Cybersecurity of Digital Service Chains Challenges, Methodologies, and Tools /

Cybersecurity of Digital Service Chains Challenges, Methodologies, and Tools / [electronic resource] : edited by Joanna Kołodziej, Matteo Repetto, Armend Duzha. - 1st ed. 2022. - XI, 257 p. 90 illus., 71 illus. in color. online resource. - Lecture Notes in Computer Science, 13300 1611-3349 ; . - Lecture Notes in Computer Science, 13300 .

A Reference Architecture for Management of Security Operations in Digital Service Chains -- Efficient flow monitoring in digital services -- Intelligent Transportation Systems -- models, challenges, security aspects -- NAD: Machine Learning based Component for Unknown Attack Detection in Network Traffic -- Detecting unknown attacks through system behavior analysis -- Signature-based detection of botnet DDoS attacks -- Automatic Attack Pattern Mining for Generating Actionable CTI Applying Alert Aggregation -- Blockchain-based task and information management in computational cloud systems.

Open Access

This open access book presents the main scientific results from the H2020 GUARD project. The GUARD project aims at filling the current technological gap between software management paradigms and cybersecurity models, the latter still lacking orchestration and agility to effectively address the dynamicity of the former. This book provides a comprehensive review of the main concepts, architectures, algorithms, and non-technical aspects developed during three years of investigation; the description of the Smart Mobility use case developed at the end of the project gives a practical example of how the GUARD platform and related technologies can be deployed in practical scenarios. We expect the book to be interesting for the broad group of researchers, engineers, and professionals daily experiencing the inadequacy of outdated cybersecurity models for modern computing environments and cyber-physical systems.

9783031040368

10.1007/978-3-031-04036-8 doi


Computer networks .
Computers--Law and legislation.
Information technology--Law and legislation.
Data protection.
Application software.
Computer Communication Networks.
Legal Aspects of Computing.
Data and Information Security.
Computer and Information Systems Applications.

TK5105.5-5105.9

004.6

Universiti Islam Sultan Sharif Ali
Spg 347, Jalan Pasar Gadong, BE1310
Brunei Darussalam

+ 673 2462000 ext 603/604

library@unissa.edu.bn
norhasinah.moksin@unissa.edu.bn
syukriyyah.kahar@unissa.edu.bn

Library Operating Hours:

Gadong Campus School Terms:
Monday – Thursday & Saturday:
8.00 AM – 5.00 PM
Friday, Sunday & Public Holidays :
Closed

Revision & Exam Week:
Monday – Wednesday:
8.00 AM – 9.00 PM
(Unless Otherwise Stated)
Thursday & Saturday:
8.00 AM – 5.00 PM
Friday & Sunday :
8.00 AM – 12.00 PM & 1.30 PM – 5.00 PM
Public Holidays :
Closed

Mid / Inter-Semester Break / Long Vacation:
Monday – Thursday & Saturday:
8.00 AM – 12.15 PM & 1.30 PM – 4.30 PM
Friday, Sunday & Public Holidays :
Closed

Sinaut Campus

School Terms:
Monday – Thursday & Saturday:
8.00 AM – 4.30 PM
Friday, Sunday & Public Holidays :
Closed

Revision & Exam Week:
Monday – Thursday & Saturday:
8.00 AM – 4.30 PM
Friday, Sunday & Public Holidays :
Closed

Mid / Inter-Semester Break / Long Vacation:
Monday – Thursday & Saturday:
8.00 AM – 12.15 PM & 1.30 PM – 4.30 PM
Friday, Sunday &
Public Holidays :
Closed

Flag Counter

© All Right Reserved 2023. Universiti Islam Sultan Sharif Ali

Administered and upheld by
 Rayyan Secutech