top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Blockchain Scalability [[electronic resource] /] / edited by Wuhui Chen, Zibin Zheng, Huawei Huang
Blockchain Scalability [[electronic resource] /] / edited by Wuhui Chen, Zibin Zheng, Huawei Huang
Autore Zheng Zibin
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (243 pages)
Disciplina 005.74
Altri autori (Persone) ChenWuhui
HuangHuawei
Soggetto topico Blockchains (Databases)
Electronic digital computers - Evaluation
Computer security
Computer networks
Blockchain
System Performance and Evaluation
Principles and Models of Security
Computer Communication Networks
ISBN 981-9910-59-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1. Blockchain Scalability Fundamentals -- Chapter 2. Overview to Blockchain Scalability Challenges and Solutions -- Chapter 3. On-Chain and Off-Chain Scalability Techniques -- Chapter 4. Layered Sharding on Open Blockchain -- Chapter 5. Sharding-Based Scalable Consortium Blockchain -- Chapter 6. State Sharding for Permissioned Blockchain -- Chapter 7. Elastic Resource Allocation in Sharding-Based Blockchains -- Chapter 8. Dynamic Sharding: A Trade-OFF Between Security and Scalability -- Chapter 9. A Scalable and Secure Framework for 5G Networks Applications.
Record Nr. UNISA-996546845103316
Zheng Zibin  
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Blockchain Scalability / / edited by Wuhui Chen, Zibin Zheng, Huawei Huang
Blockchain Scalability / / edited by Wuhui Chen, Zibin Zheng, Huawei Huang
Autore Zheng Zibin
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (243 pages)
Disciplina 005.74
Altri autori (Persone) ChenWuhui
HuangHuawei
Soggetto topico Blockchains (Databases)
Electronic digital computers - Evaluation
Computer security
Computer networks
Blockchain
System Performance and Evaluation
Principles and Models of Security
Computer Communication Networks
ISBN 9789819910595
9819910595
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1. Blockchain Scalability Fundamentals -- Chapter 2. Overview to Blockchain Scalability Challenges and Solutions -- Chapter 3. On-Chain and Off-Chain Scalability Techniques -- Chapter 4. Layered Sharding on Open Blockchain -- Chapter 5. Sharding-Based Scalable Consortium Blockchain -- Chapter 6. State Sharding for Permissioned Blockchain -- Chapter 7. Elastic Resource Allocation in Sharding-Based Blockchains -- Chapter 8. Dynamic Sharding: A Trade-OFF Between Security and Scalability -- Chapter 9. A Scalable and Secure Framework for 5G Networks Applications.
Record Nr. UNINA-9910734875903321
Zheng Zibin  
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Bring Your Own Device Security Policy Compliance Framework / / by Rathika Palanisamy, Azah Anir Norman, Miss Laiha Mat Kiah, Tutut Herawan
Bring Your Own Device Security Policy Compliance Framework / / by Rathika Palanisamy, Azah Anir Norman, Miss Laiha Mat Kiah, Tutut Herawan
Autore Palanisamy Rathika
Edizione [1st ed. 2025.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025
Descrizione fisica 1 online resource (XXII, 196 p. 26 illus., 13 illus. in color.)
Disciplina 620.00285
Collana Information Systems Engineering and Management
Soggetto topico Engineering - Data processing
Data protection
Computer security
Computer networks - Security measures
Data Engineering
Data and Information Security
Security Services
Principles and Models of Security
Mobile and Network Security
ISBN 3-031-86801-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Introduction -- Bring Your Own Device -- Theoretical Framework and Hypotheses Development -- Research Methodology -- Analysis, Results and Discussion -- Conclusion and Future Work.
Record Nr. UNINA-9910991163803321
Palanisamy Rathika  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Computational Color Imaging : 8th International Workshop, CCIW 2024, Milan, Italy, September 25–27, 2024, Proceedings / / edited by Raimondo Schettini, Alain Trémeau, Shoji Tominaga, Simone Bianco, Marco Buzzelli
Computational Color Imaging : 8th International Workshop, CCIW 2024, Milan, Italy, September 25–27, 2024, Proceedings / / edited by Raimondo Schettini, Alain Trémeau, Shoji Tominaga, Simone Bianco, Marco Buzzelli
Edizione [1st ed. 2025.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025
Descrizione fisica 1 online resource (XIX, 290 p. 132 illus., 107 illus. in color.)
Disciplina 006.37
Collana Lecture Notes in Computer Science
Soggetto topico Computer vision
Computer security
Artificial intelligence
Signal processing
Computer Vision
Principles and Models of Security
Artificial Intelligence
Signal, Speech and Image Processing
ISBN 9783031728457
3031728459
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto -- Color Theory and Spaces. -- Atomic color: from points to probability distributions. -- Extended Wien and Planck Loci. -- Uniform Color Space with Advanced Hue Linearity: PCS23-UCS. -- Color difference in context: an experiment. -- Image Enhancement and Retinex Theory. -- Exploiting Milano Retinex Contrast to Enhance Images with Strong Changes of Light Intensity. -- Intrinsic Image Decomposition based on Retinex Theory, Superpixel Segmentation and Scale-Space Computations. -- Hyperspectral and Spectral Imaging. -- VNIR and SWIR hyperspectral imaging for the study of Picasso paintings. -- Stabilization of the spectral power distribution of a tunable multichannel LED lighting system. -- Low light hyperspectral imaging using HDR methods. -- Spectral Imaging Methods for Estimating Fluorescence Emission Spectra from Plant Grains and Leaves. -- Stitching from spectral filter array video sequences. -- Printing and Machine Learning Applications. -- Dithering with Pascal Cellular Automata. -- From Gutenberg to Llamas: print optimization through first principles and AI. -- Instance-based CycleGAN for object segmentation with few annotations. -- ChromaPose: Robustness of 2D Pose Estimation Under Different Color Illuminations. -- Perceptual Quality, Medical Imaging, and Art Applications. -- Investigation of Image Features for Perceptually Equivalent Gloss Reproduction through Comparison of Real Objects and Images. -- Classification of lung nodules on CT via pseudo-colour images and deep features from pre-trained convolutional networks. -- Painter Verification Using Color Palettes: An Exploratory Study. -- Color Constancy. -- Illuminant Equivariant Networks for Computational Color Constancy. -- Revisiting Color Constancy Using CNNs: Including Recent Observations. -- Enforcing temporal consistency for color constancy in video sequences.
Record Nr. UNINA-9910983379103321
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The coupling of safety and security : exploring interrelations in theory and practice / / edited by Corinne Bieder, Kenneth Pettersen Gould
The coupling of safety and security : exploring interrelations in theory and practice / / edited by Corinne Bieder, Kenneth Pettersen Gould
Autore Bieder Corinne
Pubbl/distr/stampa Springer Nature, 2020
Descrizione fisica 1 online resource (viii, 113 pages) : illustrations; digital, PDF file(s)
Disciplina 658.56
Collana SpringerBriefs in Applied Sciences and Technology
SpringerBriefs in Safety Management
Soggetto topico Quality control
Reliability
Industrial safety
Computer security
Public safety
System safety
Industrial organization
Quality Control, Reliability, Safety and Risk
Principles and Models of Security
Crime Control and Security
Security Science and Technology
Industrial Organization
Soggetto non controllato Quality Control, Reliability, Safety and Risk
Principles and Models of Security
Crime Control and Security
Security Science and Technology
Industrial Organization
Industrial and Production Engineering
Safety Management
Security Management
Safety and Security
High Risk Organizations
Risk Management
Safety Security Efficiency
Security Interfaces
Open Access
Reliability engineering
Computer security
Crime & criminology
Security & fire alarm systems
Economics of industrial organisation
ISBN 3-030-47229-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1. Safety and Security: The Challenges of Bringing them Together -- 2. The Concepts of Risk, Safety and Security: A Fundamental Exploration and Understanding of Similarities and Differences -- 3. Safety and Security are Two Sides of the Same Coin -- 4. Safety vs Security in Aviation -- 6. Security and Safety Culture - Dual or Distinct Phenomena?
Record Nr. UNINA-9910416527703321
Bieder Corinne  
Springer Nature, 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber Deception : Techniques, Strategies, and Human Aspects / / edited by Tiffany Bao, Milind Tambe, Cliff Wang
Cyber Deception : Techniques, Strategies, and Human Aspects / / edited by Tiffany Bao, Milind Tambe, Cliff Wang
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (252 pages)
Disciplina 005.8
Collana Advances in Information Security
Soggetto topico Data protection
User interfaces (Computer systems)
Human-computer interaction
Machine learning
Computer security
Data and Information Security
User Interfaces and Human Computer Interaction
Machine Learning
Principles and Models of Security
ISBN 9783031166136
3031166132
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1. Diversifying Deception: Game Theoretic Models for Two-Sided and Layered Deception -- 2. Human-Subject Experiments on Risk-based Cyber Camouflage Games -- 3. Adaptive Cyberdefense with Deception: A Human-AI Cognitive Approach -- 4. Cognitive Modeling for Personalized, Adaptive Signaling for Cyber Deception -- 5. Deceptive Signaling: Understanding Human Behavior against Signaling algorithms -- 6. Optimizing Honey Traffic Using Game Theory and Adversarial Learning -- 7. Mee: Adaptive Honeyfile System for Insider Attacker Detection -- 8. HoneyPLC: A Next-Generation Honeypot for Industrial Control Systems -- 9. Using Amnesia to Detect Credential Database Breaches -- 10. Deceiving ML-Based Friend-or-Foe Identification for Executables.
