Advanced Topics in Systems Safety and Security
| Advanced Topics in Systems Safety and Security |
| Autore | Pricop Emil |
| Pubbl/distr/stampa | Basel, Switzerland, : MDPI - Multidisciplinary Digital Publishing Institute, 2021 |
| Descrizione fisica | 1 online resource (130 p.) |
| Soggetto topico | Technology: general issues |
| Soggetto non controllato |
alert correlation
Android applications attack evaluation attack forecasting attack prediction attack projection attack quantification attack tree attacker attacker behaviour attacker profile attacker skill level attributes Bayesian network Command and Control Citizen Security Center Command and Control Information System (C2IS) common vulnerability scoring system comparative review crime detection cyber attack distribution automation system early-stage detection features homeland security industrial control safety intelligent data analysis metrics multi-threading operational semantics reverse engineering Smali+ |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910557328103321 |
Pricop Emil
|
||
| Basel, Switzerland, : MDPI - Multidisciplinary Digital Publishing Institute, 2021 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Cyber Security
| Cyber Security |
| Autore | Dutta Nitul |
| Pubbl/distr/stampa | Singapore : , : Springer Singapore Pte. Limited, , 2021 |
| Descrizione fisica | 1 online resource (183 pages) |
| Altri autori (Persone) |
JadavNilesh
TanwarSudeep SarmaHiren Kumar Deva PricopEmil |
| Collana | Studies in Computational Intelligence Ser. |
| Soggetto genere / forma | Electronic books. |
| ISBN | 981-16-6597-4 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Intro -- Preface -- Contents -- About the Authors -- 1 Introduction to Cybersecurity -- 1 Introduction to Cybersecurity -- 1.1 Introduction -- 1.2 The Necessity of Cybersecurity -- 1.3 Cybersecurity and Ethics -- 2 Domains of Cybersecurity -- 3 Threats and Actors -- 3.1 Threats in Cyberspace -- 3.2 Types of Threats -- 3.3 Threat Actors and Types of Threat Actors -- 4 Recent Attacks -- 5 Awareness of Cybersecurity in Educational System -- 6 The Outline of the Book -- References -- 2 Being Hidden and Anonymous -- 1 Introduction -- 1.1 The Need for Anonymity -- 2 The Onion Router -- 3 Invisible Internet Project (IIP or I2P) -- 3.1 Working of I2P -- 4 Freenet -- 5 Java Anon Proxy (JAP) -- 6 Summary -- References -- 3 TOR-The Onion Router -- 1 Introduction -- 2 TOR-The Onion Router -- 2.1 Onion Routing -- 3 TOR Browser Installation -- 4 TOR Entities -- 5 TOR Status -- 6 TOR for Mobile-Orbot -- 7 Loopholes in TOR -- 8 What not to Use in TOR -- References -- 4 DarkNet and Hidden Services -- 1 Introduction -- 2 TOR and Its Hidden Service -- 3 Essential Concepts of TOR Hidden Services -- 4 Installation of Hidden Service in Linux -- 5 Countermeasures to Secure Your Own Hidden Service -- References -- 5 Introduction to Digital Forensics -- 1 Introduction to Forensics -- 2 Cyberforensic Process -- 3 Different Artifacts and Forensic Tools -- 3.1 Autopsy -- 3.2 DumpIt -- 3.3 Belkasoft Live RAM Capturer -- 4 Artifacts Gathering -- 4.1 Browser Artifacts -- 4.2 Registry Artifacts -- 4.3 Bulk Extractor -- 5 Network Forensics -- 5.1 ARP Cache Poisoning -- 5.2 Port Mirroring -- 5.3 Flooding -- 5.4 Dynamic Host Control Protocol (DHCP) Redirection -- 5.5 Detection of TOR Traffic in the Captured Traffic -- 6 Conclusion -- References -- 6 Intrusion Detection Systems Fundamentals -- 1 Introduction to Intrusion Detection System -- 2 Techniques to Combat Cyberthreats.
