000 04235nam a22007095i 4500
001 978-3-031-09357-9
003 DE-He213
005 20240507154520.0
007 cr nn 008mamaa
008 220629s2022 sz | s |||| 0|eng d
020 _a9783031093579
_9978-3-031-09357-9
024 7 _a10.1007/978-3-031-09357-9
_2doi
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aUTN
_2bicssc
072 7 _aCOM053000
_2bisacsh
072 7 _aUR
_2thema
072 7 _aUTN
_2thema
082 0 4 _a005.8
_223
245 1 0 _aSecurity in Computer and Information Sciences
_h[electronic resource] :
_bSecond International Symposium, EuroCybersec 2021, Nice, France, October 25–26, 2021, Revised Selected Papers /
_cedited by Erol Gelenbe, Marija Jankovic, Dionysios Kehagias, Anna Marton, Andras Vilmos.
250 _a1st ed. 2022.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2022.
300 _aXI, 133 p. 39 illus., 32 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aCommunications in Computer and Information Science,
_x1865-0937 ;
_v1596
505 0 _aAI and Quality of Service Driven Attack Detection, Mitigation and Energy Optimization: A Review of Some EU Project Results -- Application of a Human-Centric Approach in Security by Design for IoT Architecture Development -- An Empirical Evaluation of the Usefulness of Word Embedding Techniques in Deep Learning-based Vulnerability Prediction -- Correlation-based Anomaly Detection for the CAN Bus -- Botnet Attack Detection with Incremental Online Learning -- Optimizing Energy Usage for an Electric Drone -- T-RAID: TEE-based Remote Attestation for IoT Devices -- Secure Authentication for everyone! Enabling 2nd-factor Authentication under Real-world constraints -- Energy, QoS and Security Aware Services at the Edge -- Mitigating the Massive Access Problem in the IoT.
506 0 _aOpen Access
520 _aThis open access book constitutes the thoroughly refereed proceedings of the Second International Symposium on Computer and Information Sciences, EuroCybersec 2021, held in Nice, France, in October 2021. The 9 papers presented together with 1 invited paper were carefully reviewed and selected from 21 submissions. The papers focus on topics of security of distributed interconnected systems, software systems, Internet of Things, health informatics systems, energy systems, digital cities, digital economy, mobile networks, and the underlying physical and network infrastructures.
650 0 _aData protection.
650 0 _aApplication software.
650 0 _aComputer networks .
650 0 _aSoftware engineering.
650 0 _aComputers
_xLaw and legislation.
650 0 _aInformation technology
_xLaw and legislation.
650 0 _aCoding theory.
650 0 _aInformation theory.
650 1 4 _aData and Information Security.
650 2 4 _aComputer and Information Systems Applications.
650 2 4 _aComputer Communication Networks.
650 2 4 _aSoftware Engineering.
650 2 4 _aLegal Aspects of Computing.
650 2 4 _aCoding and Information Theory.
700 1 _aGelenbe, Erol.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aJankovic, Marija.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aKehagias, Dionysios.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aMarton, Anna.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aVilmos, Andras.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783031093562
776 0 8 _iPrinted edition:
_z9783031093586
830 0 _aCommunications in Computer and Information Science,
_x1865-0937 ;
_v1596
856 4 0 _uhttps://doi.org/10.1007/978-3-031-09357-9
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-SOB
999 _c37423
_d37423