Afficher la notice abrégée

dc.contributor.editorKołodziej, Joanna
dc.contributor.editorRepetto, Matteo
dc.contributor.editorDuzha, Armend
dc.date.accessioned2022-05-12T04:33:20Z
dc.date.available2022-05-12T04:33:20Z
dc.date.issued2022
dc.date.submitted2022-04-13T15:09:11Z
dc.identifierONIX_20220413_9783031040368_28
dc.identifierhttps://library.oapen.org/handle/20.500.12657/54033
dc.identifier.urihttps://directory.doabooks.org/handle/20.500.12854/81287
dc.description.abstractThis open access book presents the main scientific results from the H2020 GUARD project. The GUARD project aims at filling the current technological gap between software management paradigms and cybersecurity models, the latter still lacking orchestration and agility to effectively address the dynamicity of the former. This book provides a comprehensive review of the main concepts, architectures, algorithms, and non-technical aspects developed during three years of investigation; the description of the Smart Mobility use case developed at the end of the project gives a practical example of how the GUARD platform and related technologies can be deployed in practical scenarios. We expect the book to be interesting for the broad group of researchers, engineers, and professionals daily experiencing the inadequacy of outdated cybersecurity models for modern computing environments and cyber-physical systems.
dc.languageEnglish
dc.relation.ispartofseriesLecture Notes in Computer Science
dc.rightsopen access
dc.subject.othercloud computing
dc.subject.othercomputer crime
dc.subject.othercomputer networks
dc.subject.othercomputer security
dc.subject.othercryptography
dc.subject.othercyber security
dc.subject.otherdata communication systems
dc.subject.otherdata flow architectures
dc.subject.otherdata management systems
dc.subject.otherdata security
dc.subject.otherelectromagnetic interference and compatibility
dc.subject.othergeneral programming languages
dc.subject.otherhealth informatics
dc.subject.otherintrusion detection
dc.subject.othernetwork protocols
dc.subject.othernetwork security
dc.subject.othernetwork simulations
dc.subject.othersensors and actuators
dc.subject.othersignal processing
dc.subject.othertelecommunication traffic
dc.subject.otherthema EDItEUR::U Computing and Information Technology::UK Computer hardware::UKN Network hardware
dc.subject.otherthema EDItEUR::U Computing and Information Technology::UB Information technology: general topics::UBL Digital and information technologies: Legal aspects
dc.subject.otherthema EDItEUR::U Computing and Information Technology::UR Computer security
dc.subject.otherthema EDItEUR::U Computing and Information Technology::UN Databases::UNH Information retrieval
dc.titleCybersecurity of Digital Service Chains
dc.title.alternativeChallenges, Methodologies, and Tools
dc.typebook
oapen.identifier.doi10.1007/978-3-031-04036-8
oapen.relation.isPublishedBy9fa3421d-f917-4153-b9ab-fc337c396b5a
oapen.relation.isbn9783031040368
oapen.imprintSpringer International Publishing
oapen.pages257
oapen.place.publicationCham
dc.seriesnumber13300


Fichier(s) constituant ce document

FichiersTailleFormatVue

Il n'y a pas de fichiers associés à ce document.

Ce document figure dans la(les) collection(s) suivante(s)

Afficher la notice abrégée

open access
Excepté là où spécifié autrement, la license de ce document est décrite en tant que open access