2.1 Firewall -- 2.2 Authentication -- 2.3 Authorization -- 2.4 Encryption -- 2.5 Intrusion Detection System -- 3 Network-Based Intrusion Detection System (NIDS) -- 4 Host-Based Intrusion Detection System (HIDS) -- 5 Distributed Intrusion Detection System (DIDS) -- 5.1 Signature-Based Analysis -- 5.2 Anomaly-Based Analysis -- 6 Snort-Network-Based Intrusion Detection System -- 6.1 Additional Snort Add-Ons -- 6.2 Installation of Snort in Linux -- 6.3 Snort Rules -- 6.4 Rule Header -- 6.5 Rules Options -- 7 Open-Source Host-Based Intrusion Detection System (OSSEC) -- 7.1 Installation of OSSEC in Linux -- 8 Summary -- References -- 7 Introduction to Malware Analysis -- 1 Introduction of Malware -- 2 Types of Malware -- 3 Malware Symptoms -- 4 Need of Malware Analysis and Spreading Mechanism -- 4.1 Need for Malware Analysis -- 4.2 Malware Spreading Mechanism -- 5 Malware Analysis Prerequisites -- 6 Malware Analysis Environment -- 7 Malware Detection System and Analysis -- 7.1 Malware Detection -- 7.2 Malware Analysis -- 8 Conclusion -- References -- 8 Design of a Virtual Cybersecurity Lab -- 1 Introduction of Cybersecurity -- 2 Tools for Cybersecurity -- 3 Virtualization for Cybersecurity -- 4 Installation and Configuration of VMWare Workstation -- 5 Network Modes in Virtual Machines -- 6 Cybersecurity and Various Attacks -- 7 Defense Strategies Against Various Attacks -- 8 Case Study on Website Attacks -- 9 Conclusion -- References -- 9 Importance of Cyberlaw -- 1 Introduction -- 2 Why Cyberlaw is Necessary -- 3 Global Landscape of Cyberlaw -- 4 Cybercrimes -- 4.1 Categories of Cybercrime -- 4.2 Types of Cybercrime -- 5 Conclusion -- References. |
| Altri titoli varianti | Cyber Security |
| Record Nr. | UNINA-9910508473403321 |
Dutta Nitul
|
||
| Singapore : , : Springer Singapore Pte. Limited, , 2021 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Emerging Trends and Technologies on Intelligent Systems : Proceedings of 4th International Conference ETTIS 2024 / / edited by Arti Noor, Kriti Saroha, Emil Pricop, Abhijit Sen, Gaurav Trivedi
| Emerging Trends and Technologies on Intelligent Systems : Proceedings of 4th International Conference ETTIS 2024 / / edited by Arti Noor, Kriti Saroha, Emil Pricop, Abhijit Sen, Gaurav Trivedi |
| Autore | Noor Arti |
| Edizione | [1st ed. 2025.] |
| Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2025 |
| Descrizione fisica | 1 online resource (921 pages) |
| Disciplina | 006.3 |
| Altri autori (Persone) |
SarohaKriti
PricopEmil SenAbhijit TrivediGaurav |
| Collana | Lecture Notes in Networks and Systems |
| Soggetto topico |
Computational intelligence
Artificial intelligence Telecommunication Computational Intelligence Artificial Intelligence Communications Engineering, Networks |
| ISBN |
9789819757039
9819757037 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | 1. Urban Greens An Initiative Towards Clean Air -- 2. Detection of Cross-Site Scripting Attack using Bagging Ensemble Learning -- 3. A Blockchain based Land Registration System in the Indian context incorporating mortgage and legal aspects -- 4. Advanced Neural Network MRI Evaluation for Automated Knee Trauma Detection -- 5. Genetic Algorithm-Based Probability Distribution Fitting for Improved Classification of Echocardiogram Regions -- 6. A review of Digital Twin and the Metaverse from the standpoint of smart factories -- 7. Predicting Ocean Currents A Deep Learning Approach. |
| Record Nr. | UNINA-9910984586603321 |
Noor Arti
|
||
| Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2025 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Proceedings of Third Emerging Trends and Technologies on Intelligent Systems : ETTIS 2023 / / edited by Arti Noor, Kriti Saroha, Emil Pricop, Abhijit Sen, Gaurav Trivedi
| Proceedings of Third Emerging Trends and Technologies on Intelligent Systems : ETTIS 2023 / / edited by Arti Noor, Kriti Saroha, Emil Pricop, Abhijit Sen, Gaurav Trivedi |
| Autore | Noor Arti |
| Edizione | [1st ed. 2023.] |
| Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 |
| Descrizione fisica | 1 online resource (745 pages) |
| Disciplina | 006.3 |
| Altri autori (Persone) |
SarohaKriti
PricopEmil SenAbhijit TrivediGaurav |
| Collana | Lecture Notes in Networks and Systems |
| Soggetto topico |
Computational intelligence
Artificial intelligence Telecommunication Computational Intelligence Artificial Intelligence Communications Engineering, Networks |
| ISBN |
9789819939633
