Linked e-resources
Details
Table of Contents
1. Collaborative and confidential architectures for information sharing and analytics
2. Secure Interconnection of large-scale CPS-based frameworks and middleware
3. Virtualized security-awareness systems and digital twins
4. Empirical evaluation of system vulnerabilities
5. Collaborative physical and cyber defense requirements
6. Heterogeneous data centric security policies specification and enforcement
7. Big data for anomaly and advanced threats detection
8. Collaborative identification and ranking of malware
9. Visual analytics techniques for cyber security
10. Collaborative mitigation methodologies against advanced and persistent attacks.
2. Secure Interconnection of large-scale CPS-based frameworks and middleware
3. Virtualized security-awareness systems and digital twins
4. Empirical evaluation of system vulnerabilities
5. Collaborative physical and cyber defense requirements
6. Heterogeneous data centric security policies specification and enforcement
7. Big data for anomaly and advanced threats detection
8. Collaborative identification and ranking of malware
9. Visual analytics techniques for cyber security
10. Collaborative mitigation methodologies against advanced and persistent attacks.