top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Advanced Topics in Systems Safety and Security
Advanced Topics in Systems Safety and Security
Autore Pricop Emil
Pubbl/distr/stampa Basel, Switzerland, : MDPI - Multidisciplinary Digital Publishing Institute, 2021
Descrizione fisica 1 electronic resource (130 p.)
Soggetto topico Technology: general issues
Soggetto non controllato industrial control safety
attack quantification
common vulnerability scoring system
attack tree
distribution automation system
Command and Control Citizen Security Center
Command and Control Information System (C2IS)
crime detection
homeland security
Android applications
multi-threading
operational semantics
reverse engineering
Smali+
cyber attack
attacker
attacker profile
attacker behaviour
metrics
features
attributes
intelligent data analysis
attack forecasting
comparative review
alert correlation
attack evaluation
attacker skill level
attack prediction
attack projection
early-stage detection
Bayesian network
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910557328103321
Pricop Emil  
Basel, Switzerland, : MDPI - Multidisciplinary Digital Publishing Institute, 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber Security
Cyber Security
Autore Dutta Nitul
Pubbl/distr/stampa Singapore : , : Springer Singapore Pte. Limited, , 2021
Descrizione fisica 1 online resource (183 pages)
Altri autori (Persone) JadavNilesh
TanwarSudeep
SarmaHiren Kumar Deva
PricopEmil
Collana Studies in Computational Intelligence Ser.
Soggetto genere / forma Electronic books.
ISBN 981-16-6597-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Contents -- About the Authors -- 1 Introduction to Cybersecurity -- 1 Introduction to Cybersecurity -- 1.1 Introduction -- 1.2 The Necessity of Cybersecurity -- 1.3 Cybersecurity and Ethics -- 2 Domains of Cybersecurity -- 3 Threats and Actors -- 3.1 Threats in Cyberspace -- 3.2 Types of Threats -- 3.3 Threat Actors and Types of Threat Actors -- 4 Recent Attacks -- 5 Awareness of Cybersecurity in Educational System -- 6 The Outline of the Book -- References -- 2 Being Hidden and Anonymous -- 1 Introduction -- 1.1 The Need for Anonymity -- 2 The Onion Router -- 3 Invisible Internet Project (IIP or I2P) -- 3.1 Working of I2P -- 4 Freenet -- 5 Java Anon Proxy (JAP) -- 6 Summary -- References -- 3 TOR-The Onion Router -- 1 Introduction -- 2 TOR-The Onion Router -- 2.1 Onion Routing -- 3 TOR Browser Installation -- 4 TOR Entities -- 5 TOR Status -- 6 TOR for Mobile-Orbot -- 7 Loopholes in TOR -- 8 What not to Use in TOR -- References -- 4 DarkNet and Hidden Services -- 1 Introduction -- 2 TOR and Its Hidden Service -- 3 Essential Concepts of TOR Hidden Services -- 4 Installation of Hidden Service in Linux -- 5 Countermeasures to Secure Your Own Hidden Service -- References -- 5 Introduction to Digital Forensics -- 1 Introduction to Forensics -- 2 Cyberforensic Process -- 3 Different Artifacts and Forensic Tools -- 3.1 Autopsy -- 3.2 DumpIt -- 3.3 Belkasoft Live RAM Capturer -- 4 Artifacts Gathering -- 4.1 Browser Artifacts -- 4.2 Registry Artifacts -- 4.3 Bulk Extractor -- 5 Network Forensics -- 5.1 ARP Cache Poisoning -- 5.2 Port Mirroring -- 5.3 Flooding -- 5.4 Dynamic Host Control Protocol (DHCP) Redirection -- 5.5 Detection of TOR Traffic in the Captured Traffic -- 6 Conclusion -- References -- 6 Intrusion Detection Systems Fundamentals -- 1 Introduction to Intrusion Detection System -- 2 Techniques to Combat Cyberthreats.
2.1 Firewall -- 2.2 Authentication -- 2.3 Authorization -- 2.4 Encryption -- 2.5 Intrusion Detection System -- 3 Network-Based Intrusion Detection System (NIDS) -- 4 Host-Based Intrusion Detection System (HIDS) -- 5 Distributed Intrusion Detection System (DIDS) -- 5.1 Signature-Based Analysis -- 5.2 Anomaly-Based Analysis -- 6 Snort-Network-Based Intrusion Detection System -- 6.1 Additional Snort Add-Ons -- 6.2 Installation of Snort in Linux -- 6.3 Snort Rules -- 6.4 Rule Header -- 6.5 Rules Options -- 7 Open-Source Host-Based Intrusion Detection System (OSSEC) -- 7.1 Installation of OSSEC in Linux -- 8 Summary -- References -- 7 Introduction to Malware Analysis -- 1 Introduction of Malware -- 2 Types of Malware -- 3 Malware Symptoms -- 4 Need of Malware Analysis and Spreading Mechanism -- 4.1 Need for Malware Analysis -- 4.2 Malware Spreading Mechanism -- 5 Malware Analysis Prerequisites -- 6 Malware Analysis Environment -- 7 Malware Detection System and Analysis -- 7.1 Malware Detection -- 7.2 Malware Analysis -- 8 Conclusion -- References -- 8 Design of a Virtual Cybersecurity Lab -- 1 Introduction of Cybersecurity -- 2 Tools for Cybersecurity -- 3 Virtualization for Cybersecurity -- 4 Installation and Configuration of VMWare Workstation -- 5 Network Modes in Virtual Machines -- 6 Cybersecurity and Various Attacks -- 7 Defense Strategies Against Various Attacks -- 8 Case Study on Website Attacks -- 9 Conclusion -- References -- 9 Importance of Cyberlaw -- 1 Introduction -- 2 Why Cyberlaw is Necessary -- 3 Global Landscape of Cyberlaw -- 4 Cybercrimes -- 4.1 Categories of Cybercrime -- 4.2 Types of Cybercrime -- 5 Conclusion -- References.
