top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Cyber Security : 19th China Annual Conference, CNCERT 2022, Beijing, China, August 16-17, 2022, Revised Selected Papers
Cyber Security : 19th China Annual Conference, CNCERT 2022, Beijing, China, August 16-17, 2022, Revised Selected Papers
Autore Lu Wei
Edizione [1st ed.]
Pubbl/distr/stampa Singapore : , : Springer, , 2023
Descrizione fisica 1 electronic resource (239 p.)
Altri autori (Persone) ZhangYuqing
WenWeiping
YanHanbing
LiChao
Collana Communications in Computer and Information Science
Soggetto topico Computer security
Computer networking & communications
Artificial intelligence
Legal aspects of IT
Network security
Soggetto non controllato application service layer
artificial intelligence
communication systems
computer crime
computer networks
computer security
computer systems
cryptography
cyber security
data communication systems
data security
databases
machine learning
network protocols
network security
privacy
signal processing
telecommunication networks
telecommunication systems
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996503561903316
Lu Wei  
Singapore : , : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Cyber Security : 19th China Annual Conference, CNCERT 2022, Beijing, China, August 16-17, 2022, Revised Selected Papers
Cyber Security : 19th China Annual Conference, CNCERT 2022, Beijing, China, August 16-17, 2022, Revised Selected Papers
Autore Lu Wei
Edizione [1st ed.]
Pubbl/distr/stampa Singapore : , : Springer, , 2023
Descrizione fisica 1 electronic resource (239 p.)
Altri autori (Persone) ZhangYuqing
WenWeiping
YanHanbing
LiChao
Collana Communications in Computer and Information Science
Soggetto topico Computer security
Computer networking & communications
Artificial intelligence
Legal aspects of IT
Network security
Soggetto non controllato application service layer
artificial intelligence
communication systems
computer crime
computer networks
computer security
computer systems
cryptography
cyber security
data communication systems
data security
databases
machine learning
network protocols
network security
privacy
signal processing
telecommunication networks
telecommunication systems
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910633995903321
Lu Wei  
Singapore : , : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber Security [[electronic resource] ] : 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers / / edited by Wei Lu, Qiaoyan Wen, Yuqing Zhang, Bo Lang, Weiping Wen, Hanbing Yan, Chao Li, Li Ding, Ruiguang Li, Yu Zhou
Cyber Security [[electronic resource] ] : 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers / / edited by Wei Lu, Qiaoyan Wen, Yuqing Zhang, Bo Lang, Weiping Wen, Hanbing Yan, Chao Li, Li Ding, Ruiguang Li, Yu Zhou
Autore Lu Wei
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Springer Nature, 2020
Descrizione fisica 1 online resource (X, 235 p. 108 illus., 70 illus. in color.)
Disciplina 005.8
Collana Communications in Computer and Information Science
Soggetto topico Computer security
Computer communication systems
Application software
Architecture, Computer
Data encryption (Computer science)
Computer networks - Security measures
Systems and Data Security
Computer Communication Networks
Information Systems Applications (incl. Internet)
Computer System Implementation
Cryptology
Mobile and Network Security
Soggetto non controllato Systems and Data Security
Computer Communication Networks
Information Systems Applications (incl. Internet)
Computer System Implementation
Cryptology
Mobile and Network Security
Data and Information Security
Computer and Information Systems Applications
communication channels (information theory)
communication systems
computer crime
computer hardware
computer networks
computer security
computer systems
cryptography
data communication systems
data security
databases
network protocols
network security
sensors
signal processing
telecommunication networks
telecommunication systems
telecommunication traffic
wireless telecommunication systems
Network hardware
Information retrieval
Internet searching
Systems analysis & design
Coding theory & cryptology
Data encryption
ISBN 981-334-922-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Access Control -- Cryptography -- Denial-of-Service Attacks -- Hardware Security Implementation -- Intrusion/Anomaly Detection and Malware Mitigation -- Social Network Security and Privacy.-Systems Security.
Record Nr. UNISA-996465362903316
Lu Wei  
Springer Nature, 2020
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Cyber Security : 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers / / edited by Wei Lu, Qiaoyan Wen, Yuqing Zhang, Bo Lang, Weiping Wen, Hanbing Yan, Chao Li, Li Ding, Ruiguang Li, Yu Zhou
Cyber Security : 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers / / edited by Wei Lu, Qiaoyan Wen, Yuqing Zhang, Bo Lang, Weiping Wen, Hanbing Yan, Chao Li, Li Ding, Ruiguang Li, Yu Zhou
Autore Lu Wei
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Springer Nature, 2020
Descrizione fisica 1 online resource (X, 235 p. 108 illus., 70 illus. in color.)
Disciplina 005.8
Collana Communications in Computer and Information Science
Soggetto topico Computer security
Computer communication systems
Application software
Architecture, Computer
Data encryption (Computer science)
Computer networks - Security measures
Systems and Data Security
Computer Communication Networks
Information Systems Applications (incl. Internet)
Computer System Implementation
Cryptology
Mobile and Network Security
Soggetto non controllato Systems and Data Security
Computer Communication Networks
Information Systems Applications (incl. Internet)
Computer System Implementation
Cryptology
Mobile and Network Security
Data and Information Security
Computer and Information Systems Applications
communication channels (information theory)
communication systems
computer crime
computer hardware
computer networks
computer security
computer systems
cryptography
data communication systems
data security
databases
network protocols
network security
sensors
signal processing
telecommunication networks
telecommunication systems
telecommunication traffic
wireless telecommunication systems
Network hardware
Information retrieval
Internet searching
Systems analysis & design
Coding theory & cryptology
Data encryption
ISBN 981-334-922-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Access Control -- Cryptography -- Denial-of-Service Attacks -- Hardware Security Implementation -- Intrusion/Anomaly Detection and Malware Mitigation -- Social Network Security and Privacy.-Systems Security.
Record Nr. UNINA-9910447240103321
Lu Wei  
Springer Nature, 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cybersecurity of digital service chains : challenges, methodologies, and tools / / editors, Joanna Kołodziej, Matteo Repetto, Armend Duzha
Cybersecurity of digital service chains : challenges, methodologies, and tools / / editors, Joanna Kołodziej, Matteo Repetto, Armend Duzha
Autore Kołodziej Joanna
Pubbl/distr/stampa Cham, : Springer International Publishing AG, 2022
Descrizione fisica 1 online resource (xi, 257 pages) : illustrations (chiefly color)
Altri autori (Persone) RepettoMatteo
DuzhaArmend
Collana Lecture notes in computer science
Soggetto topico Business - Data processing - Security measures
Computer networks - Security measures
Soggetto non controllato cloud computing
computer crime
computer networks
computer security
cryptography
cyber security
data communication systems
data flow architectures
data management systems
data security
electromagnetic interference and compatibility
general programming languages
health informatics
intrusion detection
network protocols
network security
network simulations
sensors and actuators
signal processing
telecommunication traffic
ISBN 3-031-04036-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto A Reference Architecture for Management of Security Operations in Digital Service Chains Efficient flow monitoring in digital services Intelligent Transportation Systems models, challenges, security aspects NAD: Machine Learning based Component for Unknown Attack Detection in Network Traffic Detecting unknown attacks through system behavior analysis Signature-based detection of botnet DDoS attacks Automatic Attack Pattern Mining for Generating Actionable CTI Applying Alert Aggregation Blockchain-based task and information management in computational cloud systems
Record Nr. UNISA-996472069303316
Kołodziej Joanna  
Cham, : Springer International Publishing AG, 2022
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Cybersecurity of digital service chains : challenges, methodologies, and tools / / editors, Joanna Kołodziej, Matteo Repetto, Armend Duzha
Cybersecurity of digital service chains : challenges, methodologies, and tools / / editors, Joanna Kołodziej, Matteo Repetto, Armend Duzha
Autore Kołodziej Joanna
Pubbl/distr/stampa Cham, : Springer International Publishing AG, 2022
Descrizione fisica 1 online resource (xi, 257 pages) : illustrations (chiefly color)
Altri autori (Persone) RepettoMatteo
DuzhaArmend
Collana Lecture notes in computer science
Soggetto topico Business - Data processing - Security measures
Computer networks - Security measures
Seguretat de les xarxes d'ordinadors
Empreses
Processament de dades
Seguretat informàtica
Soggetto genere / forma Llibres electrònics
Soggetto non controllato cloud computing
computer crime
computer networks
computer security
cryptography
cyber security
data communication systems
data flow architectures
data management systems
data security
electromagnetic interference and compatibility
general programming languages
health informatics
intrusion detection
network protocols
network security
network simulations
sensors and actuators
signal processing
telecommunication traffic
ISBN 3-031-04036-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto A Reference Architecture for Management of Security Operations in Digital Service Chains Efficient flow monitoring in digital services Intelligent Transportation Systems models, challenges, security aspects NAD: Machine Learning based Component for Unknown Attack Detection in Network Traffic Detecting unknown attacks through system behavior analysis Signature-based detection of botnet DDoS attacks Automatic Attack Pattern Mining for Generating Actionable CTI Applying Alert Aggregation Blockchain-based task and information management in computational cloud systems
Record Nr. UNINA-9910558694303321
Kołodziej Joanna  
Cham, : Springer International Publishing AG, 2022
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Electronic Voting : 7th International Joint Conference, e-Vote-ID 2022, Bregenz, Austria, October 4-7, 2022, Proceedings
Electronic Voting : 7th International Joint Conference, e-Vote-ID 2022, Bregenz, Austria, October 4-7, 2022, Proceedings
Autore Krimmer Robert
Pubbl/distr/stampa Cham, : Springer Nature, 2022
Descrizione fisica 1 online resource (197 pages)
Altri autori (Persone) VolkamerMelanie
Duenas-CidDavid
RønnePeter
GermannMicha
Collana Lecture Notes in Computer Science
Soggetto topico Coding theory & cryptology
Information retrieval
Artificial intelligence
Network security
Computer security
Network hardware
Soggetto non controllato artificial intelligence
communication
communication systems
computer crime
computer hardware
computer networks
computer science
computer security
computer systems
computer vision
cryptography
data security
engineering
fuzzy sets
internet
network protocols
network security
privacy
signal processing
telecommunication systems
ISBN 3-031-15911-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996490356403316
Krimmer Robert  
Cham, : Springer Nature, 2022
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Electronic Voting : 7th International Joint Conference, e-Vote-ID 2022, Bregenz, Austria, October 4-7, 2022, Proceedings
Electronic Voting : 7th International Joint Conference, e-Vote-ID 2022, Bregenz, Austria, October 4-7, 2022, Proceedings
Autore Krimmer Robert
Pubbl/distr/stampa Cham, : Springer Nature, 2022
Descrizione fisica 1 online resource (197 pages)
Altri autori (Persone) VolkamerMelanie
Duenas-CidDavid
RønnePeter
GermannMicha
Collana Lecture Notes in Computer Science
Soggetto topico Coding theory & cryptology
Information retrieval
Artificial intelligence
Network security
Computer security
Network hardware
Soggetto non controllato artificial intelligence
communication
communication systems
computer crime
computer hardware
computer networks
computer science
computer security
computer systems
computer vision
cryptography
data security
engineering
fuzzy sets
internet
network protocols
network security
privacy
signal processing
telecommunication systems
ISBN 3-031-15911-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910590067403321
Krimmer Robert  
Cham, : Springer Nature, 2022
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Security in computer and information sciences : second International Symposium, EuroCybersec 2021, Nice, France, October 25-26, 2021, revised selected papers / / editors, Erol Gelenbe [et al.]
Security in computer and information sciences : second International Symposium, EuroCybersec 2021, Nice, France, October 25-26, 2021, revised selected papers / / editors, Erol Gelenbe [et al.]
Autore Gelenbe Erol <1945->
Pubbl/distr/stampa Cham, : Springer Nature, 2022
Descrizione fisica 1 online resource (145 pages)
Altri autori (Persone) JankovicMarija
KehagiasDionysios
MartonAnna
VilmosAndras
Collana Communications in computer and information science
Soggetto topico Computer networks - Security measures
Computer security
Soggetto non controllato architecture types
artificial intelligence
communication systems
computer crime
computer hardware
computer networks
computer security
computer systems
cryptography
data security
Internet of Things (IoT)
network protocols
network security
signal processing
software architecture
software design
software engineering
telecommunication networks
telecommunication systems
ISBN 3-031-09357-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto AI and Quality of Service Driven Attack Detection, Mitigation and Energy Optimization: A Review of Some EU Project Results Application of a Human-Centric Approach in Security by Design for IoT Architecture Development An Empirical Evaluation of the Usefulness of Word Embedding Techniques in Deep Learning-based Vulnerability Prediction Correlation-based Anomaly Detection for the CAN Bus Botnet Attack Detection with Incremental Online Learning Optimizing Energy Usage for an Electric Drone T-RAID: TEE-based Remote Attestation for IoT Devices Secure Authentication for everyone! Enabling 2nd-factor Authentication under Real-world constraints Energy, QoS and Security Aware Services at the Edge Mitigating the Massive Access Problem in the IoT
Record Nr. UNISA-996478861203316
Gelenbe Erol <1945->  
Cham, : Springer Nature, 2022
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Security in computer and information sciences : second International Symposium, EuroCybersec 2021, Nice, France, October 25-26, 2021, revised selected papers / / editors, Erol Gelenbe [et al.]
Security in computer and information sciences : second International Symposium, EuroCybersec 2021, Nice, France, October 25-26, 2021, revised selected papers / / editors, Erol Gelenbe [et al.]
Autore Gelenbe Erol <1945->
Pubbl/distr/stampa Cham, : Springer Nature, 2022
Descrizione fisica 1 online resource (145 pages)
Altri autori (Persone) JankovicMarija
KehagiasDionysios
MartonAnna
VilmosAndras
Collana Communications in computer and information science
Soggetto topico Computer networks - Security measures
Computer security
Soggetto non controllato architecture types
artificial intelligence
communication systems
computer crime
computer hardware
computer networks
computer security
computer systems
cryptography
data security
Internet of Things (IoT)
network protocols
network security
signal processing
software architecture
software design
software engineering
telecommunication networks
telecommunication systems
ISBN 3-031-09357-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto AI and Quality of Service Driven Attack Detection, Mitigation and Energy Optimization: A Review of Some EU Project Results Application of a Human-Centric Approach in Security by Design for IoT Architecture Development An Empirical Evaluation of the Usefulness of Word Embedding Techniques in Deep Learning-based Vulnerability Prediction Correlation-based Anomaly Detection for the CAN Bus Botnet Attack Detection with Incremental Online Learning Optimizing Energy Usage for an Electric Drone T-RAID: TEE-based Remote Attestation for IoT Devices Secure Authentication for everyone! Enabling 2nd-factor Authentication under Real-world constraints Energy, QoS and Security Aware Services at the Edge Mitigating the Massive Access Problem in the IoT
Record Nr. UNINA-9910580293203321
Gelenbe Erol <1945->  
Cham, : Springer Nature, 2022
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui