Show simple item record

dc.contributor.editorKołodziej, Joanna
dc.contributor.editorRepetto, Matteo
dc.contributor.editorDuzha, Armend
dc.date.accessioned2022-04-13T15:09:11Z
dc.date.available2022-04-13T15:09:11Z
dc.date.issued2022
dc.identifierONIX_20220413_9783031040368_28
dc.identifier.urihttps://library.oapen.org/handle/20.500.12657/54033
dc.description.abstractThis open access book presents the main scientific results from the H2020 GUARD project. The GUARD project aims at filling the current technological gap between software management paradigms and cybersecurity models, the latter still lacking orchestration and agility to effectively address the dynamicity of the former. This book provides a comprehensive review of the main concepts, architectures, algorithms, and non-technical aspects developed during three years of investigation; the description of the Smart Mobility use case developed at the end of the project gives a practical example of how the GUARD platform and related technologies can be deployed in practical scenarios. We expect the book to be interesting for the broad group of researchers, engineers, and professionals daily experiencing the inadequacy of outdated cybersecurity models for modern computing environments and cyber-physical systems.
dc.languageEnglish
dc.relation.ispartofseriesLecture Notes in Computer Science
dc.subject.classificationthema EDItEUR::U Computing and Information Technology::UK Computer hardware::UKN Network hardwareen_US
dc.subject.classificationthema EDItEUR::U Computing and Information Technology::UB Information technology: general topics::UBL Digital and information technologies: Legal aspectsen_US
dc.subject.classificationthema EDItEUR::U Computing and Information Technology::UR Computer securityen_US
dc.subject.classificationthema EDItEUR::U Computing and Information Technology::UN Databases::UNH Information retrievalen_US
dc.subject.othercloud computing
dc.subject.othercomputer crime
dc.subject.othercomputer networks
dc.subject.othercomputer security
dc.subject.othercryptography
dc.subject.othercyber security
dc.subject.otherdata communication systems
dc.subject.otherdata flow architectures
dc.subject.otherdata management systems
dc.subject.otherdata security
dc.subject.otherelectromagnetic interference and compatibility
dc.subject.othergeneral programming languages
dc.subject.otherhealth informatics
dc.subject.otherintrusion detection
dc.subject.othernetwork protocols
dc.subject.othernetwork security
dc.subject.othernetwork simulations
dc.subject.othersensors and actuators
dc.subject.othersignal processing
dc.subject.othertelecommunication traffic
dc.titleCybersecurity of Digital Service Chains
dc.title.alternativeChallenges, Methodologies, and Tools
dc.typebook
oapen.identifier.doi10.1007/978-3-031-04036-8
oapen.relation.isPublishedBy6c6992af-b843-4f46-859c-f6e9998e40d5
oapen.relation.isbn9783031040368
oapen.imprintSpringer International Publishing
oapen.series.number13300
oapen.pages257
oapen.place.publicationCham


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record