9819939631 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Hybrid Architecture for Traffic Light Recognition Using Deep CNN and Ensemble Machine Learning Model -- Multi-Step Online Hate Speech Detection and Classification using Sentiment and Sarcasm Features -- Forecasting of Electrical Energy Consumption and Power Generation from Wind Energy Using Deep Learning Algorithms -- IoT-Based Monitoring System for Hydroponics: Design and Implementation -- Review of Single Imputation and Multiple Imputation techniques for handling missing values -- Brain Tumour: Analysis with Resolution Enhancement Methods using Machine Learning Techniques -- Network Intrusion Detection System using Machine Learning -- A Survey on Indian Sign Language Translation using Artificial Intelligence -- Analyzing the Involvement of various Similarity Measures in Trust and Distrust based Recommender System -- A Novel Approach for Detection of Soybean Leaf Disease Using Bayesian Optimized-KNN Classifier with NCA Based Feature Selection -- Survey Paper on Detection of Water Bodies in Satellite Imagery -- A provably secure ECC-based key distribution scheme for secure message transmission in Vehicular Ad hoc Networks -- Approach for Ranking in Recommender System using Hinge Loss Function -- Implementing GANs for image generation and spectral normalization -- Design of Blockchain Mining Algorithms for ASIC Implementation -- Tabular Data Interpretation on Covid-19 Through Explainable Machine Learning -- Comparison of Sentinel and Landsat data sets over Lucknow region using Gradient Tree Boost supervised classifier -- AutoMeta- an Integrated Car Identification System Based on Blockchain -- Recognition and Replacement of Handwritten Text into Digitized Text -- Facial Expression Recognition Based on Convolution Neural Networks and Edge Computing. |
| Record Nr. | UNINA-9910746299703321 |
Noor Arti
|
||
| Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Recent Advances in Systems Safety and Security / / edited by Emil Pricop, Grigore Stamatescu
| Recent Advances in Systems Safety and Security / / edited by Emil Pricop, Grigore Stamatescu |
| Edizione | [1st ed. 2016.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
| Descrizione fisica | 1 online resource (XI, 262 p. 104 illus., 66 illus. in color.) |
| Disciplina | 005.8 |
| Collana | Studies in Systems, Decision and Control |
| Soggetto topico |
Computational intelligence
Electrical engineering Computer security Computational Intelligence Communications Engineering, Networks Systems and Data Security |
| ISBN | 3-319-32525-6 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | The Theory of Witness Functions -- Quantification of Centralized/Distributed Secrecy in Stochastic Discrete Event Systems -- Framework for Cognitive Radio Deployment in Large Scale WSN-UAV Surveillance -- Using Modeling and Dynamic Simulation Techniques for Systems' Safety and Security -- HAZOP-based Security Analysis for Embedded Systems: Case Study of Open Source Immobilizer Protocol Stack -- Multimodal Heterogeneous Monitoring Of Super-Extended Objects: Modern View -- Image Based Control of a Simple Mobile Robotic System -- On using a Cloud-Based Approach to Develop a Mobile Asset Management Solution -- Execution of an IEC61499 Application on a Remote Server -- Evolution of Legal Issues of Honey nets -- A Risk Screening System by Network Diagram Recognition for Information Security Audit -- Risk Analysis and Optimal Model for Efficiency of Reengineering the Independent Power Grids -- Innovative Fuzzy Approach on Analyzing Industrial Control Systems -- IPv6 Sensor Networks Modeling for Security and Communication Evaluation. |
| Record Nr. | UNINA-9910254225003321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Recent Developments on Industrial Control Systems Resilience / / edited by Emil Pricop, Jaouhar Fattahi, Nitul Dutta, Mariam Ibrahim
| Recent Developments on Industrial Control Systems Resilience / / edited by Emil Pricop, Jaouhar Fattahi, Nitul Dutta, Mariam Ibrahim |
| Edizione | [1st ed. 2020.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
| Descrizione fisica | 1 online resource (XIV, 333 p.) |
| Disciplina | 629.8 |
| Collana | Studies in Systems, Decision and Control |
| Soggetto topico |
Automatic control
Computer engineering Internet of things Embedded computer systems Control and Systems Theory Cyber-physical systems, IoT |
| ISBN | 3-030-31328-X |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Safety Instrumented Systems Analysis -- Risks assessment of critical industrial control systems -- Machine Learning based Predictive Maintenance of Infrastructure Facilities in the Cryolithozone -- Cybersecurity Threats, Vulnerability and Analysis in Safety Critical Industrial Control System (ICS) -- Automatic Attack Graph Generation for Industrial Controlled Systems -- Determining Resiliency Using Attack Graphs -- Modern methods for analyzing malware targeting control systems -- Multi-stage cyber-attacks detection in the Industrial Control Systems -- Using Honeypots for ICS threats evaluation -- Intrusion detection on ICS and SCADA networks -- Security evaluation of sensor networks -- Innovative hardware-based cybersecurity solutions -- Legal issues of deception systems in the Industrial Control Systems. |
| Record Nr. | UNINA-9910484156903321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||