001453698 000__ 04238cam\a2200529\i\4500 001453698 001__ 1453698 001453698 003__ OCoLC 001453698 005__ 20230314003440.0 001453698 006__ m\\\\\o\\d\\\\\\\\ 001453698 007__ cr\cn\nnnunnun 001453698 008__ 230112s2023\\\\sz\a\\\\o\\\\\000\0\eng\d 001453698 019__ $$a1356794528 001453698 020__ $$a9783031160882$$qelectronic book 001453698 020__ $$a3031160886$$qelectronic book 001453698 020__ $$z9783031160875 001453698 020__ $$z3031160878 001453698 0247_ $$a10.1007/978-3-031-16088-2$$2doi 001453698 035__ $$aSP(OCoLC)1356794474 001453698 040__ $$aYDX$$beng$$erda$$epn$$cYDX$$dGW5XE$$dYDXIT$$dUKAHL 001453698 049__ $$aISEA 001453698 050_4 $$aTK7895.E42$$bC65 2023 001453698 08204 $$a006.2/2$$223/eng/20230112 001453698 24500 $$aCollaborative approaches for cyber security in cyber-physical systems /$$cTheo Dimitrakos, Javier Lopez, Fabio Martinelli, editors. 001453698 264_1 $$aCham :$$bSpringer,$$c[2023] 001453698 300__ $$a1 online resource (xii, 226 pages) :$$billustrations (chiefly color). 001453698 336__ $$atext$$btxt$$2rdacontent 001453698 337__ $$acomputer$$bc$$2rdamedia 001453698 338__ $$aonline resource$$bcr$$2rdacarrier 001453698 4901_ $$aAdvanced sciences and technologies for security applications 001453698 5050_ $$a1. Collaborative and confidential architectures for information sharing and analytics -- 2. Secure Interconnection of large-scale CPS-based frameworks and middleware -- 3. Virtualized security-awareness systems and digital twins -- 4. Empirical evaluation of system vulnerabilities -- 5. Collaborative physical and cyber defense requirements -- 6. Heterogeneous data centric security policies specification and enforcement -- 7. Big data for anomaly and advanced threats detection -- 8. Collaborative identification and ranking of malware -- 9. Visual analytics techniques for cyber security -- 10. Collaborative mitigation methodologies against advanced and persistent attacks. 001453698 506__ $$aAccess limited to authorized users. 001453698 520__ $$aThis book describes cyber-security issues underpinning several cyber-physical systems and several application domains, proposing a common perspective able to collect similarities as well as depict divergences and specific solution methods. Special attention is given to those approaches and technologies that unleash the power of collaboration among stakeholders, in a field based often developed in isolation and segregation of information. Given the pervasively growing dependency of society on IT technology, and the corresponding proliferation of cyber-threats, there is both an imperative need and opportunity to develop a coherent set of techniques to cope with the changing nature of the upcoming cyber-security challenges. These include evolving threats and new technological means to exploit vulnerabilities of cyber-physical systems that have direct socio-technical, societal and economic consequences for Europe and the world. We witness cyber-attacks on large scale infrastructures for energy, transport, healthcare systems and smart systems. The interplay between security and safety issues is now paramount and will be even more relevant in the future. The book collects contributions from a number of scientists in Europe and presents the results of several European Projects, as NeCS, SPARTA, E-CORRIDOR and C3ISP. It will be of value to industrial researchers, practitioners and engineers developing cyber-physical solutions, as well as academics and students in cyber-security, ICT, and smart technologies in general. . 001453698 588__ $$aDescription based on online resource; title from digital title page (viewed on January 13, 2023). 001453698 650_0 $$aCooperating objects (Computer systems)$$xSecurity measures. 001453698 650_0 $$aComputer security. 001453698 655_0 $$aElectronic books. 001453698 7001_ $$aDimitrakos, Theo,$$eeditor. 001453698 7001_ $$aLópez, Javier$$q(Javier López-Muñoz),$$eeditor. 001453698 7001_ $$aMartinelli, Fabio,$$d1969-$$eeditor. 001453698 77608 $$iPrint version: $$z3031160878$$z9783031160875$$w(OCoLC)1338132272 001453698 830_0 $$aAdvanced sciences and technologies for security applications. 001453698 852__ $$bebk 001453698 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-031-16088-2$$zOnline Access$$91397441.1 001453698 909CO $$ooai:library.usi.edu:1453698$$pGLOBAL_SET 001453698 980__ $$aBIB 001453698 980__ $$aEBOOK 001453698 982__ $$aEbook 001453698 983__ $$aOnline 001453698 994__ $$a92$$bISE