Cybersecurity of Digital Service Chains
portes grátis
Cybersecurity of Digital Service Chains
Challenges, Methodologies, and Tools
Duzha, Armend; Repetto, Matteo; Kolodziej, Joanna
Springer International Publishing AG
04/2022
257
Mole
Inglês
9783031040351
15 a 20 dias
421
Descrição não disponível.
A Reference Architecture for Management of Security Operations in Digital Service Chains.- Efficient flow monitoring in digital services.- Intelligent Transportation Systems -- models, challenges, security aspects.- NAD: Machine Learning based Component for Unknown Attack Detection in Network Traffic.- Detecting unknown attacks through system behavior analysis.- Signature-based detection of botnet DDoS attacks.- Automatic Attack Pattern Mining for Generating Actionable CTI Applying Alert Aggregation.- Blockchain-based task and information management in computational cloud systems.
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
cloud computing;computer crime;computer networks;computer security;cryptography;cyber security;data communication systems;data flow architectures;data management systems;data security;electromagnetic interference and compatibility;general programming languages;health informatics;intrusion detection;network protocols;network security;network simulations;sensors and actuators;signal processing;telecommunication traffic
A Reference Architecture for Management of Security Operations in Digital Service Chains.- Efficient flow monitoring in digital services.- Intelligent Transportation Systems -- models, challenges, security aspects.- NAD: Machine Learning based Component for Unknown Attack Detection in Network Traffic.- Detecting unknown attacks through system behavior analysis.- Signature-based detection of botnet DDoS attacks.- Automatic Attack Pattern Mining for Generating Actionable CTI Applying Alert Aggregation.- Blockchain-based task and information management in computational cloud systems.
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
cloud computing;computer crime;computer networks;computer security;cryptography;cyber security;data communication systems;data flow architectures;data management systems;data security;electromagnetic interference and compatibility;general programming languages;health informatics;intrusion detection;network protocols;network security;network simulations;sensors and actuators;signal processing;telecommunication traffic