Cyber security : critical infrastructure protection / / Martti Lehto, Pekka Neittaanmäki, editors |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer Nature Switzerland AG, , [2022] |
Descrizione fisica | 1 online resource (487 pages) |
Disciplina | 364.168 |
Collana | Computational methods in applied sciences |
Soggetto topico |
Cooperating objects (Computer systems)
Data protection Computer crimes |
ISBN | 3-030-91293-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910558483803321 |
Cham, Switzerland : , : Springer Nature Switzerland AG, , [2022] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyber security : critical infrastructure protection / / Martti Lehto, Pekka Neittaanmäki, editors |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer Nature Switzerland AG, , [2022] |
Descrizione fisica | 1 online resource (487 pages) |
Disciplina | 364.168 |
Collana | Computational methods in applied sciences |
Soggetto topico |
Cooperating objects (Computer systems)
Data protection Computer crimes |
ISBN | 3-030-91293-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996472067503316 |
Cham, Switzerland : , : Springer Nature Switzerland AG, , [2022] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Cyber Security: Analytics, Technology and Automation / / edited by Martti Lehto, Pekka Neittaanmäki |
Edizione | [1st ed. 2015.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 |
Descrizione fisica | 1 online resource (268 p.) |
Disciplina |
004
005.8 621.382 621.389 |
Collana | Intelligent Systems, Control and Automation: Science and Engineering |
Soggetto topico |
Computer security
Electrical engineering System safety Systems and Data Security Communications Engineering, Networks Security Science and Technology |
ISBN | 3-319-18302-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Part I Cyber World Today -- 1 Phenomenon in the Cyber World -- 2 Cyber World as a Social System -- 3 Citizens in Cyber World – Despatches from the Virtual "Clinic" -- 4 Powers and Fundamental Rights in Cyber Security -- Part II: Cyber Security Threats, Legality and Strategy -- 1 Coder, Hacker, Soldier, Spy -- 2 Cyber Warfare -- 3 Deception in the Cyber-World -- 4 Legal Framework of Cyber Security -- 5 Finnish Cyber Security Strategy and Implementation -- Part III Cyber Security Technology -- 1 Clustering-Based Protocol Classification via Dimensionality Reduction -- 2 Timing and Side Channel Attacks -- 3 Knowledge Discovery from Network Logs -- 4 Trusted Computing and DRM -- Part IV Cyber Security and Automation -- 1 Cyber Security and Protection of ICS Systems: An Australian Example -- 2 Towards Dependable Automation -- 3 Specialized Honeypots for SCADA Systems. |
Record Nr. | UNINA-9910299816603321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyber Security: Power and Technology / / edited by Martti Lehto, Pekka Neittaanmäki |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
Descrizione fisica | 1 online resource (VIII, 288 p. 57 illus., 38 illus. in color.) |
Disciplina | 621.382 |
Collana | Intelligent Systems, Control and Automation: Science and Engineering |
Soggetto topico |
Electrical engineering
Computer security Computers Management information systems Computer science Communications Engineering, Networks Systems and Data Security Models and Principles Management of Computing and Information Systems |
ISBN | 3-319-75307-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | I Cyber Power -- 1 Developing Political Response Framework to Cyber Hostilities -- 2 The modern strategies in the cyber warfare -- 3 Cyber Security Strategy Implementation Architecture in a Value System -- 4 Jedis and Starmen - Cyber in the Service of the Light Side of the Force -- 5 Junk information in hybrid warfare – The rhizomatic speed of social media in the spamosphere -- II Cyber in the Service of the Light Side of the Force -- 6 Real-time application-layer DDoS attacks detection in encrypted traffic -- 7 Domain Generation Algorithms (DGA) detection using machine learning methods -- 8 Tailorable Representation of Security Control Catalog on Semantic Wiki -- 9 Password Cracking -- 10 Game Console attacking -- 11 OS Attacks -- 12 Honeypot utilization for network intrusion detection -- 13 Testing framework for intrusion detection systems in encrypted traffic -- 14 Security Challenges of IoT-based Smart Home Appliances. |
Record Nr. | UNINA-9910299950303321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|