Cyber Security : 19th China Annual Conference, CNCERT 2022, Beijing, China, August 16-17, 2022, Revised Selected Papers
| Cyber Security : 19th China Annual Conference, CNCERT 2022, Beijing, China, August 16-17, 2022, Revised Selected Papers |
| Autore | Lu Wei |
| Edizione | [1st ed.] |
| Pubbl/distr/stampa | Singapore : , : Springer, , 2023 |
| Descrizione fisica | 1 electronic resource (239 p.) |
| Altri autori (Persone) |
ZhangYuqing
WenWeiping YanHanbing LiChao |
| Collana | Communications in Computer and Information Science |
| Soggetto topico |
Computer security
Computer networking & communications Artificial intelligence Legal aspects of IT Network security |
| Soggetto non controllato |
application service layer
artificial intelligence communication systems computer crime computer networks computer security computer systems cryptography cyber security data communication systems data security databases machine learning network protocols network security privacy signal processing telecommunication networks telecommunication systems |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNISA-996503561903316 |
Lu Wei
|
||
| Singapore : , : Springer, , 2023 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Cyber Security : 18th China Annual Conference, CNCERT 2021, Beijing, China, July 20-21, 2021, Revised Selected Papers
| Cyber Security : 18th China Annual Conference, CNCERT 2021, Beijing, China, July 20-21, 2021, Revised Selected Papers |
| Autore | Lu Wei |
| Pubbl/distr/stampa | Singapore, : Springer Nature, 2022 |
| Descrizione fisica | 1 online resource (234 pages) |
| Altri autori (Persone) |
ZhangYuqing
WenWeiping YanHanbing LiChao |
| Collana | Communications in Computer and Information Science |
| Soggetto topico |
Computer security
Computer networking & communications Coding theory & cryptology Network security Artificial intelligence Software Engineering |
| Soggetto non controllato |
artificial intelligence
authentication computer hardware computer networks computer security computer systems cryptography data communication systems data mining data security databases information retrieval network protocols network security privacy signal processing telecommunication networks telecommunication systems |
| ISBN | 981-16-9229-7 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNISA-996464545403316 |
Lu Wei
|
||
| Singapore, : Springer Nature, 2022 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Cyber Security [[electronic resource] ] : 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers / / edited by Wei Lu, Qiaoyan Wen, Yuqing Zhang, Bo Lang, Weiping Wen, Hanbing Yan, Chao Li, Li Ding, Ruiguang Li, Yu Zhou
| Cyber Security [[electronic resource] ] : 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers / / edited by Wei Lu, Qiaoyan Wen, Yuqing Zhang, Bo Lang, Weiping Wen, Hanbing Yan, Chao Li, Li Ding, Ruiguang Li, Yu Zhou |
| Autore | Lu Wei |
| Edizione | [1st ed. 2020.] |
| Pubbl/distr/stampa | Springer Nature, 2020 |
| Descrizione fisica | 1 online resource (X, 235 p. 108 illus., 70 illus. in color.) |
| Disciplina | 005.8 |
| Collana | Communications in Computer and Information Science |
| Soggetto topico |
Computer security
Computer communication systems Application software Architecture, Computer Data encryption (Computer science) Computer networks - Security measures Systems and Data Security Computer Communication Networks Information Systems Applications (incl. Internet) Computer System Implementation Cryptology Mobile and Network Security |
| Soggetto non controllato |
Systems and Data Security
Computer Communication Networks Information Systems Applications (incl. Internet) Computer System Implementation Cryptology Mobile and Network Security Data and Information Security Computer and Information Systems Applications communication channels (information theory) communication systems computer crime computer hardware computer networks computer security computer systems cryptography data communication systems data security databases network protocols network security sensors signal processing telecommunication networks telecommunication systems telecommunication traffic wireless telecommunication systems Network hardware Information retrieval Internet searching Systems analysis & design Coding theory & cryptology Data encryption |
