|
Showing 1 - 7 of
7 matches in All Departments
The Smart Grid security ecosystem is complex and
multi-disciplinary, and relatively under-researched compared to the
traditional information and network security disciplines. While the
Smart Grid has provided increased efficiencies in monitoring power
usage, directing power supplies to serve peak power needs and
improving efficiency of power delivery, the Smart Grid has also
opened the way for information security breaches and other types of
security breaches. Potential threats range from meter manipulation
to directed, high-impact attacks on critical infrastructure that
could bring down regional or national power grids. It is essential
that security measures are put in place to ensure that the Smart
Grid does not succumb to these threats and to safeguard this
critical infrastructure at all times. Dr. Florian Skopik is one of
the leading researchers in Smart Grid security, having organized
and led research consortia and panel discussions in this field.
Smart Grid Security will provide the first truly holistic view of
leading edge Smart Grid security research. This book does not focus
on vendor-specific solutions, instead providing a complete
presentation of forward-looking research in all areas of Smart Grid
security. The book will enable practitioners to learn about
upcoming trends, scientists to share new directions in research,
and government and industry decision-makers to prepare for major
strategic decisions regarding implementation of Smart Grid
technology.
This book provides insights into smart ways of computer log data
analysis, with the goal of spotting adversarial actions. It is
organized into 3 major parts with a total of 8 chapters that
include a detailed view on existing solutions, as well as novel
techniques that go far beyond state of the art. The first part of
this book motivates the entire topic and highlights major
challenges, trends and design criteria for log data analysis
approaches, and further surveys and compares the state of the art.
The second part of this book introduces concepts that apply
character-based, rather than token-based, approaches and thus work
on a more fine-grained level. Furthermore, these solutions were
designed for "online use", not only forensic analysis, but also
process new log lines as they arrive in an efficient single pass
manner. An advanced method for time series analysis aims at
detecting changes in the overall behavior profile of an observed
system and spotting trends and periodicities through log analysis.
The third part of this book introduces the design of the AMiner,
which is an advanced open source component for log data anomaly
mining. The AMiner comes with several detectors to spot new events,
new parameters, new correlations, new values and unknown value
combinations and can run as stand-alone solution or as sensor with
connection to a SIEM solution. More advanced detectors help to
determines the characteristics of variable parts of log lines,
specifically the properties of numerical and categorical fields.
Detailed examples throughout this book allow the reader to better
understand and apply the introduced techniques with open source
software. Step-by-step instructions help to get familiar with the
concepts and to better comprehend their inner mechanisms. A log
test data set is available as free download and enables the reader
to get the system up and running in no time. This book is designed
for researchers working in the field of cyber security, and
specifically system monitoring, anomaly detection and intrusion
detection. The content of this book will be particularly useful for
advanced-level students studying computer science, computer
technology, and information systems. Forward-thinking
practitioners, who would benefit from becoming familiar with the
advanced anomaly detection methods, will also be interested in this
book.
This book provides insights into smart ways of computer log data
analysis, with the goal of spotting adversarial actions. It is
organized into 3 major parts with a total of 8 chapters that
include a detailed view on existing solutions, as well as novel
techniques that go far beyond state of the art. The first part of
this book motivates the entire topic and highlights major
challenges, trends and design criteria for log data analysis
approaches, and further surveys and compares the state of the art.
The second part of this book introduces concepts that apply
character-based, rather than token-based, approaches and thus work
on a more fine-grained level. Furthermore, these solutions were
designed for "online use", not only forensic analysis, but also
process new log lines as they arrive in an efficient single pass
manner. An advanced method for time series analysis aims at
detecting changes in the overall behavior profile of an observed
system and spotting trends and periodicities through log analysis.
The third part of this book introduces the design of the AMiner,
which is an advanced open source component for log data anomaly
mining. The AMiner comes with several detectors to spot new events,
new parameters, new correlations, new values and unknown value
combinations and can run as stand-alone solution or as sensor with
connection to a SIEM solution. More advanced detectors help to
determines the characteristics of variable parts of log lines,
specifically the properties of numerical and categorical fields.
Detailed examples throughout this book allow the reader to better
understand and apply the introduced techniques with open source
software. Step-by-step instructions help to get familiar with the
concepts and to better comprehend their inner mechanisms. A log
test data set is available as free download and enables the reader
to get the system up and running in no time. This book is designed
for researchers working in the field of cyber security, and
specifically system monitoring, anomaly detection and intrusion
detection. The content of this book will be particularly useful for
advanced-level students studying computer science, computer
technology, and information systems. Forward-thinking
practitioners, who would benefit from becoming familiar with the
advanced anomaly detection methods, will also be interested in this
book.
Socially enhanced Services Computing deals with a novel and
exciting new field at the intersection between Social Computing,
Service-oriented Computing, Crowd Computing, and Cloud Computing.
The present work presents a collection of selected papers by the
editors of this volume, which they feel will help the reader in
understanding this field. The approach discussed allows for a
seamless integration of people into trusted dynamic compositions of
Human-provided Services and Software-based services, thus
empowering new interaction models and processes in massive
collaboration scenarios in a Future Internet.
Socially enhanced Services Computing deals with a novel and
exciting new field at the intersection between Social Computing,
Service-oriented Computing, Crowd Computing, and Cloud Computing.
The present work presents a collection of selected papers by the
editors of this volume, which they feel will help the reader in
understanding this field. The approach discussed allows for a
seamless integration of people into trusted dynamic compositions of
Human-provided Services and Software-based services, thus
empowering new interaction models and processes in massive
collaboration scenarios in a Future Internet.
Threat intelligence is a surprisingly complex topic that goes far
beyond the obvious technical challenges of collecting, modelling
and sharing technical indicators. Most books in this area focus
mainly on technical measures to harden a system based on threat
intel data and limit their scope to single organizations only. This
book provides a unique angle on the topic of national cyber threat
intelligence and security information sharing. It also provides a
clear view on ongoing works in research laboratories world-wide in
order to address current security concerns at national level. It
allows practitioners to learn about upcoming trends, researchers to
share current results, and decision makers to prepare for future
developments.
Threat intelligence is a surprisingly complex topic that goes far
beyond the obvious technical challenges of collecting, modelling
and sharing technical indicators. Most books in this area focus
mainly on technical measures to harden a system based on threat
intel data and limit their scope to single organizations only. This
book provides a unique angle on the topic of national cyber threat
intelligence and security information sharing. It also provides a
clear view on ongoing works in research laboratories world-wide in
order to address current security concerns at national level. It
allows practitioners to learn about upcoming trends, researchers to
share current results, and decision makers to prepare for future
developments.
|
You may like...
Wonka
Timothee Chalamet
Blu-ray disc
R250
R190
Discovery Miles 1 900
|