Altri titoli varianti Cyber Security
Record Nr. UNINA-9910508473403321
Dutta Nitul  
Singapore : , : Springer Singapore Pte. Limited, , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Proceedings of Third Emerging Trends and Technologies on Intelligent Systems : Ettis 2023
Proceedings of Third Emerging Trends and Technologies on Intelligent Systems : Ettis 2023
Autore Noor Arti
Edizione [1st ed.]
Pubbl/distr/stampa Singapore : , : Springer, , 2023
Descrizione fisica 1 online resource (745 pages)
Disciplina 006.3
Altri autori (Persone) SarohaKriti
PricopEmil
SenAbhijit
TrivediGaurav
Collana Lecture Notes in Networks and Systems Series
Soggetto topico Artificial intelligence
Machine learning
ISBN 981-9939-63-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Preface -- Contents -- Editors and Contributors -- Blockchain Technology and Its Impact on the Accounting -- 1 Introduction -- 2 Presentation of the Blockchain Technology -- 3 Literature Review -- 4 A Transformation of Accounting -- 4.1 Blockchain: A New Accounting Technology -- 4.2 When Could Blockchain Be Applied to Accounting? -- 5 Conclusion -- References -- WORK-PERF: An Intelligent Predictive Model for Work Performance Rating -- 1 Introduction -- 2 Review of Related Works -- 3 Methodology -- 3.1 Data Collection and Pre-processing -- 3.2 The WORK-PERF’s Model Development -- 3.3 Model Training and Testing -- 4 The WORK-PERF’s Rating and Evaluation Results -- 5 Discussions and Conclusion -- References -- Federated Machine Learning Architecture for Heterogeneous Quantum Devices -- 1 Introduction -- 1.1 Objective -- 2 Related Work -- 3 Proposed Scheme -- 4 Performance Analysis -- 5 Summary and Future Work -- References
Record Nr. UNINA-9910746299703321
Noor Arti  
Singapore : , : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Recent Advances in Systems Safety and Security / / edited by Emil Pricop, Grigore Stamatescu
Recent Advances in Systems Safety and Security / / edited by Emil Pricop, Grigore Stamatescu
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (XI, 262 p. 104 illus., 66 illus. in color.)
Disciplina 005.8
Collana Studies in Systems, Decision and Control
Soggetto topico Computational intelligence
Electrical engineering
Computer security
Computational Intelligence
Communications Engineering, Networks
Systems and Data Security
ISBN 3-319-32525-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto The Theory of Witness Functions -- Quantification of Centralized/Distributed Secrecy in Stochastic Discrete Event Systems -- Framework for Cognitive Radio Deployment in Large Scale WSN-UAV Surveillance -- Using Modeling and Dynamic Simulation Techniques for Systems' Safety and Security -- HAZOP-based Security Analysis for Embedded Systems: Case Study of Open Source Immobilizer Protocol Stack -- Multimodal Heterogeneous Monitoring Of Super-Extended Objects: Modern View -- Image Based Control of a Simple Mobile Robotic System -- On using a Cloud-Based Approach to Develop a Mobile Asset Management Solution -- Execution of an IEC61499 Application on a Remote Server -- Evolution of Legal Issues of Honey nets -- A Risk Screening System by Network Diagram Recognition for Information Security Audit -- Risk Analysis and Optimal Model for Efficiency of Reengineering the Independent Power Grids -- Innovative Fuzzy Approach on Analyzing Industrial Control Systems -- IPv6 Sensor Networks Modeling for Security and Communication Evaluation.
Record Nr. UNINA-9910254225003321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Recent Developments on Industrial Control Systems Resilience / / edited by Emil Pricop, Jaouhar Fattahi, Nitul Dutta, Mariam Ibrahim
Recent Developments on Industrial Control Systems Resilience / / edited by Emil Pricop, Jaouhar Fattahi, Nitul Dutta, Mariam Ibrahim
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (XIV, 333 p.)
Disciplina 629.8
Collana Studies in Systems, Decision and Control
Soggetto topico Control engineering
Computer engineering
Internet of things
Embedded computer systems
Control and Systems Theory
Cyber-physical systems, IoT
ISBN 3-030-31328-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Safety Instrumented Systems Analysis -- Risks assessment of critical industrial control systems -- Machine Learning based Predictive Maintenance of Infrastructure Facilities in the Cryolithozone -- Cybersecurity Threats, Vulnerability and Analysis in Safety Critical Industrial Control System (ICS) -- Automatic Attack Graph Generation for Industrial Controlled Systems -- Determining Resiliency Using Attack Graphs -- Modern methods for analyzing malware targeting control systems -- Multi-stage cyber-attacks detection in the Industrial Control Systems -- Using Honeypots for ICS threats evaluation -- Intrusion detection on ICS and SCADA networks -- Security evaluation of sensor networks -- Innovative hardware-based cybersecurity solutions -- Legal issues of deception systems in the Industrial Control Systems.
Record Nr. UNINA-9910484156903321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui