top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Cyber Security : 19th China Annual Conference, CNCERT 2022, Beijing, China, August 16-17, 2022, Revised Selected Papers
Cyber Security : 19th China Annual Conference, CNCERT 2022, Beijing, China, August 16-17, 2022, Revised Selected Papers
Autore Lu Wei
Edizione [1st ed.]
Pubbl/distr/stampa Singapore : , : Springer, , 2023
Descrizione fisica 1 electronic resource (239 p.)
Altri autori (Persone) ZhangYuqing
WenWeiping
YanHanbing
LiChao
Collana Communications in Computer and Information Science
Soggetto topico Computer security
Computer networking & communications
Artificial intelligence
Legal aspects of IT
Network security
Soggetto non controllato application service layer
artificial intelligence
communication systems
computer crime
computer networks
computer security
computer systems
cryptography
cyber security
data communication systems
data security
databases
machine learning
network protocols
network security
privacy
signal processing
telecommunication networks
telecommunication systems
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996503561903316
Lu Wei  
Singapore : , : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Cyber Security : 19th China Annual Conference, CNCERT 2022, Beijing, China, August 16-17, 2022, Revised Selected Papers
Cyber Security : 19th China Annual Conference, CNCERT 2022, Beijing, China, August 16-17, 2022, Revised Selected Papers
Autore Lu Wei
Edizione [1st ed.]
Pubbl/distr/stampa Singapore : , : Springer, , 2023
Descrizione fisica 1 electronic resource (239 p.)
Altri autori (Persone) ZhangYuqing
WenWeiping
YanHanbing
LiChao
Collana Communications in Computer and Information Science
Soggetto topico Computer security
Computer networking & communications
Artificial intelligence
Legal aspects of IT
Network security
Soggetto non controllato application service layer
artificial intelligence
communication systems
computer crime
computer networks
computer security
computer systems
cryptography
cyber security
data communication systems
data security
databases
machine learning
network protocols
network security
privacy
signal processing
telecommunication networks
telecommunication systems
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910633995903321
Lu Wei  
Singapore : , : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber Security : 18th China Annual Conference, CNCERT 2021, Beijing, China, July 20-21, 2021, Revised Selected Papers
Cyber Security : 18th China Annual Conference, CNCERT 2021, Beijing, China, July 20-21, 2021, Revised Selected Papers
Autore Lu Wei
Pubbl/distr/stampa Singapore, : Springer Nature, 2022
Descrizione fisica 1 online resource (234 pages)
Altri autori (Persone) ZhangYuqing
WenWeiping
YanHanbing
LiChao
Collana Communications in Computer and Information Science
Soggetto topico Computer security
Computer networking & communications
Coding theory & cryptology
Network security
Artificial intelligence
Software Engineering
Soggetto non controllato artificial intelligence
authentication
computer hardware
computer networks
computer security
computer systems
cryptography
data communication systems
data mining
data security
databases
information retrieval
network protocols
network security
privacy
signal processing
telecommunication networks
telecommunication systems
ISBN 981-16-9229-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910522970803321
Lu Wei  
Singapore, : Springer Nature, 2022
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber Security : 18th China Annual Conference, CNCERT 2021, Beijing, China, July 20-21, 2021, Revised Selected Papers
Cyber Security : 18th China Annual Conference, CNCERT 2021, Beijing, China, July 20-21, 2021, Revised Selected Papers
Autore Lu Wei
Pubbl/distr/stampa Singapore, : Springer Nature, 2022
Descrizione fisica 1 online resource (234 pages)
Altri autori (Persone) ZhangYuqing
WenWeiping
YanHanbing
LiChao
Collana Communications in Computer and Information Science
Soggetto topico Computer security
Computer networking & communications
Coding theory & cryptology
Network security
Artificial intelligence
Software Engineering
Soggetto non controllato artificial intelligence
authentication
computer hardware
computer networks
computer security
computer systems
cryptography
data communication systems
data mining
data security
databases
information retrieval
network protocols
network security
privacy
signal processing
telecommunication networks
telecommunication systems
ISBN 981-16-9229-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996464545403316
Lu Wei  
Singapore, : Springer Nature, 2022
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Cyber Security [[electronic resource] ] : 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers / / edited by Wei Lu, Qiaoyan Wen, Yuqing Zhang, Bo Lang, Weiping Wen, Hanbing Yan, Chao Li, Li Ding, Ruiguang Li, Yu Zhou
Cyber Security [[electronic resource] ] : 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers / / edited by Wei Lu, Qiaoyan Wen, Yuqing Zhang, Bo Lang, Weiping Wen, Hanbing Yan, Chao Li, Li Ding, Ruiguang Li, Yu Zhou
Autore Lu Wei
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Springer Nature, 2020
Descrizione fisica 1 online resource (X, 235 p. 108 illus., 70 illus. in color.)
Disciplina 005.8
Collana Communications in Computer and Information Science
Soggetto topico Computer security
Computer communication systems
Application software
Architecture, Computer
Data encryption (Computer science)
Computer networks - Security measures
Systems and Data Security
Computer Communication Networks
Information Systems Applications (incl. Internet)
Computer System Implementation
Cryptology
Mobile and Network Security
Soggetto non controllato Systems and Data Security
Computer Communication Networks
Information Systems Applications (incl. Internet)
Computer System Implementation
Cryptology
Mobile and Network Security
Data and Information Security
Computer and Information Systems Applications
communication channels (information theory)
communication systems
computer crime
computer hardware
computer networks
computer security
computer systems
cryptography
data communication systems
data security
databases
network protocols
network security
sensors
signal processing
telecommunication networks
telecommunication systems
telecommunication traffic
wireless telecommunication systems
Network hardware
Information retrieval
Internet searching
Systems analysis & design
Coding theory & cryptology
Data encryption
ISBN 981-334-922-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Access Control -- Cryptography -- Denial-of-Service Attacks -- Hardware Security Implementation -- Intrusion/Anomaly Detection and Malware Mitigation -- Social Network Security and Privacy.-Systems Security.
Record Nr. UNINA-9910447240103321
Lu Wei  
Springer Nature, 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber Security [[electronic resource] ] : 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers / / edited by Wei Lu, Qiaoyan Wen, Yuqing Zhang, Bo Lang, Weiping Wen, Hanbing Yan, Chao Li, Li Ding, Ruiguang Li, Yu Zhou
Cyber Security [[electronic resource] ] : 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers / / edited by Wei Lu, Qiaoyan Wen, Yuqing Zhang, Bo Lang, Weiping Wen, Hanbing Yan, Chao Li, Li Ding, Ruiguang Li, Yu Zhou
Autore Lu Wei
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Springer Nature, 2020
Descrizione fisica 1 online resource (X, 235 p. 108 illus., 70 illus. in color.)
Disciplina 005.8
Collana Communications in Computer and Information Science
Soggetto topico Computer security
Computer communication systems
Application software
Architecture, Computer
Data encryption (Computer science)
Computer networks - Security measures
Systems and Data Security
Computer Communication Networks
Information Systems Applications (incl. Internet)
Computer System Implementation
Cryptology
Mobile and Network Security
Soggetto non controllato Systems and Data Security
Computer Communication Networks
Information Systems Applications (incl. Internet)
Computer System Implementation
Cryptology
Mobile and Network Security
Data and Information Security
Computer and Information Systems Applications
communication channels (information theory)
communication systems
computer crime
computer hardware
computer networks
computer security
computer systems
cryptography
data communication systems
data security
databases
network protocols
network security
sensors
signal processing
telecommunication networks
telecommunication systems
telecommunication traffic
wireless telecommunication systems
Network hardware
Information retrieval
Internet searching
Systems analysis & design
Coding theory & cryptology
Data encryption
ISBN 981-334-922-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Access Control -- Cryptography -- Denial-of-Service Attacks -- Hardware Security Implementation -- Intrusion/Anomaly Detection and Malware Mitigation -- Social Network Security and Privacy.-Systems Security.
Record Nr. UNISA-996465362903316
Lu Wei  
Springer Nature, 2020
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Cybersecurity of digital service chains : challenges, methodologies, and tools / / editors, Joanna Kołodziej, Matteo Repetto, Armend Duzha
Cybersecurity of digital service chains : challenges, methodologies, and tools / / editors, Joanna Kołodziej, Matteo Repetto, Armend Duzha
Autore Kołodziej Joanna
Pubbl/distr/stampa Cham, : Springer International Publishing AG, 2022
Descrizione fisica 1 online resource (xi, 257 pages) : illustrations (chiefly color)
Altri autori (Persone) RepettoMatteo
DuzhaArmend
Collana Lecture notes in computer science
Soggetto topico Business - Data processing - Security measures
Computer networks - Security measures
Soggetto non controllato cloud computing
computer crime
computer networks
computer security
cryptography
cyber security
data communication systems
data flow architectures
data management systems
data security
electromagnetic interference and compatibility
general programming languages
health informatics
intrusion detection
network protocols
network security
network simulations
sensors and actuators
signal processing
telecommunication traffic
ISBN 3-031-04036-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto A Reference Architecture for Management of Security Operations in Digital Service Chains Efficient flow monitoring in digital services Intelligent Transportation Systems models, challenges, security aspects NAD: Machine Learning based Component for Unknown Attack Detection in Network Traffic Detecting unknown attacks through system behavior analysis Signature-based detection of botnet DDoS attacks Automatic Attack Pattern Mining for Generating Actionable CTI Applying Alert Aggregation Blockchain-based task and information management in computational cloud systems
Record Nr. UNINA-9910558694303321
Kołodziej Joanna  
Cham, : Springer International Publishing AG, 2022