Record Nr. UNINA-9910682584603321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber Resilience System Engineering Empowered by Endogenous Security and Safety / / by Jiangxing Wu
Cyber Resilience System Engineering Empowered by Endogenous Security and Safety / / by Jiangxing Wu
Autore Wu Jiangxing
Edizione [1st ed. 2024.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024
Descrizione fisica 1 online resource (533 pages)
Disciplina 004.22
Soggetto topico Computer networks - Security measures
Computer security
Cryptography
Data encryption (Computer science)
Mobile and Network Security
Principles and Models of Security
Cryptology
ISBN 9789819701162
9819701163
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1. Cyberspace Endogenous Security and Safety Problems -- Chapter 2. Cyberspace Endogenous Security and Safety Defense Vision -- Chapter 3. The Principle and Structure of Cyberspace Endogenous Security and Safety -- Chapter 4. Introduction to Functional Safety and Cyber Resilience -- Chapter 5. The Framework of Cyber Resilience Engineering Empowered by Endogenous Security and Safety -- Chapter 6. Metrics and Assessment of ESS-Empowered Cyber Resilience -- Chapter 7. Engineering Applications in Typical Fields of ESS Empowerment -- Chapter 8. Exploration of Emerging Fields Empowered by Endogenous Security and Safety -- Appendix.
Record Nr. UNINA-9910899890803321
Wu Jiangxing  
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cybersecurity Education and Training / / by Razvan Beuran
Cybersecurity Education and Training / / by Razvan Beuran
Autore Beuran Razvan
Edizione [1st ed. 2025.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2025
Descrizione fisica 1 online resource (XVI, 323 p. 28 illus.)
Disciplina 005.8
Soggetto topico Computer security
Principles and Models of Security
ISBN 9789819605552
9819605555
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Introduction -- Overview of cybersecurity education and training -- Technical cybersecurity training -- Attack training -- Forensics training -- Defense training -- Security awareness training -- Cybersecurity training platforms -- Case study: Cytrone -- Case study: Kypo -- Training platform capability assessment -- Conclusion.
Record Nr. UNINA-9910993931003321
Beuran Razvan  
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2025
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cybersecurity Teaching in Higher Education [[electronic resource] /] / edited by Leslie F. Sikos, Paul Haskell-Dowland
Cybersecurity Teaching in Higher Education [[electronic resource] /] / edited by Leslie F. Sikos, Paul Haskell-Dowland
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (144 pages)
Disciplina 005.8071
Soggetto topico Education—Data processing
Computer security
Computer networks—Security measures
Data protection
Computers and Education
Principles and Models of Security
Mobile and Network Security
Data and Information Security
Soggetto non controllato Mathematics
ISBN 9783031242168
9783031242151
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter. 1. Challenges and Opportunities of Teaching Cybersecurity in UK University Computing Programmes -- Chapter. 2. Using the Delphi Method to Elicit Requirements for an International Master’s Program in Information Security Management -- Chapter. 3. Designing and Developing a Scenario-Based Curriculum for Cyber Education in HE -- Chapter. 4. Enabling teamwork in Cybersecurity courses -- Chapter. 5. Towards a Light-Weight Certification Scheme for Cybersecurity MOOCs -- Chapter. 6. Learning Environments for Digital Forensics Teaching in Higher Education.
Record Nr. UNISA-996547960803316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Cybersecurity Teaching in Higher Education / / edited by Leslie F. Sikos, Paul Haskell-Dowland
Cybersecurity Teaching in Higher Education / / edited by Leslie F. Sikos, Paul Haskell-Dowland
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (144 pages)
Disciplina 005.8071
005.80711
Soggetto topico Education - Data processing
Computer security
Computer networks - Security measures
Data protection
Computers and Education
Principles and Models of Security
Mobile and Network Security
Data and Information Security
ISBN 9783031242168
9783031242151
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter. 1. Challenges and Opportunities of Teaching Cybersecurity in UK University Computing Programmes -- Chapter. 2. Using the Delphi Method to Elicit Requirements for an International Master’s Program in Information Security Management -- Chapter. 3. Designing and Developing a Scenario-Based Curriculum for Cyber Education in HE -- Chapter. 4. Enabling teamwork in Cybersecurity courses -- Chapter. 5. Towards a Light-Weight Certification Scheme for Cybersecurity MOOCs -- Chapter. 6. Learning Environments for Digital Forensics Teaching in Higher Education.
Record Nr. UNINA-9910725095103321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui