Cybersecurity of digital service chains : challenges, methodologies, and tools / Joanna Kołodziej, Matteo Repetto, Armend Duzha (eds.).
2022
QA76.9.A25 C93 2022
Linked e-resources
Linked Resource
Online Access
Concurrent users
Unlimited
Authorized users
Open access
Document Delivery Supplied
Open access
Details
Title
Cybersecurity of digital service chains : challenges, methodologies, and tools / Joanna Kołodziej, Matteo Repetto, Armend Duzha (eds.).
ISBN
9783031040368 (electronic bk.)
3031040368 (electronic bk.)
9783031040351
3031040368 (electronic bk.)
9783031040351
Published
Cham : Springer, [2022]
Copyright
©2022
Language
English
Description
1 online resource (xi, 257 pages) : illustrations (chiefly color).
Item Number
10.1007/978-3-031-04036-8 doi
Call Number
QA76.9.A25 C93 2022
Dewey Decimal Classification
005.8
Summary
This open access book presents the main scientific results from the H2020 GUARD project. The GUARD project aims at filling the current technological gap between software management paradigms and cybersecurity models, the latter still lacking orchestration and agility to effectively address the dynamicity of the former. This book provides a comprehensive review of the main concepts, architectures, algorithms, and non-technical aspects developed during three years of investigation; the description of the Smart Mobility use case developed at the end of the project gives a practical example of how the GUARD platform and related technologies can be deployed in practical scenarios. We expect the book to be interesting for the broad group of researchers, engineers, and professionals daily experiencing the inadequacy of outdated cybersecurity models for modern computing environments and cyber-physical systems.
Bibliography, etc. Note
Includes bibliographical references and author index.
Access Note
Open access
Source of Description
Online resource; title from PDF title page (SpringerLink, viewed April 14, 2022).
Series
Lecture notes in computer science ; 13300. 1611-3349
Linked Resources
Online Access
Record Appears in
Online Resources > Ebooks
All Resources
All Resources
Table of Contents
A Reference Architecture for Management of Security Operations in Digital Service Chains
Efficient flow monitoring in digital services
Intelligent Transportation Systems
models, challenges, security aspects
NAD: Machine Learning based Component for Unknown Attack Detection in Network Traffic
Detecting unknown attacks through system behavior analysis
Signature-based detection of botnet DDoS attacks
Automatic Attack Pattern Mining for Generating Actionable CTI Applying Alert Aggregation
Blockchain-based task and information management in computational cloud systems.
Efficient flow monitoring in digital services
Intelligent Transportation Systems
models, challenges, security aspects
NAD: Machine Learning based Component for Unknown Attack Detection in Network Traffic
Detecting unknown attacks through system behavior analysis
Signature-based detection of botnet DDoS attacks
Automatic Attack Pattern Mining for Generating Actionable CTI Applying Alert Aggregation
Blockchain-based task and information management in computational cloud systems.