Blockchain Scalability [[electronic resource] /] / edited by Wuhui Chen, Zibin Zheng, Huawei Huang
| Blockchain Scalability [[electronic resource] /] / edited by Wuhui Chen, Zibin Zheng, Huawei Huang |
| Autore | Zheng Zibin |
| Edizione | [1st ed. 2023.] |
| Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 |
| Descrizione fisica | 1 online resource (243 pages) |
| Disciplina | 005.74 |
| Altri autori (Persone) |
ChenWuhui
HuangHuawei |
| Soggetto topico |
Blockchains (Databases)
Electronic digital computers - Evaluation Computer security Computer networks Blockchain System Performance and Evaluation Principles and Models of Security Computer Communication Networks |
| ISBN | 981-9910-59-5 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Chapter 1. Blockchain Scalability Fundamentals -- Chapter 2. Overview to Blockchain Scalability Challenges and Solutions -- Chapter 3. On-Chain and Off-Chain Scalability Techniques -- Chapter 4. Layered Sharding on Open Blockchain -- Chapter 5. Sharding-Based Scalable Consortium Blockchain -- Chapter 6. State Sharding for Permissioned Blockchain -- Chapter 7. Elastic Resource Allocation in Sharding-Based Blockchains -- Chapter 8. Dynamic Sharding: A Trade-OFF Between Security and Scalability -- Chapter 9. A Scalable and Secure Framework for 5G Networks Applications. |
| Record Nr. | UNISA-996546845103316 |
Zheng Zibin
|
||
| Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Blockchain Scalability / / edited by Wuhui Chen, Zibin Zheng, Huawei Huang
| Blockchain Scalability / / edited by Wuhui Chen, Zibin Zheng, Huawei Huang |
| Autore | Zheng Zibin |
| Edizione | [1st ed. 2023.] |
| Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 |
| Descrizione fisica | 1 online resource (243 pages) |
| Disciplina | 005.74 |
| Altri autori (Persone) |
ChenWuhui
HuangHuawei |
| Soggetto topico |
Blockchains (Databases)
Electronic digital computers - Evaluation Computer security Computer networks Blockchain System Performance and Evaluation Principles and Models of Security Computer Communication Networks |
| ISBN |
9789819910595
9819910595 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Chapter 1. Blockchain Scalability Fundamentals -- Chapter 2. Overview to Blockchain Scalability Challenges and Solutions -- Chapter 3. On-Chain and Off-Chain Scalability Techniques -- Chapter 4. Layered Sharding on Open Blockchain -- Chapter 5. Sharding-Based Scalable Consortium Blockchain -- Chapter 6. State Sharding for Permissioned Blockchain -- Chapter 7. Elastic Resource Allocation in Sharding-Based Blockchains -- Chapter 8. Dynamic Sharding: A Trade-OFF Between Security and Scalability -- Chapter 9. A Scalable and Secure Framework for 5G Networks Applications. |
| Record Nr. | UNINA-9910734875903321 |
Zheng Zibin
|
||
| Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Bring Your Own Device Security Policy Compliance Framework / / by Rathika Palanisamy, Azah Anir Norman, Miss Laiha Mat Kiah, Tutut Herawan
| Bring Your Own Device Security Policy Compliance Framework / / by Rathika Palanisamy, Azah Anir Norman, Miss Laiha Mat Kiah, Tutut Herawan |
| Autore | Palanisamy Rathika |
| Edizione | [1st ed. 2025.] |
| Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025 |
| Descrizione fisica | 1 online resource (XXII, 196 p. 26 illus., 13 illus. in color.) |
| Disciplina | 620.00285 |
| Collana | Information Systems Engineering and Management |
| Soggetto topico |
Engineering - Data processing
Data protection Computer security Computer networks - Security measures Data Engineering Data and Information Security Security Services Principles and Models of Security Mobile and Network Security |
| ISBN | 3-031-86801-3 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Introduction -- Bring Your Own Device -- Theoretical Framework and Hypotheses Development -- Research Methodology -- Analysis, Results and Discussion -- Conclusion and Future Work. |
| Record Nr. | UNINA-9910991163803321 |
Palanisamy Rathika
|
||
| Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Computational Color Imaging : 8th International Workshop, CCIW 2024, Milan, Italy, September 25–27, 2024, Proceedings / / edited by Raimondo Schettini, Alain Trémeau, Shoji Tominaga, Simone Bianco, Marco Buzzelli
| Computational Color Imaging : 8th International Workshop, CCIW 2024, Milan, Italy, September 25–27, 2024, Proceedings / / edited by Raimondo Schettini, Alain Trémeau, Shoji Tominaga, Simone Bianco, Marco Buzzelli |
| Edizione | [1st ed. 2025.] |
| Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025 |
| Descrizione fisica | 1 online resource (XIX, 290 p. 132 illus., 107 illus. in color.) |
| Disciplina | 006.37 |
| Collana | Lecture Notes in Computer Science |
| Soggetto topico |
Computer vision
Computer security Artificial intelligence Signal processing Computer Vision Principles and Models of Security Artificial Intelligence Signal, Speech and Image Processing |
| ISBN |
9783031728457
3031728459 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | -- Color Theory and Spaces. -- Atomic color: from points to probability distributions. -- Extended Wien and Planck Loci. -- Uniform Color Space with Advanced Hue Linearity: PCS23-UCS. -- Color difference in context: an experiment. -- Image Enhancement and Retinex Theory. -- Exploiting Milano Retinex Contrast to Enhance Images with Strong Changes of Light Intensity. -- Intrinsic Image Decomposition based on Retinex Theory, Superpixel Segmentation and Scale-Space Computations. -- Hyperspectral and Spectral Imaging. -- VNIR and SWIR hyperspectral imaging for the study of Picasso paintings. -- Stabilization of the spectral power distribution of a tunable multichannel LED lighting system. -- Low light hyperspectral imaging using HDR methods. -- Spectral Imaging Methods for Estimating Fluorescence Emission Spectra from Plant Grains and Leaves. -- Stitching from spectral filter array video sequences. -- Printing and Machine Learning Applications. -- Dithering with Pascal Cellular Automata. -- From Gutenberg to Llamas: print optimization through first principles and AI. -- Instance-based CycleGAN for object segmentation with few annotations. -- ChromaPose: Robustness of 2D Pose Estimation Under Different Color Illuminations. -- Perceptual Quality, Medical Imaging, and Art Applications. -- Investigation of Image Features for Perceptually Equivalent Gloss Reproduction through Comparison of Real Objects and Images. -- Classification of lung nodules on CT via pseudo-colour images and deep features from pre-trained convolutional networks. -- Painter Verification Using Color Palettes: An Exploratory Study. -- Color Constancy. -- Illuminant Equivariant Networks for Computational Color Constancy. -- Revisiting Color Constancy Using CNNs: Including Recent Observations. -- Enforcing temporal consistency for color constancy in video sequences. |
| Record Nr. | UNINA-9910983379103321 |
| Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
The coupling of safety and security : exploring interrelations in theory and practice / / edited by Corinne Bieder, Kenneth Pettersen Gould
| The coupling of safety and security : exploring interrelations in theory and practice / / edited by Corinne Bieder, Kenneth Pettersen Gould |
| Autore | Bieder Corinne |
| Pubbl/distr/stampa | Springer Nature, 2020 |
| Descrizione fisica | 1 online resource (viii, 113 pages) : illustrations; digital, PDF file(s) |
| Disciplina | 658.56 |
| Collana |
SpringerBriefs in Applied Sciences and Technology
SpringerBriefs in Safety Management |
| Soggetto topico |
Quality control
Reliability Industrial safety Computer security Public safety System safety Industrial organization Quality Control, Reliability, Safety and Risk Principles and Models of Security Crime Control and Security Security Science and Technology Industrial Organization |
| Soggetto non controllato |
Quality Control, Reliability, Safety and Risk
Principles and Models of Security Crime Control and Security Security Science and Technology Industrial Organization Industrial and Production Engineering Safety Management Security Management Safety and Security High Risk Organizations Risk Management Safety Security Efficiency Security Interfaces Open Access Reliability engineering Computer security Crime & criminology Security & fire alarm systems Economics of industrial organisation |
| ISBN | 3-030-47229-9 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | 1. Safety and Security: The Challenges of Bringing them Together -- 2. The Concepts of Risk, Safety and Security: A Fundamental Exploration and Understanding of Similarities and Differences -- 3. Safety and Security are Two Sides of the Same Coin -- 4. Safety vs Security in Aviation -- 6. Security and Safety Culture - Dual or Distinct Phenomena? |
| Record Nr. | UNINA-9910416527703321 |
Bieder Corinne
|
||
| Springer Nature, 2020 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Cyber Deception : Techniques, Strategies, and Human Aspects / / edited by Tiffany Bao, Milind Tambe, Cliff Wang
| Cyber Deception : Techniques, Strategies, and Human Aspects / / edited by Tiffany Bao, Milind Tambe, Cliff Wang |
| Edizione | [1st ed. 2023.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 |
| Descrizione fisica | 1 online resource (252 pages) |
| Disciplina | 005.8 |
| Collana | Advances in Information Security |
| Soggetto topico |
Data protection
User interfaces (Computer systems) Human-computer interaction Machine learning Computer security Data and Information Security User Interfaces and Human Computer Interaction Machine Learning Principles and Models of Security |
| ISBN |
9783031166136
3031166132 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | 1. Diversifying Deception: Game Theoretic Models for Two-Sided and Layered Deception -- 2. Human-Subject Experiments on Risk-based Cyber Camouflage Games -- 3. Adaptive Cyberdefense with Deception: A Human-AI Cognitive Approach -- 4. Cognitive Modeling for Personalized, Adaptive Signaling for Cyber Deception -- 5. Deceptive Signaling: Understanding Human Behavior against Signaling algorithms -- 6. Optimizing Honey Traffic Using Game Theory and Adversarial Learning -- 7. Mee: Adaptive Honeyfile System for Insider Attacker Detection -- 8. HoneyPLC: A Next-Generation Honeypot for Industrial Control Systems -- 9. Using Amnesia to Detect Credential Database Breaches -- 10. Deceiving ML-Based Friend-or-Foe Identification for Executables. |
