This book describes cyber-security issues underpinning several cyber-physical systems and several application domains, proposing a common perspective able to collect similarities as well as depict divergences and specific solution methods. Special attention is given to those approaches and technologies that unleash the power of collaboration among stakeholders, in a field based often developed in isolation and segregation of information. Given the pervasively growing dependency of society on IT technology, and the corresponding proliferation of cyber-threats, there is both an imperative…mehr
This book describes cyber-security issues underpinning several cyber-physical systems and several application domains, proposing a common perspective able to collect similarities as well as depict divergences and specific solution methods. Special attention is given to those approaches and technologies that unleash the power of collaboration among stakeholders, in a field based often developed in isolation and segregation of information.
Given the pervasively growing dependency of society on IT technology, and the corresponding proliferation of cyber-threats, there is both an imperative need and opportunity to develop a coherent set of techniques to cope with the changing nature of the upcoming cyber-security challenges. These include evolving threats and new technological means to exploit vulnerabilities of cyber-physical systems that have direct socio-technical, societal and economic consequences for Europe and the world. We witness cyber-attacks on large scale infrastructures for energy, transport, healthcare systems and smart systems. The interplay between security and safety issues is now paramount and will be even more relevant in the future.
The book collects contributions from a number of scientists in Europe and presents the results of several European Projects, as NeCS, SPARTA, E-CORRIDOR and C3ISP. It will be of value to industrial researchers, practitioners and engineers developing cyber-physical solutions, as well as academics and students in cyber-security, ICT, and smart technologies in general.
Produktdetails
Produktdetails
Advanced Sciences and Technologies for Security Applications
Dr. Fabio Martinelli (M) (M.Sc. 1994, Ph.D. 1999) is a senior researcher at IIT-CNR, where he leads the cyber-security programme. He is a co-author of more than two hundred scientific papers. His main research interests involve security and privacy in distributed and mobile systems and foundations of security and trust. He usually teaches at graduate level courses in computer security. He is involved in several Steering Committees of international conferences, workshops, and working groups, like the ERCIM STM WG, IFIP WG 11.14. Fabio Martinelli has been the coordinator of the EU FP7-NoE NESSoS on Engineering Secure Future Internet Services, and he is currently the scientific coordinator of the NeCS and C3ISP EU projects. Fabio Martinelli is the chair of the NIS WG3 and ECSO WG6 devoted to the preparation of the European Cyber-Security Strategic Research and Innovation Agenda. Prof. Theo Dimitrakos (M) is a part-time Professor of Computer Science at the School of Computing and a Chief Researcher at Huawei. Previously He was at BT's Research and Innovation division. He has twenty years of research and innovation experience in a range of topics relating to information security, identity and access management, cloud computing, trust management, and cloud computing. Theo also plays a leading role in some of the largest and most successful collaborative European research initiatives. Theo has also served in the programme committee of various academic and industry conferences and the editorial board of international journals. Theo has been an author of 8 books, over 60 technical papers in international conferences and journals and an inventor of over 20 patents. He has been an invited speaker in various security and cloud industry events, a member of the ENISA expert group on cloud security and resilience and a contributor to several advisory reports published by ENISA, CSA, and ISF. He has a PhD in Computing from Imperial College London in the UK and a BSc in Mathematics from the University of Crete in Greece. Prof. Javier Lopez is Full Professor and Head of the Computer Science Department at the University of Malaga. His research activities are mainly focused on network security, security protocols and critical information infrastructures, leading a number of national and international research projects in those areas, including projects in FP5, FP6 and FP7 European Programmes. Prof. Lopez is the Spanish representative in the IFIP Technical Committee 11 on Security and Protection in Information Systems, as well as the Spanish coordinator of ISO/IEC JTC1/SC27 WG5 on Identity management and privacy technologies. He is Co-Editor in Chief of International Journal of Information Security (IJIS), and a member of the Editorial Boards of, amongst others, IEEE Wireless Communications, Computers and Security, IEEE Internet of Things Journal, Journal of Computer Security, IET Information Security, and International Journal on Critical Infrastructure Protection. In the past, he was Chair of the IFIP Working Group 11.11 on Trust Management and Chair of the ERCIM Working Group on Security and Trust Management.
Inhaltsangabe
1. Collaborative and confidential architectures for information sharing and analytics.- 2. Secure Interconnection of large-scale CPS-based frameworks and middleware.- 3. Virtualized security-awareness systems and digital twins.- 4. Empirical evaluation of system vulnerabilities.- 5. Collaborative physical and cyber defense requirements.- 6. Heterogeneous data centric security policies specification and enforcement.- 7. Big data for anomaly and advanced threats detection.- 8. Collaborative identification and ranking of malware.- 9. Visual analytics techniques for cyber security.- 10. Collaborative mitigation methodologies against advanced and persistent attacks.
1. Collaborative and confidential architectures for information sharing and analytics.- 2. Secure Interconnection of large-scale CPS-based frameworks and middleware.- 3. Virtualized security-awareness systems and digital twins.- 4. Empirical evaluation of system vulnerabilities.- 5. Collaborative physical and cyber defense requirements.- 6. Heterogeneous data centric security policies specification and enforcement.- 7. Big data for anomaly and advanced threats detection.- 8. Collaborative identification and ranking of malware.- 9. Visual analytics techniques for cyber security.- 10. Collaborative mitigation methodologies against advanced and persistent attacks.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826