposium, FPS 2024, Montréal, QC, Canada, December 9–11, 2024, Revised Selected Papers, Part II / / edited by Kamel Adi, Simon Bourdeau, Christel Durand, Valérie Viet Triem Tong, Alina Dulipovici, Yvon Kermarrec, Joaquin Garcia-Alfaro |
| Autore | Adi Kamel |
| Edizione | [1st ed. 2025.] |
| Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025 |
| Descrizione fisica | 1 online resource (319 pages) |
| Disciplina | 005.8 |
| Altri autori (Persone) |
BourdeauSimon
DurandChristel Viet Triem TongValérie DulipoviciAlina KermarrecYvon Garcia-AlfaroJoaquin |
| Collana | Lecture Notes in Computer Science |
| Soggetto topico |
Data protection
Computer engineering Computer networks Data and Information Security Computer Engineering and Networks Computer Communication Networks |
| ISBN | 3-031-87496-X |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | -- Preserving privacy and maintaining trust for end users in a complex and numeric cyberspace. -- Another Walk for Monchi. -- An Innovative DSSE Framework: Ensuring Data Privacy and Query Verification in Untrusted Cloud Environments. -- Privacy-Preserving Machine Learning Inference for Intrusion Detection. -- Priv-IoT: Privacy-preserving Machine Learning in IoT Utilizing TEE and Lightweight Ciphers. -- Intersecting security, privacy, and machine learning techniques to detect, mitigate, and prevent threats. -- LocalIntel: Generating Organizational Threat Intelligence from Global and Local Cyber Knowledge. -- Intelligent Green Efficiency for Intrusion Detection. -- A Privacy-Preserving Behavioral Authentication System. -- Automated Exploration of Optimal Neural Network Structures for Deepfake Detection. -- An Empirical Study of Black-box based Membership Inference Attacks on a Real-World Dataset. -- New trends of machine leaning and AI applied to cybersecurity. -- ModelForge: Using GenAI to Improve the Development of Security Protocols. -- Detecting Energy Attacks in the Battery-less Internet of Things . -- Is Expert-Labeled Data Worth the Cost? Exploring Active and Semi-Supervised Learning Across Imbalance Scenarios in Financial Crime Detection. -- ExploitabilityBirthMark: An Early Predictor of the Likelihood of Exploitation. |
| Record Nr. | UNISA-996664552803316 |
Adi Kamel
|
||
| Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Foundations and Practice of Security : 17th International Symposium, FPS 2024, Montréal, QC, Canada, December 9–11, 2024, Revised Selected Papers, Part I / / edited by Kamel Adi, Simon Bourdeau, Christel Durand, Valérie Viet Triem Tong, Alina Dulipovici, Yvon Kermarrec, Joaquin Garcia-Alfaro
| Foundations and Practice of Security : 17th International Symposium, FPS 2024, Montréal, QC, Canada, December 9–11, 2024, Revised Selected Papers, Part I / / edited by Kamel Adi, Simon Bourdeau, Christel Durand, Valérie Viet Triem Tong, Alina Dulipovici, Yvon Kermarrec, Joaquin Garcia-Alfaro |
| Edizione | [1st ed. 2025.] |
| Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025 |
| Descrizione fisica | 1 online resource (XVI, 416 p. 113 illus., 79 illus. in color.) |
| Disciplina | 005.8 |
| Collana | Lecture Notes in Computer Science |
| Soggetto topico |
Data protection
Computer engineering Computer networks Data and Information Security Computer Engineering and Networks Computer Communication Networks |
| ISBN | 3-031-87499-4 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | -- Critical issues of protecting systems against digital threats, considering financial, technological, and operational implications. -- The Perfect Victim? Family Offices as Targets for Cybercriminals. -- Advanced Real-Time Detection of Cyber Threat Information from Tweets. -- Mitigating spillover effects of ransomware in financial markets: Lessons from the LockBit attacks. -- Exploring Smart Speaker Disclosure and Adoption Intentions: A Privacy Adoption Calculus Perspective. -- ICoSSiuM: an Integrated Communication Security Simulator for Maritime operations. -- Automating and enhancing security mechanisms in software systems and data management. -- Lowering the Barrier: An Automatic Attack Flow Generation Framework for Non-Security Experts. -- An Approach to Determine a System’s Behavioural Security Posture. -- Secure Data Traceability for Mobile DataCollectors. -- Toward Automatic Enforcement of Security Patterns in Software Architecture Using Alloy. -- Cybersecurity and AI when applied to emerging technologies. -- Light-SABRE: A lightweight encrypted data distribution system for Internet of Things. -- Evaluating Large Language Models on Cybersecurity Knowledge and Skills: A Comparative Analysis. -- Drone Anomaly Detection: Dataset and Unsupervised Machine Learning. -- A Tool for Enabling Scalable Automation in Security Control Selection. -- Cybersecurity and Ethics. -- A Systematic Evaluation of Non-SDK Interface Restrictions in Android: Bridging the Gap Between Guidelines and Practice. -- An Approach for Handling Missing Attribute Values in Attribute-Based Access Control