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cybersecurity of digital service chains : challenges, methodologies, and tools / / editors, Joanna Kołodziej, Matteo Repetto, Armend Duzha
Cybersecurity of digital service chains : challenges, methodologies, and tools / / editors, Joanna Kołodziej, Matteo Repetto, Armend Duzha
Autore Kołodziej Joanna
Pubbl/distr/stampa Cham, : Springer International Publishing AG, 2022
Descrizione fisica 1 online resource (xi, 257 pages) : illustrations (chiefly color)
Altri autori (Persone) RepettoMatteo
DuzhaArmend
Collana Lecture notes in computer science
Soggetto topico Business - Data processing - Security measures
Computer networks - Security measures
Soggetto non controllato cloud computing
computer crime
computer networks
computer security
cryptography
cyber security
data communication systems
data flow architectures
data management systems
data security
electromagnetic interference and compatibility
general programming languages
health informatics
intrusion detection
network protocols
network security
network simulations
sensors and actuators
signal processing
telecommunication traffic
ISBN 3-031-04036-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto A Reference Architecture for Management of Security Operations in Digital Service Chains Efficient flow monitoring in digital services Intelligent Transportation Systems models, challenges, security aspects NAD: Machine Learning based Component for Unknown Attack Detection in Network Traffic Detecting unknown attacks through system behavior analysis Signature-based detection of botnet DDoS attacks Automatic Attack Pattern Mining for Generating Actionable CTI Applying Alert Aggregation Blockchain-based task and information management in computational cloud systems
Record Nr. UNISA-996472069303316
Kołodziej Joanna  
Cham, : Springer International Publishing AG, 2022
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Digital identity, an emergent legal concept : the role and legal nature of digital identity in commercial transactions / / by Clare Sullivan [[electronic resource]]
Digital identity, an emergent legal concept : the role and legal nature of digital identity in commercial transactions / / by Clare Sullivan [[electronic resource]]
Autore Sullivan Clare Linda
Pubbl/distr/stampa University of Adelaide Press, 2011
Descrizione fisica 1 online resource (xii, 162 pages) : digital, PDF file(s)
Disciplina 658.4/78
Soggetto topico Business enterprises - Computer networks - Security measures
Computer networks - Security measures
Identification cards
Computer security - Law and legislation - Great Britain
Computer security - Law and legislation - Australia
Soggetto non controllato computer security
business enterprises
identification cards
security measures
computer networks
Aadhaar
Biometrics
Data Protection Act 1998
Database
Digital identity
United Kingdom
ISBN 0-9807230-0-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1. Digital identity -- introduction -- Genesis of this book -- The importance of identity -- Approach of this book -- Structure of this book and chapter synopsis -- ; 2. Digital identity -- a new legal concept -- Central argument -- Registered digital identity in the United Kingdom -- The relationship between transaction identity and database identity in the United Kingdom -- Distinguishing Solove's 'digital person' -- Digital identity in Australia -- ; 3. Digital identity -- the nature of the concept -- Registered digital identity -- The role and nature of transaction identity -- Is transaction identity the legal person? -- Transaction identity is the legal person -- ; 4. Digital identity -- inherent vulnerabilities -- The fallibilities of the identifying information -- ; 5. Digital identity -- consequential individual rights -- Identity distinguished from privacy -- The right to identity under the scheme -- An express right to identity -- Right to identity under European human rights law -- The protection provided by the right to privacy -- ; 6. Digital identity -- protection -- The wrong and the harm caused by misuse of transaction identity -- Identity theft distinguished from identity fraud -- Is identity theft really theft? -- Identity theft is theft -- Criminal damage -- ; 7. Digital identity -- conclusion -- A new concept of identity and a new perspective -- 'Tomorrow is nearer than you think' -- ; 8. Bibliography -- Articles/books/reports -- Case law -- Legislation and bills -- Treaties -- Other sources -- ; 9. Index.
Record Nr. UNINA-9910133690603321
Sullivan Clare Linda  
University of Adelaide Press, 2011
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Electronic Voting : 7th International Joint Conference, e-Vote-ID 2022, Bregenz, Austria, October 4-7, 2022, Proceedings
Electronic Voting : 7th International Joint Conference, e-Vote-ID 2022, Bregenz, Austria, October 4-7, 2022, Proceedings
Autore Krimmer Robert
Pubbl/distr/stampa Cham, : Springer Nature, 2022
Descrizione fisica 1 online resource (197 pages)
Altri autori (Persone) VolkamerMelanie
Duenas-CidDavid
RønnePeter
GermannMicha
Collana Lecture Notes in Computer Science
Soggetto topico Coding theory & cryptology
Information retrieval
Artificial intelligence
Network security
Computer security
Network hardware
Soggetto non controllato artificial intelligence
communication
communication systems
computer crime
computer hardware
computer networks
computer science
computer security
computer systems
computer vision
cryptography
data security
engineering
fuzzy sets
internet
network protocols
network security
privacy
signal processing
telecommunication systems
ISBN 3-031-15911-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996490356403316
Krimmer Robert  
Cham, : Springer Nature, 2022
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui