|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
on1344158863 |
003 |
OCoLC |
005 |
20241006213017.0 |
006 |
m o d |
007 |
cr un|---aucuu |
008 |
220910s2022 ne o 100 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|e pn
|c EBLCP
|d GW5XE
|d YDX
|d EBLCP
|d OCLCQ
|d OCLCF
|d OCLCQ
|d N$T
|d WSU
|d OCLCO
|
019 |
|
|
|a 1343945767
|
020 |
|
|
|a 9789402421743
|q (electronic bk.)
|
020 |
|
|
|a 9402421742
|q (electronic bk.)
|
020 |
|
|
|z 9789402421736
|
020 |
|
|
|z 9402421734
|
024 |
7 |
|
|a 10.1007/978-94-024-2174-3
|2 doi
|
035 |
|
|
|a (OCoLC)1344158863
|z (OCoLC)1343945767
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a TNKS
|2 bicssc
|
072 |
|
7 |
|a TEC009000
|2 bisacsh
|
072 |
|
7 |
|a TNKS
|2 thema
|
049 |
|
|
|a HCDD
|
111 |
2 |
|
|a NATO Advanced Research Workshop on Security-Related Advanced Technologies in Critical Infrastructure Protection
|d (2021 :
|c Budapest, Hungary)
|
245 |
1 |
0 |
|a Security-related advanced technologies in critical infrastructure protection :
|b theoretical and practical approach /
|c edited by Tünde Anna Kovács, Zoltán Nyikes and Igor Fürstner.
|
260 |
|
|
|a Dordrecht :
|b Springer,
|c 2022.
|
300 |
|
|
|a 1 online resource (469 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a NATO Science for Peace and Security, Series C, Environmental Security
|
500 |
|
|
|a "Proceedings of the NATO Advanced Research Workshop on Security-Related Advanced Technologies in Critical Infrastructure Protection, Budapest, Hungary, 24-25 August 2021."
|
505 |
0 |
|
|a Intro -- Foreword -- Organization -- Contents -- Chapter 1: Critical Threat of Critical Infrastructures: The Human Factor -- 1.1 Introduction -- 1.2 Critical Infrastructures -- 1.2.1 Protection of Critical Infrastructures -- 1.3 The Human Factor -- 1.3.1 Addressing the Human Factor -- 1.3.2 Dealing with the Human Factor -- 1.3.3 Boredom and Stress -- 1.4 Summary -- References -- Chapter 2: Applications of Hopkinson Bar Technique for Capability Testing of High-Energy Absorption Materials -- 2.1 Introduction -- 2.2 SHPB Test Stand and Configurations of Test Samples
|
505 |
8 |
|
|a 2.3 Dynamic Behavior of Energy-Absorbing Building Materials -- 2.4 Evaluation Indexes of Energy Absorption -- 2.5 Conclusion -- References -- Chapter 3: A Method for Approximating Circular Error Probable -- 3.1 Introduction -- 3.2 Methods for Deriving CEP -- 3.2.1 Stochastic Approximation -- 3.3 Approximation CEP by SA -- 3.3.1 The Ratio of Standard Deviations in CEP Estimation -- 3.4 Numerical Analysis -- 3.5 Summary -- References -- Chapter 4: Machine Learning Aspects of Internet Firewall Data -- 4.1 Introduction -- 4.2 Modeling Network Firewall Rules by Neural Network
|
505 |
8 |
|
|a 4.3 NN Parameter Analysis -- 4.4 Classification Machine Learning Algorithms with Implementation in Firewall Data -- 4.5 Firewall Dataset Clustering -- 4.6 Conclusions -- Appendices -- Appendix A: Clustering -- K-Means Algorithm -- Appendix B: Clustering -- EM Algorithm -- Appendix C: Clustering -- DBSCAN Algorithm -- References -- Chapter 5: The End of Encryption? -- The Era of Quantum Computers -- 5.1 Introduction -- 5.2 Machine Based Identification -- 5.3 Understanding Passwords -- 5.4 Encryption -- 5.5 Quantum Computers -- 5.6 Quantum Apocalypse -- 5.7 Summary -- References
|
505 |
8 |
|
|a Chapter 6: Can Blockchain Technology Be a Solution for Safety in No-Trust Environments? -- 6.1 Introduction -- 6.2 Safety in Traditional and Modern-Age Systems -- 6.3 The Blockchain -- 6.4 Consensus Mechanisms to Be Used -- 6.4.1 Proof of Work (PoW) -- 6.4.2 Proof of Capacity (PoC) -- 6.4.3 Proof of Stake (PoS) -- 6.4.4 Proof of Importance (PoI) -- 6.4.5 Delegated Proof of Stake (DPoS) -- 6.4.6 Proof of Burn (PoB) -- 6.4.7 Proof of Authority (PoA) -- 6.4.8 Proof of Elapsed Time (PoET) -- 6.4.9 Summary of Potential Disadvantages of Blockchains -- 6.5 Summary -- References