Policy Mining. -- Does Gender Matter? Examining and Mitigating Gender Bias in Fake News Detection. -- ProFineLlama: A Prompt and Fine-Tuned Transfer Learning Approach for Multi-Domain Fake News Detection. -- Parametric Automata for Dynamic Access Control Policies. -- Cybersecurity and privacy in connected and autonomous systems for IoT, smart environments, and critical infrastructure. -- Fingerprinting Connected Wi-Fi Devices Using Per-network MAC Addresses. -- Privacy Guard: Empowering Users with Privacy Labels and Intuitive Apps. -- Privacy Guard: Empowering Users with Privacy Labels and Intuitive Apps Substation Automation Security. -- Enhancing Autonomy of Context-Aware Self-Healing in Fog Native Environments. -- Detecting Cyber Attacks on Electric Vehicles Charging Stations. -- New trends in advanced cryptographic protocols. -- Secure Voting Protocol Using Balance Scale. -- Monitoring the execution of cryptographic functions. -- RouterORAM: An O(1)-latency and client-work ORAM. |
| Record Nr. | UNINA-9911001465803321 |
| Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Foundations and Practice of Security : 17th International Symposium, FPS 2024, Montréal, QC, Canada, December 9–11, 2024, Revised Selected Papers, Part I / / edited by Kamel Adi, Simon Bourdeau, Christel Durand, Valérie Viet Triem Tong, Alina Dulipovici, Yvon Kermarrec, Joaquin Garcia-Alfaro
| Foundations and Practice of Security : 17th International Symposium, FPS 2024, Montréal, QC, Canada, December 9–11, 2024, Revised Selected Papers, Part I / / edited by Kamel Adi, Simon Bourdeau, Christel Durand, Valérie Viet Triem Tong, Alina Dulipovici, Yvon Kermarrec, Joaquin Garcia-Alfaro |
| Edizione | [1st ed. 2025.] |
| Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025 |
| Descrizione fisica | 1 online resource (XVI, 416 p. 113 illus., 79 illus. in color.) |
| Disciplina | 005.8 |
| Collana | Lecture Notes in Computer Science |
| Soggetto topico |
Data protection
Computer engineering Computer networks Data and Information Security Computer Engineering and Networks Computer Communication Networks |
| ISBN | 3-031-87499-4 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | -- Critical issues of protecting systems against digital threats, considering financial, technological, and operational implications. -- The Perfect Victim? Family Offices as Targets for Cybercriminals. -- Advanced Real-Time Detection of Cyber Threat Information from Tweets. -- Mitigating spillover effects of ransomware in financial markets: Lessons from the LockBit attacks. -- Exploring Smart Speaker Disclosure and Adoption Intentions: A Privacy Adoption Calculus Perspective. -- ICoSSiuM: an Integrated Communication Security Simulator for Maritime operations. -- Automating and enhancing security mechanisms in software systems and data management. -- Lowering the Barrier: An Automatic Attack Flow Generation Framework for Non-Security Experts. -- An Approach to Determine a System’s Behavioural Security Posture. -- Secure Data Traceability for Mobile DataCollectors. -- Toward Automatic Enforcement of Security Patterns in Software Architecture Using Alloy. -- Cybersecurity and AI when applied to emerging technologies. -- Light-SABRE: A lightweight encrypted data distribution system for Internet of Things. -- Evaluating Large Language Models on Cybersecurity Knowledge and Skills: A Comparative Analysis. -- Drone Anomaly Detection: Dataset and Unsupervised Machine Learning. -- A Tool for Enabling Scalable Automation in Security Control Selection. -- Cybersecurity and Ethics. -- A Systematic Evaluation of Non-SDK Interface Restrictions in Android: Bridging the Gap Between Guidelines and Practice. -- An Approach for Handling Missing Attribute Values in Attribute-Based Access Control Policy Mining. -- Does Gender Matter? Examining and Mitigating Gender Bias in Fake News Detection. -- ProFineLlama: A Prompt and Fine-Tuned Transfer Learning Approach for Multi-Domain Fake News Detection. -- Parametric Automata for Dynamic Access Control Policies. -- Cybersecurity and privacy in connected and autonomous systems for IoT, smart environments, and critical infrastructure. -- Fingerprinting Connected Wi-Fi Devices Using Per-network MAC Addresses. -- Privacy Guard: Empowering Users with Privacy Labels and Intuitive Apps. -- Privacy Guard: Empowering Users with Privacy Labels and Intuitive Apps Substation Automation Security. -- Enhancing Autonomy of Context-Aware Self-Healing in Fog Native Environments. -- Detecting Cyber Attacks on Electric Vehicles Charging Stations. -- New trends in advanced cryptographic protocols. -- Secure Voting Protocol Using Balance Scale. -- Monitoring the execution of cryptographic functions. -- RouterORAM: An O(1)-latency and client-work ORAM. |
| Record Nr. | UNISA-996660365103316 |
| Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Reliable Software Technologies - Ada-Europe 2009 [[electronic resource] ] : 14th Ada-Europe International Conference, Brest, France, June 8-12, 2009, Proceedings / / edited by Fabrice Kordon, Yvon Kermarrec
