Cybersecurity of digital service chains : challenges, methodologies, and tools / / editors, Joanna Kołodziej, Matteo Repetto, Armend Duzha |
Autore | Kołodziej Joanna |
Pubbl/distr/stampa | Cham, : Springer International Publishing AG, 2022 |
Descrizione fisica | 1 online resource (xi, 257 pages) : illustrations (chiefly color) |
Altri autori (Persone) |
RepettoMatteo
DuzhaArmend |
Collana | Lecture notes in computer science |
Soggetto topico |
Business - Data processing - Security measures
Computer networks - Security measures |
Soggetto non controllato |
cloud computing
computer crime computer networks computer security cryptography cyber security data communication systems data flow architectures data management systems data security electromagnetic interference and compatibility general programming languages health informatics intrusion detection network protocols network security network simulations sensors and actuators signal processing telecommunication traffic |
ISBN | 3-031-04036-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | A Reference Architecture for Management of Security Operations in Digital Service Chains Efficient flow monitoring in digital services Intelligent Transportation Systems models, challenges, security aspects NAD: Machine Learning based Component for Unknown Attack Detection in Network Traffic Detecting unknown attacks through system behavior analysis Signature-based detection of botnet DDoS attacks Automatic Attack Pattern Mining for Generating Actionable CTI Applying Alert Aggregation Blockchain-based task and information management in computational cloud systems |
Record Nr. | UNISA-996472069303316 |
Kołodziej Joanna | ||
Cham, : Springer International Publishing AG, 2022 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Cybersecurity of digital service chains : challenges, methodologies, and tools / / editors, Joanna Kołodziej, Matteo Repetto, Armend Duzha |
Autore | Kołodziej Joanna |
Pubbl/distr/stampa | Cham, : Springer International Publishing AG, 2022 |
Descrizione fisica | 1 online resource (xi, 257 pages) : illustrations (chiefly color) |
Altri autori (Persone) |
RepettoMatteo
DuzhaArmend |
Collana | Lecture notes in computer science |
Soggetto topico |
Business - Data processing - Security measures
Computer networks - Security measures Seguretat de les xarxes d'ordinadors Empreses Processament de dades Seguretat informàtica |
Soggetto genere / forma | Llibres electrònics |
Soggetto non controllato |
cloud computing
computer crime computer networks computer security cryptography cyber security data communication systems data flow architectures data management systems data security electromagnetic interference and compatibility general programming languages health informatics intrusion detection network protocols network security network simulations sensors and actuators signal processing telecommunication traffic |
ISBN | 3-031-04036-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | A Reference Architecture for Management of Security Operations in Digital Service Chains Efficient flow monitoring in digital services Intelligent Transportation Systems models, challenges, security aspects NAD: Machine Learning based Component for Unknown Attack Detection in Network Traffic Detecting unknown attacks through system behavior analysis Signature-based detection of botnet DDoS attacks Automatic Attack Pattern Mining for Generating Actionable CTI Applying Alert Aggregation Blockchain-based task and information management in computational cloud systems |
Record Nr. | UNINA-9910558694303321 |
Kołodziej Joanna | ||
Cham, : Springer International Publishing AG, 2022 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|