Security-related advanced technologies in critical infrastructure protection : theoretical and practical approach / edited by Tünde Anna Kovács, Zoltán Nyikes and Igor Fürstner.

This book collects the latest research results on security-related advanced technologies. The chapters contain relevant and interesting topics from numerous research. Data science and artificial intelligence research nowadays one of the most important topics for the industry and the security sectors...

Full description

Saved in:
Bibliographic Details
Corporate Author: NATO Advanced Research Workshop on Security-Related Advanced Technologies in Critical Infrastructure Protection Budapest, Hungary
Other Authors: Kovács, Tünde Anna, Nyikes, Zoltán, Fürstner, Igor
Format: eBook
Language:English
Published: Dordrecht : Springer, 2022.
Series:NATO science for peace and security series. Environmental security.
Subjects:
Online Access:Click for online access

MARC

LEADER 00000cam a2200000 a 4500
001 on1344158863
003 OCoLC
005 20241006213017.0
006 m o d
007 cr un|---aucuu
008 220910s2022 ne o 100 0 eng d
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d GW5XE  |d YDX  |d EBLCP  |d OCLCQ  |d OCLCF  |d OCLCQ  |d N$T  |d WSU  |d OCLCO 
019 |a 1343945767 
020 |a 9789402421743  |q (electronic bk.) 
020 |a 9402421742  |q (electronic bk.) 
020 |z 9789402421736 
020 |z 9402421734 
024 7 |a 10.1007/978-94-024-2174-3  |2 doi 
035 |a (OCoLC)1344158863  |z (OCoLC)1343945767 
050 4 |a QA76.9.A25 
072 7 |a TNKS  |2 bicssc 
072 7 |a TEC009000  |2 bisacsh 
072 7 |a TNKS  |2 thema 
049 |a HCDD 
111 2 |a NATO Advanced Research Workshop on Security-Related Advanced Technologies in Critical Infrastructure Protection  |d (2021 :  |c Budapest, Hungary) 
245 1 0 |a Security-related advanced technologies in critical infrastructure protection :  |b theoretical and practical approach /  |c edited by Tünde Anna Kovács, Zoltán Nyikes and Igor Fürstner. 
260 |a Dordrecht :  |b Springer,  |c 2022. 
300 |a 1 online resource (469 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a NATO Science for Peace and Security, Series C, Environmental Security 
500 |a "Proceedings of the NATO Advanced Research Workshop on Security-Related Advanced Technologies in Critical Infrastructure Protection, Budapest, Hungary, 24-25 August 2021." 
505 0 |a Intro -- Foreword -- Organization -- Contents -- Chapter 1: Critical Threat of Critical Infrastructures: The Human Factor -- 1.1 Introduction -- 1.2 Critical Infrastructures -- 1.2.1 Protection of Critical Infrastructures -- 1.3 The Human Factor -- 1.3.1 Addressing the Human Factor -- 1.3.2 Dealing with the Human Factor -- 1.3.3 Boredom and Stress -- 1.4 Summary -- References -- Chapter 2: Applications of Hopkinson Bar Technique for Capability Testing of High-Energy Absorption Materials -- 2.1 Introduction -- 2.2 SHPB Test Stand and Configurations of Test Samples 
505 8 |a 2.3 Dynamic Behavior of Energy-Absorbing Building Materials -- 2.4 Evaluation Indexes of Energy Absorption -- 2.5 Conclusion -- References -- Chapter 3: A Method for Approximating Circular Error Probable -- 3.1 Introduction -- 3.2 Methods for Deriving CEP -- 3.2.1 Stochastic Approximation -- 3.3 Approximation CEP by SA -- 3.3.1 The Ratio of Standard Deviations in CEP Estimation -- 3.4 Numerical Analysis -- 3.5 Summary -- References -- Chapter 4: Machine Learning Aspects of Internet Firewall Data -- 4.1 Introduction -- 4.2 Modeling Network Firewall Rules by Neural Network 
505 8 |a 4.3 NN Parameter Analysis -- 4.4 Classification Machine Learning Algorithms with Implementation in Firewall Data -- 4.5 Firewall Dataset Clustering -- 4.6 Conclusions -- Appendices -- Appendix A: Clustering -- K-Means Algorithm -- Appendix B: Clustering -- EM Algorithm -- Appendix C: Clustering -- DBSCAN Algorithm -- References -- Chapter 5: The End of Encryption? -- The Era of Quantum Computers -- 5.1 Introduction -- 5.2 Machine Based Identification -- 5.3 Understanding Passwords -- 5.4 Encryption -- 5.5 Quantum Computers -- 5.6 Quantum Apocalypse -- 5.7 Summary -- References 
