|
Showing 1 - 3 of
3 matches in All Departments
|
Cyber-Physical Security for Critical Infrastructures Protection - First International Workshop, CPS4CIP 2020, Guildford, UK, September 18, 2020, Revised Selected Papers (Paperback, 1st ed. 2021)
Habtamu Abie, Silvio Ranise, Luca Verderame, Enrico Cambiaso, Rita Ugarelli, …
|
R1,302
Discovery Miles 13 020
|
Ships in 10 - 15 working days
|
This book constitutes the refereed proceedings of the First
International Workshop on Cyber-Physical Security for Critical
Infrastructures Protection, CPS4CIP 2020, which was organized in
conjunction with the European Symposium on Research in Computer
Security, ESORICS 2020, and held online on September 2020.The 14
full papers presented in this volume were carefully reviewed and
selected from 24 submissions. They were organized in topical
sections named: security threat intelligence; data anomaly
detection: predict and prevent; computer vision and dataset for
security; security management and governance; and impact
propagation and power traffic analysis. The book contains 6
chapters which are available open access under a CC-BY license.
|
Computer Security - ESORICS 2019 International Workshops, IOSec, MSTEC, and FINSEC, Luxembourg City, Luxembourg, September 26-27, 2019, Revised Selected Papers (Paperback, 1st ed. 2020)
Apostolos P. Fournaris, Manos Athanatos, Konstantinos Lampropoulos, Sotiris Ioannidis, George Hatzivasilis, …
|
R1,558
Discovery Miles 15 580
|
Ships in 10 - 15 working days
|
This book constitutes the refereed post-conference proceedings of
the Second International Workshop on Information & Operational
Technology (IT & OT) security systems, IOSec 2019 , the First
International Workshop on Model-driven Simulation and Training
Environments, MSTEC 2019, and the First International Workshop on
Security for Financial Critical Infrastructures and Services,
FINSEC 2019, held in Luxembourg City, Luxembourg, in September
2019, in conjunction with the 24th European Symposium on Research
in Computer Security, ESORICS 2019. The IOSec Workshop received 17
submissions from which 7 full papers were selected for
presentation. They cover topics related to security architectures
and frameworks for enterprises, SMEs, public administration or
critical infrastructures, threat models for IT & OT systems and
communication networks, cyber-threat detection, classification and
pro ling, incident management, security training and awareness,
risk assessment safety and security, hardware security,
cryptographic engineering, secure software development, malicious
code analysis as well as security testing platforms. From the MSTEC
Workshop 7 full papers out of 15 submissions are included. The
selected papers deal focus on the verification and validation
(V&V) process, which provides the operational community with
confidence in knowing that cyber models represent the real world,
and discuss how defense training may benefit from cyber models. The
FINSEC Workshop received 8 submissions from which 3 full papers and
1 short paper were accepted for publication. The papers reflect the
objective to rethink cyber-security in the light of latest
technology developments (e.g., FinTech, cloud computing,
blockchain, BigData, AI, Internet-of-Things (IoT), mobile-first
services, mobile payments).
In the digital world the management and protection of digital
assets and the rights associated with them from unauthorized
access, use and dissemination has for a long time been a matter of
concern for many rights holders, and the protection of privacy a
matter of concern for many users. A distributed Digital Rights
Management (DRM) system is ideally suited to providing the
necessary protection and management. This book investigates and
describes a distributed DRM model, which fulfills this purpose.
This analysis should be especially useful to professionals in
e-Government, e-Business, e-Entertainment, e-Learning, and
e-Health, to all stakeholders in the Intellectual Property (IP)
value chain, content producers, owners, distributors, consumers,
technology providers, etc., and to anyone who is planning to
protect and manage rights in connection with any form of digital
information in a free, balanced, equitable and commercially viable
society.
|
|