| ISBN | 981-334-922-0 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Access Control -- Cryptography -- Denial-of-Service Attacks -- Hardware Security Implementation -- Intrusion/Anomaly Detection and Malware Mitigation -- Social Network Security and Privacy.-Systems Security. |
| Record Nr. | UNISA-996465362903316 |
Lu Wei
|
||
| Springer Nature, 2020 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Cybersecurity of digital service chains : challenges, methodologies, and tools / / editors, Joanna Kołodziej, Matteo Repetto, Armend Duzha
| Cybersecurity of digital service chains : challenges, methodologies, and tools / / editors, Joanna Kołodziej, Matteo Repetto, Armend Duzha |
| Autore | Kołodziej Joanna |
| Pubbl/distr/stampa | Cham, : Springer International Publishing AG, 2022 |
| Descrizione fisica | 1 online resource (xi, 257 pages) : illustrations (chiefly color) |
| Altri autori (Persone) |
RepettoMatteo
DuzhaArmend |
| Collana | Lecture notes in computer science |
| Soggetto topico |
Business - Data processing - Security measures
Computer networks - Security measures |
| Soggetto non controllato |
cloud computing
computer crime computer networks computer security cryptography cyber security data communication systems data flow architectures data management systems data security electromagnetic interference and compatibility general programming languages health informatics intrusion detection network protocols network security network simulations sensors and actuators signal processing telecommunication traffic |
| ISBN | 3-031-04036-8 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | A Reference Architecture for Management of Security Operations in Digital Service Chains Efficient flow monitoring in digital services Intelligent Transportation Systems models, challenges, security aspects NAD: Machine Learning based Component for Unknown Attack Detection in Network Traffic Detecting unknown attacks through system behavior analysis Signature-based detection of botnet DDoS attacks Automatic Attack Pattern Mining for Generating Actionable CTI Applying Alert Aggregation Blockchain-based task and information management in computational cloud systems |
| Record Nr. | UNISA-996472069303316 |
Kołodziej Joanna
|
||
| Cham, : Springer International Publishing AG, 2022 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Electronic Voting : 7th International Joint Conference, e-Vote-ID 2022, Bregenz, Austria, October 4-7, 2022, Proceedings
| Electronic Voting : 7th International Joint Conference, e-Vote-ID 2022, Bregenz, Austria, October 4-7, 2022, Proceedings |
| Autore | Krimmer Robert |
| Pubbl/distr/stampa | Cham, : Springer Nature, 2022 |
| Descrizione fisica | 1 online resource (197 pages) |
| Altri autori (Persone) |
VolkamerMelanie
Duenas-CidDavid RønnePeter GermannMicha |
| Collana | Lecture Notes in Computer Science |
| Soggetto topico |
Coding theory & cryptology
Information retrieval Artificial intelligence Network security Computer security Network hardware |
| Soggetto non controllato |
artificial intelligence
communication communication systems computer crime computer hardware computer networks computer science computer security computer systems computer vision cryptography data security engineering fuzzy sets internet network protocols network security privacy signal processing telecommunication systems |
| ISBN | 3-031-15911-X |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNISA-996490356403316 |
Krimmer Robert
|
||
| Cham, : Springer Nature, 2022 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
IT-Sicherheit : Eine Einführung / / Roland Hellmann
| IT-Sicherheit : Eine Einführung / / Roland Hellmann |
| Autore | Hellmann Roland |
| Pubbl/distr/stampa | Berlin ; ; Boston : , : De Gruyter Oldenbourg, , [2018] |
| Descrizione fisica | 1 online resource (205 pages) |
| Disciplina | 658.4038 |
| Collana | De Gruyter Studium |
| Soggetto topico |
Information technology - Management
Computer networks - Security measures Database security |
| Soggetto non controllato |
IT security
cryptology cyber security data security information security |
| ISBN |
3-11-049208-3
3-11-049485-X |
| Classificazione | PZ 4500 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | ger |
| Nota di contenuto | Frontmatter -- Inhalt -- 1. Grundlagen und Motivation -- 2. Symmetrische Verschlüsselung -- 3. Public Key-Verfahren -- 4. Kryptografische Hashfunktionen -- 5. Digitale Signaturen -- 6. Weitere Anwendungen und abschließende Betrachtungen zur Kryptografie -- 7. Verfügbarkeit -- 8. Internetsicherheit -- 9. Firewalls -- 10. IoT-Sicherheit -- 11. Lösungen zu den Aufgaben -- Literatur -- Stichwortverzeichnis |
| Record Nr. | UNINA-9910796783703321 |
Hellmann Roland
|
||
| Berlin ; ; Boston : , : De Gruyter Oldenbourg, , [2018] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
IT-Sicherheit : Eine Einführung / / Roland Hellmann
| IT-Sicherheit : Eine Einführung / / Roland Hellmann |
| Autore | Hellmann Roland |
| Pubbl/distr/stampa | Berlin ; ; Boston : , : De Gruyter Oldenbourg, , [2018] |
| Descrizione fisica | 1 online resource (205 pages) |
| Disciplina | 658.4038 |
| Collana | De Gruyter Studium |
| Soggetto topico |
Information technology - Management
Computer networks - Security measures Database security |
| Soggetto non controllato |
IT security
cryptology cyber security data security information security |
| ISBN |
3-11-049208-3
3-11-049485-X |
| Classificazione | PZ 4500 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | ger |
| Nota di contenuto | Frontmatter -- Inhalt -- 1. Grundlagen und Motivation -- 2. Symmetrische Verschlüsselung -- 3. Public Key-Verfahren -- 4. Kryptografische Hashfunktionen -- 5. Digitale Signaturen -- 6. Weitere Anwendungen und abschließende Betrachtungen zur Kryptografie -- 7. Verfügbarkeit -- 8. Internetsicherheit -- 9. Firewalls -- 10. IoT-Sicherheit -- 11. Lösungen zu den Aufgaben -- Literatur -- Stichwortverzeichnis |
| Record Nr. | UNINA-9910810394903321 |
Hellmann Roland
|
||
| Berlin ; ; Boston : , : De Gruyter Oldenbourg, , [2018] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Revealing Watermarks : How to Enhance the Security of Hand-Made Paper Items and Reveal Hidden Data
| Revealing Watermarks : How to Enhance the Security of Hand-Made Paper Items and Reveal Hidden Data |
| Autore | Christie-Miller Ian |
| Pubbl/distr/stampa | Boston, MA : , : Academic Studies Press, , 2021 |
| Descrizione fisica | 1 online resource (90 pages) |
| Disciplina | 676.28027 |
| Soggetto topico |
Handmade paper - Europe - History - 16th century
Image processing - Digital techniques Paper - Analysis - Data processing Watermarks - Europe - Identification Technology & Engineering / Imaging Systems |
| Soggetto non controllato |
Baltic Reformation
Eastern Europe Trans-cultural Connections Watermark research antiquarian books data security manuscripts paper history religion theft protection |
| ISBN |
1-64469-626-6
1-64469-625-8 |
| Classificazione | AM 33100 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Frontmatter -- Contents -- Acknowledgements -- Introduction -- First Part -- Second Part -- Third Part -- Fourth Part -- Fifth Part -- Downloads -- Bibliography -- Index |
| Altri titoli varianti | Revealing Watermarks |
| Record Nr. | UNINA-9910554238403321 |
Christie-Miller Ian
|
||
| Boston, MA : , : Academic Studies Press, , 2021 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Security in computer and information sciences : second International Symposium, EuroCybersec 2021, Nice, France, October 25-26, 2021, revised selected papers / / editors, Erol Gelenbe [et al.]