505 8 |a Chapter 6: Can Blockchain Technology Be a Solution for Safety in No-Trust Environments? -- 6.1 Introduction -- 6.2 Safety in Traditional and Modern-Age Systems -- 6.3 The Blockchain -- 6.4 Consensus Mechanisms to Be Used -- 6.4.1 Proof of Work (PoW) -- 6.4.2 Proof of Capacity (PoC) -- 6.4.3 Proof of Stake (PoS) -- 6.4.4 Proof of Importance (PoI) -- 6.4.5 Delegated Proof of Stake (DPoS) -- 6.4.6 Proof of Burn (PoB) -- 6.4.7 Proof of Authority (PoA) -- 6.4.8 Proof of Elapsed Time (PoET) -- 6.4.9 Summary of Potential Disadvantages of Blockchains -- 6.5 Summary -- References 
505 8 |a Chapter 7: A Security Assessment of AI, Related to the Financial Institutions -- 7.1 Introduction -- 7.2 A High-Level Threat Analysis -- 7.2.1 Threat Actors and Their Capabilities -- 7.2.2 AIś Known Weaknesses -- 7.2.3 Use and the Role of AI in Financial Institutions -- 7.3 AI and Cybersecurity -- 7.3.1 Audit Standards -- 7.3.2 Risk Data and Risk Scenarios -- 7.4 Conclusion -- References -- Chapter 8: Machine Learning Based Network Intrusion Detection System for Internet of Things Cybersecurity -- 8.1 Introduction -- 8.1.1 Related Work -- 8.1.2 Dataset -- 8.2 Methods -- 8.2.1 Feature Selection 
500 |a 8.2.2 Supervised Learning Models 
520 |a This book collects the latest research results on security-related advanced technologies. The chapters contain relevant and interesting topics from numerous research. Data science and artificial intelligence research nowadays one of the most important topics for the industry and the security sectors. The autonomy and counter-autonomy research topic are also very interesting. Autonomous cars have become a part of the common days, but their safe and secure application is not assured. The research results in this field want to support and assure safe and secure autonomous applications in our quotidian life. Also, the safe and secure robotics in the industries and the defence assure a high standard of living and the given research results in this area can use to increase it. The researchers work on it and publish the results that can be interesting for the other researchers and the innovators, but also the industrial part members. The researchers work on it and publish the results that can be interesting for the other researchers and the innovators, but also the industrial part members. Communication is a part of our life, but the communication systems mesh all around the world. Communication is the basis of modern life because without it life stop. One other interesting and very important research area is the material sciences. Virtual life cannot exist without hardware and materials. The new technical applications require new materials, that can suffice the mechanical and physical, chemical properties demand. Nowadays a common requirement of the materials the high strength and lightweight. Researchers want to serve the industrial requests and innovate new composite materials or increase the properties of the material through a new technological process. The authors publish the latest results of the security-related research area including the newest innovations and technologies which rise the interest of the defence and the modern industries even the interest of other researchers. 
588 0 |a Online resource; title from PDF title page (SpringerLink, viewed September 14, 2022). 
650 0 |a Computer security  |v Congresses. 
650 0 |a Artificial intelligence  |x Security measures  |v Congresses. 
650 7 |a Computer security  |2 fast 
655 7 |a proceedings (reports)  |2 aat 
655 7 |a Conference papers and proceedings  |2 fast 
655 7 |a Conference papers and proceedings.  |2 lcgft 
655 7 |a Actes de congrès.  |2 rvmgf 
700 1 |a Kovács, Tünde Anna. 
700 1 |a Nyikes, Zoltán. 
700 1 |a Fürstner, Igor. 
776 0 8 |i Print version:  |a Kovács, Tünde Anna  |t Security-Related Advanced Technologies in Critical Infrastructure Protection  |d Dordrecht : Springer Netherlands,c2022  |z 9789402421736 
830 0 |a NATO science for peace and security series.  |n Series C,  |p Environmental security. 
856 4 0 |u https://holycross.idm.oclc.org/login?auth=cas&url=https://link.springer.com/10.1007/978-94-024-2174-3  |y Click for online access 
903 |a SPRING-PHYSICS2022 
994 |a 92  |b HCD