|
505 |
8 |
|
|a Chapter 7: A Security Assessment of AI, Related to the Financial Institutions -- 7.1 Introduction -- 7.2 A High-Level Threat Analysis -- 7.2.1 Threat Actors and Their Capabilities -- 7.2.2 AIś Known Weaknesses -- 7.2.3 Use and the Role of AI in Financial Institutions -- 7.3 AI and Cybersecurity -- 7.3.1 Audit Standards -- 7.3.2 Risk Data and Risk Scenarios -- 7.4 Conclusion -- References -- Chapter 8: Machine Learning Based Network Intrusion Detection System for Internet of Things Cybersecurity -- 8.1 Introduction -- 8.1.1 Related Work -- 8.1.2 Dataset -- 8.2 Methods -- 8.2.1 Feature Selection
|
500 |
|
|
|a 8.2.2 Supervised Learning Models
|
520 |
|
|
|a This book collects the latest research results on security-related advanced technologies. The chapters contain relevant and interesting topics from numerous research. Data science and artificial intelligence research nowadays one of the most important topics for the industry and the security sectors. The autonomy and counter-autonomy research topic are also very interesting. Autonomous cars have become a part of the common days, but their safe and secure application is not assured. The research results in this field want to support and assure safe and secure autonomous applications in our quotidian life. Also, the safe and secure robotics in the industries and the defence assure a high standard of living and the given research results in this area can use to increase it. The researchers work on it and publish the results that can be interesting for the other researchers and the innovators, but also the industrial part members. The researchers work on it and publish the results that can be interesting for the other researchers and the innovators, but also the industrial part members. Communication is a part of our life, but the communication systems mesh all around the world. Communication is the basis of modern life because without it life stop. One other interesting and very important research area is the material sciences. Virtual life cannot exist without hardware and materials. The new technical applications require new materials, that can suffice the mechanical and physical, chemical properties demand. Nowadays a common requirement of the materials the high strength and lightweight. Researchers want to serve the industrial requests and innovate new composite materials or increase the properties of the material through a new technological process. The authors publish the latest results of the security-related research area including the newest innovations and technologies which rise the interest of the defence and the modern industries even the interest of other researchers.
|
588 |
0 |
|
|a Online resource; title from PDF title page (SpringerLink, viewed September 14, 2022).
|
650 |
|
0 |
|a Computer security
|v Congresses.
|
650 |
|
0 |
|a Artificial intelligence
|x Security measures
|v Congresses.
|
650 |
|
7 |
|a Computer security
|2 fast
|
655 |
|
7 |
|a proceedings (reports)
|2 aat
|
655 |
|
7 |
|a Conference papers and proceedings
|2 fast
|
655 |
|
7 |
|a Conference papers and proceedings.
|2 lcgft
|
655 |
|
7 |
|a Actes de congrès.
|2 rvmgf
|
700 |
1 |
|
|a Kovács, Tünde Anna.
|
700 |
1 |
|
|a Nyikes, Zoltán.
|
700 |
1 |
|
|a Fürstner, Igor.
|
776 |
0 |
8 |
|i Print version:
|a Kovács, Tünde Anna
|t Security-Related Advanced Technologies in Critical Infrastructure Protection
|d Dordrecht : Springer Netherlands,c2022
|z 9789402421736
|
830 |
|
0 |
|a NATO science for peace and security series.
|n Series C,
|p Environmental security.
|
856 |
4 |
0 |
|u https://holycross.idm.oclc.org/login?auth=cas&url=https://link.springer.com/10.1007/978-94-024-2174-3
|y Click for online access
|
903 |
|
|
|a SPRING-PHYSICS2022
|
994 |
|
|
|a 92
|b HCD
|