| Record Nr. | UNINA-9910682584603321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Cyber Resilience System Engineering Empowered by Endogenous Security and Safety / / by Jiangxing Wu
| Cyber Resilience System Engineering Empowered by Endogenous Security and Safety / / by Jiangxing Wu |
| Autore | Wu Jiangxing |
| Edizione | [1st ed. 2024.] |
| Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024 |
| Descrizione fisica | 1 online resource (533 pages) |
| Disciplina | 004.22 |
| Soggetto topico |
Computer networks - Security measures
Computer security Cryptography Data encryption (Computer science) Mobile and Network Security Principles and Models of Security Cryptology |
| ISBN |
9789819701162
9819701163 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Chapter 1. Cyberspace Endogenous Security and Safety Problems -- Chapter 2. Cyberspace Endogenous Security and Safety Defense Vision -- Chapter 3. The Principle and Structure of Cyberspace Endogenous Security and Safety -- Chapter 4. Introduction to Functional Safety and Cyber Resilience -- Chapter 5. The Framework of Cyber Resilience Engineering Empowered by Endogenous Security and Safety -- Chapter 6. Metrics and Assessment of ESS-Empowered Cyber Resilience -- Chapter 7. Engineering Applications in Typical Fields of ESS Empowerment -- Chapter 8. Exploration of Emerging Fields Empowered by Endogenous Security and Safety -- Appendix. |
| Record Nr. | UNINA-9910899890803321 |
Wu Jiangxing
|
||
| Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Cybersecurity Education and Training / / by Razvan Beuran
| Cybersecurity Education and Training / / by Razvan Beuran |
| Autore | Beuran Razvan |
| Edizione | [1st ed. 2025.] |
| Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2025 |
| Descrizione fisica | 1 online resource (XVI, 323 p. 28 illus.) |
| Disciplina | 005.8 |
| Soggetto topico |
Computer security
Principles and Models of Security |
| ISBN |
9789819605552
9819605555 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Introduction -- Overview of cybersecurity education and training -- Technical cybersecurity training -- Attack training -- Forensics training -- Defense training -- Security awareness training -- Cybersecurity training platforms -- Case study: Cytrone -- Case study: Kypo -- Training platform capability assessment -- Conclusion. |
| Record Nr. | UNINA-9910993931003321 |
Beuran Razvan
|
||
| Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2025 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Cybersecurity Teaching in Higher Education [[electronic resource] /] / edited by Leslie F. Sikos, Paul Haskell-Dowland
| Cybersecurity Teaching in Higher Education [[electronic resource] /] / edited by Leslie F. Sikos, Paul Haskell-Dowland |
| Edizione | [1st ed. 2023.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 |
| Descrizione fisica | 1 online resource (144 pages) |
| Disciplina | 005.8071 |
| Soggetto topico |
Education—Data processing
Computer security Computer networks—Security measures Data protection Computers and Education Principles and Models of Security Mobile and Network Security Data and Information Security |
| Soggetto non controllato | Mathematics |
| ISBN |
9783031242168
9783031242151 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Chapter. 1. Challenges and Opportunities of Teaching Cybersecurity in UK University Computing Programmes -- Chapter. 2. Using the Delphi Method to Elicit Requirements for an International Master’s Program in Information Security Management -- Chapter. 3. Designing and Developing a Scenario-Based Curriculum for Cyber Education in HE -- Chapter. 4. Enabling teamwork in Cybersecurity courses -- Chapter. 5. Towards a Light-Weight Certification Scheme for Cybersecurity MOOCs -- Chapter. 6. Learning Environments for Digital Forensics Teaching in Higher Education. |
| Record Nr. | UNISA-996547960803316 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Cybersecurity Teaching in Higher Education / / edited by Leslie F. Sikos, Paul Haskell-Dowland
| Cybersecurity Teaching in Higher Education / / edited by Leslie F. Sikos, Paul Haskell-Dowland |
| Edizione | [1st ed. 2023.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 |
| Descrizione fisica | 1 online resource (144 pages) |
| Disciplina |
005.8071
005.80711 |
| Soggetto topico |
Education - Data processing
Computer security Computer networks - Security measures Data protection Computers and Education Principles and Models of Security Mobile and Network Security Data and Information Security |
| ISBN |
9783031242168
9783031242151 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Chapter. 1. Challenges and Opportunities of Teaching Cybersecurity in UK University Computing Programmes -- Chapter. 2. Using the Delphi Method to Elicit Requirements for an International Master’s Program in Information Security Management -- Chapter. 3. Designing and Developing a Scenario-Based Curriculum for Cyber Education in HE -- Chapter. 4. Enabling teamwork in Cybersecurity courses -- Chapter. 5. Towards a Light-Weight Certification Scheme for Cybersecurity MOOCs -- Chapter. 6. Learning Environments for Digital Forensics Teaching in Higher Education. |
| Record Nr. | UNINA-9910725095103321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||