Bücher Wenner
Denis Scheck stellt seine "BESTSELLERBIBEL" in St. Marien vor
25.11.2024 um 19:30 Uhr
Collaborative Approaches for Cyber Security in Cyber-Physical Systems
von Theo Dimitrakos, Javier Lopez, Fabio Martinelli
Verlag: Springer International Publishing
Reihe: Advanced Sciences and Technologies for Security Applications
E-Book / PDF
Kopierschutz: PDF mit Wasserzeichen

Hinweis: Nach dem Checkout (Kasse) wird direkt ein Link zum Download bereitgestellt. Der Link kann dann auf PC, Smartphone oder E-Book-Reader ausgeführt werden.
E-Books können per PayPal bezahlt werden. Wenn Sie E-Books per Rechnung bezahlen möchten, kontaktieren Sie uns bitte.

ISBN: 978-3-031-16088-2
Auflage: 1st ed. 2023
Erschienen am 02.01.2023
Sprache: Englisch
Umfang: 226 Seiten

Preis: 171,19 €

Biografische Anmerkung
Inhaltsverzeichnis

Dr. Fabio Martinelli (M) (M.Sc. 1994, Ph.D. 1999) is a senior researcher at IIT-CNR, where he leads the cyber-security programme. He is a co-author of more than two hundred scientific papers. His main research interests involve security and privacy in distributed and mobile systems and foundations of security and trust. He usually teaches at graduate level courses in computer security. He is involved in several Steering Committees of international conferences, workshops, and working groups, like the ERCIM STM WG, IFIP WG 11.14. Fabio Martinelli has been the coordinator of the EU FP7-NoE NESSoS on Engineering Secure Future Internet Services, and he is currently the scientific coordinator of the NeCS and C3ISP EU projects. Fabio Martinelli is the chair of the NIS WG3 and ECSO WG6 devoted to the preparation of the European Cyber-Security Strategic Research and Innovation Agenda.


 


Prof. Theo Dimitrakos (M) is a part-time Professor of Computer Science at the School of Computing and a Chief Researcher at Huawei. Previously He was at BT's Research and Innovation division. He has twenty years of research and innovation experience in a range of topics relating to information security, identity and access management, cloud computing, trust management, and cloud computing. Theo also plays a leading role in some of the largest and most successful collaborative European research initiatives. Theo has also served in the programme committee of various academic and industry conferences and the editorial board of international journals. Theo has been an author of 8 books, over 60 technical papers in international conferences and journals and an inventor of over 20 patents. He has been an invited speaker in various security and cloud industry events, a member of the ENISA expert group on cloud security and resilience and a contributor to several advisory reports published by ENISA, CSA, and ISF. He has a PhD in Computing from Imperial College London in the UK and a BSc in Mathematics from the University of Crete in Greece.


 


Prof. Javier Lopez is Full Professor and Head of the Computer Science Department at the University of Malaga. His research activities are mainly focused on network security, security protocols and critical information infrastructures, leading a number of national and international research projects in those areas, including projects in FP5, FP6 and FP7 European Programmes. Prof. Lopez is the Spanish representative in the IFIP Technical Committee 11 on Security and Protection in Information Systems, as well as the Spanish coordinator of ISO/IEC JTC1/SC27 WG5 on Identity management and privacy technologies. He is Co-Editor in Chief of International Journal of Information Security (IJIS), and a member of the Editorial Boards of, amongst others, IEEE Wireless Communications, Computers and Security, IEEE Internet of Things Journal, Journal of Computer Security, IET Information Security, and International Journal on Critical Infrastructure Protection. In the past, he was Chair of the IFIP Working Group 11.11 on Trust Management and Chair of the ERCIM Working Group on Security and Trust Management.



1. Collaborative and confidential architectures for information sharing and analytics.- 2. Secure Interconnection of large-scale CPS-based frameworks and middleware.- 3. Virtualized security-awareness systems and digital twins.- 4. Empirical evaluation of system vulnerabilities.- 5. Collaborative physical and cyber defense requirements.- 6. Heterogeneous data centric security policies specification and enforcement.- 7. Big data for anomaly and advanced threats detection.- 8. Collaborative identification and ranking of malware.- 9. Visual analytics techniques for cyber security.- 10. Collaborative mitigation methodologies against advanced and persistent attacks.


andere Formate
weitere Titel der Reihe