| Reliable Software Technologies - Ada-Europe 2009 [[electronic resource] ] : 14th Ada-Europe International Conference, Brest, France, June 8-12, 2009, Proceedings / / edited by Fabrice Kordon, Yvon Kermarrec |
| Edizione | [1st ed. 2009.] |
| Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 |
| Descrizione fisica | 1 online resource (XIV, 283 p.) |
| Disciplina | 005.13322gerDNB |
| Collana | Programming and Software Engineering |
| Soggetto topico |
Software engineering
Computer programming Programming languages (Electronic computers) Computer system failures Computer software—Reusability Software Engineering/Programming and Operating Systems Software Engineering Programming Techniques Programming Languages, Compilers, Interpreters System Performance and Evaluation Performance and Reliability |
| Soggetto genere / forma |
Brest (Bretagne, 2009)
Kongress. |
| ISBN | 3-642-01924-2 |
| Classificazione |
DAT 263f
DAT 343f DAT 356f SS 4800 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Requirements on the Target Programming Language for High-Integrity MDE -- A Restricted Middleware Profile for High-Integrity Distributed Real-Time Systems -- Validating Safety and Security Requirements for Partitioned Architectures -- On Comparing Testing Criteria for Logical Decisions -- Model Checking Techniques for Test Generation from Business Process Models -- An Experience on Ada Programming Using On-Line Judging -- Weak Fairness Semantic Drawbacks in Java Multithreading -- Implementation of the Ada 2005 Task Dispatching Model in MaRTE OS and GNAT -- Combining EDF and FP Scheduling: Analysis and Implementation in Ada 2005 -- Predicated Worst-Case Execution-Time Analysis -- Implementing Reactive Systems with UML State Machines and Ada 2005 -- Modelling and Evaluating Real-Time Software Architectures -- A Formal Foundation for Metamodeling -- Modeling AADL Data Communication with BIP -- Formal Verification of AADL Specifications in the Topcased Environment -- Process-Algebraic Interpretation of AADL Models -- Ocarina : An Environment for AADL Models Analysis and Automatic Code Generation for High Integrity Applications -- Conceptual Modeling for System Requirements Enhancement -- Coloured Petri Nets for Chronicle Recognition. |
| Record Nr. | UNISA-996465606503316 |
| Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Reliable software technologies - Ada-Europe 2009 : 14th Ada-Europe International Conference on Reliable Software Technologies, Brest, France, June 8-12, 2009 ; proceedings / / Fabrice Kordon, Yvon Kermarrec (eds.)
| Reliable software technologies - Ada-Europe 2009 : 14th Ada-Europe International Conference on Reliable Software Technologies, Brest, France, June 8-12, 2009 ; proceedings / / Fabrice Kordon, Yvon Kermarrec (eds.) |
| Edizione | [1st ed. 2009.] |
| Pubbl/distr/stampa | Berlin ; ; New York, : Springer, 2009 |
| Descrizione fisica | 1 online resource (XIV, 283 p.) |
| Disciplina | 005.13322gerDNB |
| Altri autori (Persone) |
KordonFabrice
KermarrecYvon |
| Collana |
Lecture notes in computer science
LNCS sublibrary. SL 2, Programming and software engineering |
| Soggetto topico |
Computer software - Reliability
Ada (Computer program language) |
| ISBN | 3-642-01924-2 |
| Classificazione |
DAT 263f
DAT 343f DAT 356f SS 4800 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Requirements on the Target Programming Language for High-Integrity MDE -- A Restricted Middleware Profile for High-Integrity Distributed Real-Time Systems -- Validating Safety and Security Requirements for Partitioned Architectures -- On Comparing Testing Criteria for Logical Decisions -- Model Checking Techniques for Test Generation from Business Process Models -- An Experience on Ada Programming Using On-Line Judging -- Weak Fairness Semantic Drawbacks in Java Multithreading -- Implementation of the Ada 2005 Task Dispatching Model in MaRTE OS and GNAT -- Combining EDF and FP Scheduling: Analysis and Implementation in Ada 2005 -- Predicated Worst-Case Execution-Time Analysis -- Implementing Reactive Systems with UML State Machines and Ada 2005 -- Modelling and Evaluating Real-Time Software Architectures -- A Formal Foundation for Metamodeling -- Modeling AADL Data Communication with BIP -- Formal Verification of AADL Specifications in the Topcased Environment -- Process-Algebraic Interpretation of AADL Models -- Ocarina : An Environment for AADL Models Analysis and Automatic Code Generation for High Integrity Applications -- Conceptual Modeling for System Requirements Enhancement -- Coloured Petri Nets for Chronicle Recognition. |
| Altri titoli varianti |
Ada-Europe 2009
Ada-Europe International Conference on Reliable Software Technologies Fourteenth Ada-Europe International Conference on Reliable Software Technologies |
| Record Nr. | UNINA-9910484097603321 |
| Berlin ; ; New York, : Springer, 2009 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||