| Security in computer and information sciences : second International Symposium, EuroCybersec 2021, Nice, France, October 25-26, 2021, revised selected papers / / editors, Erol Gelenbe [et al.] |
| Autore | Gelenbe Erol <1945-> |
| Pubbl/distr/stampa | Cham, : Springer Nature, 2022 |
| Descrizione fisica | 1 online resource (145 pages) |
| Altri autori (Persone) |
JankovicMarija
KehagiasDionysios MartonAnna VilmosAndras |
| Collana | Communications in computer and information science |
| Soggetto topico |
Computer networks - Security measures
Computer security |
| Soggetto non controllato |
architecture types
artificial intelligence communication systems computer crime computer hardware computer networks computer security computer systems cryptography data security Internet of Things (IoT) network protocols network security signal processing software architecture software design software engineering telecommunication networks telecommunication systems |
| ISBN | 3-031-09357-7 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | AI and Quality of Service Driven Attack Detection, Mitigation and Energy Optimization: A Review of Some EU Project Results Application of a Human-Centric Approach in Security by Design for IoT Architecture Development An Empirical Evaluation of the Usefulness of Word Embedding Techniques in Deep Learning-based Vulnerability Prediction Correlation-based Anomaly Detection for the CAN Bus Botnet Attack Detection with Incremental Online Learning Optimizing Energy Usage for an Electric Drone T-RAID: TEE-based Remote Attestation for IoT Devices Secure Authentication for everyone! Enabling 2nd-factor Authentication under Real-world constraints Energy, QoS and Security Aware Services at the Edge Mitigating the Massive Access Problem in the IoT |
| Record Nr. | UNISA-996478861203316 |
Gelenbe Erol <1945->
|
||
| Cham, : Springer Nature, 2022 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Security of Networks and Services in an All-Connected World [[electronic resource] ] : 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, Zurich, Switzerland, July 10-13, 2017, Proceedings / / edited by Daphne Tuncer, Robert Koch, Rémi Badonnel, Burkhard Stiller
| Security of Networks and Services in an All-Connected World [[electronic resource] ] : 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, Zurich, Switzerland, July 10-13, 2017, Proceedings / / edited by Daphne Tuncer, Robert Koch, Rémi Badonnel, Burkhard Stiller |
| Autore | Daphne Tuncer |
| Edizione | [1st ed. 2017.] |
| Pubbl/distr/stampa | Springer Nature, 2017 |
| Descrizione fisica | 1 online resource (XX, 192 p. 55 illus.) |
| Disciplina | 004.6 |
| Collana | Computer Communication Networks and Telecommunications |
| Soggetto topico |
Computer communication systems
Computer security Data structures (Computer science) Computer system failures Computers and civilization Application software Computer Communication Networks Systems and Data Security Data Structures and Information Theory System Performance and Evaluation Computers and Society Information Systems Applications (incl. Internet) |
| Soggetto non controllato |
cyber crime
network security data security web anomaly detection wireless cloud computing artificial intelligence internet |
| ISBN | 3-319-60774-X |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Making Flow-Based Security Detection Parallel -- A Blockchain-Based Architecture for Collaborative DDoS Mitigation with Smart Contracts -- Achieving Reproducible Network Environments with INSALATA -- Towards a Software-Defined Security Framework for Supporting Distributed Cloud -- Optimal Service Function Chain Composition in Network Functions Virtualization -- An Optimized Resilient Advance Bandwidth Scheduling for Media Delivery Services -- The Evaluation of the V2VUNet Concept to Improve Inter-vehicle Communications -- Towards Internet Scale Quality-of-Experience Measurement with Twitter -- Hunting SIP Authentication Attacks Efficiently -- MoDeNA: Enhancing User Security for Devices in Wireless Personal and Local Area Networks -- Flow-Based Detection of IPv6-specific Network Layer Attacks -- Towards a Hybrid Cloud Platform Using Apache Mesos -- Visual Analytics for Network Security and Critical Infrastructures -- Preserving Relations in Parallel Flow Data Processing -- SmartDEMAP: A Smart Contract Deployment and Management Platform -- Optimizing the Integration of Agent-Based Cloud Orchestrators and Higher-Level Workloads -- Situational Awareness: Detecting Critical Dependencies and Devices in a Network -- A Framework for SFC Integrity in NFV Environments -- Multi-domain DDoS Mitigation based on Blockchains. |
| Record Nr. | UNISA-996466461803316 |
Daphne Tuncer
|
||
| Springer Nature, 2017 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||