Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Self-learning Anomaly Detection in Industrial Production
  • Language: en
  • Pages: 224

Self-learning Anomaly Detection in Industrial Production

Configuring an anomaly-based Network Intrusion Detection System for cybersecurity of an industrial system in the absence of information on networking infrastructure and programmed deterministic industrial process is challenging. Within the research work, different self-learning frameworks to analyze passively captured network traces from PROFINET-based industrial system for protocol-based and process behavior-based anomaly detection are developed, and evaluated on a real-world industrial system.

Information Systems Security and Privacy
  • Language: en
  • Pages: 438

Information Systems Security and Privacy

This book constitutes the revised selected papers of the 5th International Conference on Information Systems Security and Privacy, ICISSP 2019, held in Prague, Czech Republic, in February 2019. The 19 full papers presented were carefully reviewed and selected from a total of 100 submissions. The papers presented in this volume address various topical research, including new approaches for attack modelling andprevention, incident management and response, and user authentication andaccess control, as well as business and human-oriented aspects such as data pro-tection and privacy, and security awareness.

Critical Information Infrastructures Security
  • Language: en
  • Pages: 241

Critical Information Infrastructures Security

  • Type: Book
  • -
  • Published: 2019-01-03
  • -
  • Publisher: Springer

This book constitutes revised selected papers from the 13th International Conference on Critical Information Infrastructures Security, CRITIS 2018, held in Kaunas, Lithuania, in September 2018.The 16 full papers and 3 short papers presented were carefully reviewed and selected from 61 submissions. They are grouped in the following topical sections: advanced analysis of critical energy systems, strengthening urban resilience, securing internet of things and industrial control systems, need and tool sets for industrial control system security, and advancements in governance and resilience of critical infrastructures.

Tools for Design, Implementation and Verification of Emerging Information Technologies
  • Language: en
  • Pages: 169

Tools for Design, Implementation and Verification of Emerging Information Technologies

This book constitutes the refereed post-conference proceedings of the 17th EAI International Conference on Tools for Design, Implementation and Verification of Emerging Information Technologies, TridentCom 2022, which was held in Melbourne, Australia, in November 23-25,2022. The 11 full papers were selected from 30 submissions and deal the emerging technologies of big data, cyber-physical systems and computer communications. The papers are grouped in thematical sessions on network security; network communication; network services; mobile and ad hoc networks; blockchain; machine learning.

Environment and Social Concerns
  • Language: en
  • Pages: 188

Environment and Social Concerns

Papers presented at a conference on Environmental problems and initiatives, held at Indore.

Automatisierte, minimalinvasive Sicherheitsanalyse und Vorfallreaktion für industrielle Systeme
  • Language: de
  • Pages: 386

Automatisierte, minimalinvasive Sicherheitsanalyse und Vorfallreaktion für industrielle Systeme

Automatisierte Abwehr- und Präventionsmaßnahmen zum Schutz industrieller Systeme gefährden oft deren Echtzeitverarbeitung, Ausfallsicherheit und Redundanz. Daher müssen sie so wenig invasiv wie möglich durchgeführt werden. Dennoch sind gerade die minimalinvasive Sicherheitsanalyse und Vorfallreaktion noch wenig erforscht. In dieser Arbeit werden auf neuen semantischen- und SDN-basierten Ansätzen beruhende Lösungen für einige der wichtigsten Probleme in diesen Bereichen vorgestellt. - Automated defense and prevention measures designed to protect industrial automation and control systems often compromise their real-time processing, resilience and redundancy. Therefore, they need to be performed as non-invasively as possible. Nevertheless, particularly minimally invasive security analysis and incident response are still poorly researched. This work presents solutions based on new semantic- and SDN-based approaches to some of the most important problems in these areas.

Application of diffractive lens arrays in confocal microscopy
  • Language: en
  • Pages: 178

Application of diffractive lens arrays in confocal microscopy

Diffractive lens arrays are proposed in this work for application in reflected-light confocal microscopes. They have overcome the limitations between fields of view and resolution of traditional objectives. Experiments of multi-spot confocal imaging in surface metrology and fluorescence microscopy have been demonstrated based on the proposed concepts, which have shown capabilities of high-resolution measurement over a large area.