• Genere: Libro
  • Lingua: Inglese
  • Editore: Springer
  • Pubblicazione: 09/2016
  • Edizione: Softcover reprint of the original 1st ed. 2014

Cyberpatterns

;

54,98 €
52,23 €
AGGIUNGI AL CARRELLO
TRAMA
Cyberspace in increasingly important to people in their everyday lives for purchasing goods on the Internet, to energy supply increasingly managed remotely using Internet protocols. Unfortunately, this dependence makes us susceptible to attacks from nation states, terrorists, criminals and hactivists. Therefore, we need a better understanding of cyberspace, for which patterns, which are predictable regularities, may help to detect, understand and respond to incidents better. The inspiration for the workshop came from the existing work on formalising design patterns applied to cybersecurity, but we also need to understand the many other types of patterns that arise in cyberspace.

SOMMARIO
Cyberpatterns: Towards a Pattern Oriented Study of Cyberspace.- Towards a Conceptual Framework for Security Patterns.- Design Patterns: Applications and Open Issues.- Challenges For A Formal Framework for Patterns.- Design Space-Based Pattern Representation.- Extending AOP Principles for the Description of Network Security Patterns.- Management Patterns for Network Resilience: Design and Verification of Policy Configurations.- A Heuristic Approach for Secure Service Composition Adaptation.-  A Strategy for Structuring and Formalising Attack Patterns.- Attack Pattern Recognition through Correlating Cyber Situational Awareness in Computer Networks.- Towards a Penetration Testing Framework using Attack Patterns.- On the use of Design Patterns to Capture Memory Corruption Vulnerabilities.- ‘Weird Machine’ Patterns.- Towards a Simulation of Information Security Behaviour in Organisations.- Security Design Patterns in the MASTER Workbench.- Evaluating the Implications of Attack and Security Patterns with Premortems.- An Overview of Artificial Intelligence Based Pattern Matching in a Security and Digital Forensic Context.- Partitional Clustering of Malware using K-Means.- Dynamic Monitoring of Composed Services.- Where has this hard disk been? : Extracting geospatial intelligence from digital storage systems.- Future Directions for Research on Cyberpatterns.

ALTRE INFORMAZIONI
  • Condizione: Nuovo
  • ISBN: 9783319352183
  • Dimensioni: 235 x 155 mm
  • Formato: Brossura
  • Illustration Notes: XI, 264 p. 48 illus.
  • Pagine Arabe: 264
  • Pagine Romane: xi