Cybersecurity issues in emerging technologies:
Gespeichert in:
Weitere Verfasser: | , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Boca Raton ; London ; New York
CRC Press, Taylor & Francis Group
2022
|
Ausgabe: | First edition |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | xxii, 204 Seiten Illustrationen, Diagramme |
ISBN: | 9780367626174 9781032110363 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV047652412 | ||
003 | DE-604 | ||
005 | 20220211 | ||
007 | t| | ||
008 | 211222s2022 xxua||| |||| 00||| eng d | ||
020 | |a 9780367626174 |c hbk |9 978-0-367-62617-4 | ||
020 | |a 9781032110363 |c pbk |9 978-1-03-211036-3 | ||
035 | |a (OCoLC)1296312963 | ||
035 | |a (DE-599)BVBBV047652412 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
044 | |a xxu |c XD-US | ||
049 | |a DE-355 |a DE-739 | ||
050 | 0 | |a QA76.9.A25 | |
082 | 0 | |a 005.8 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
245 | 1 | 0 | |a Cybersecurity issues in emerging technologies |c edited by Leandros Maglaras and Ioanna Kantzavelou |
250 | |a First edition | ||
264 | 1 | |a Boca Raton ; London ; New York |b CRC Press, Taylor & Francis Group |c 2022 | |
300 | |a xxii, 204 Seiten |b Illustrationen, Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
650 | 0 | 7 | |a Künstliche Intelligenz |0 (DE-588)4033447-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Blockchain |0 (DE-588)1124028595 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Maschinelles Lernen |0 (DE-588)4193754-5 |2 gnd |9 rswk-swf |
653 | 0 | |a Computer security | |
653 | 0 | |a Computer networks / Security measures | |
653 | 0 | |a Hacking / Prevention | |
653 | 0 | |a Internet of things / Security measures | |
655 | 7 | |0 (DE-588)4143413-4 |a Aufsatzsammlung |2 gnd-content | |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 1 | |a Blockchain |0 (DE-588)1124028595 |D s |
689 | 0 | 2 | |a Maschinelles Lernen |0 (DE-588)4193754-5 |D s |
689 | 0 | 3 | |a Künstliche Intelligenz |0 (DE-588)4033447-8 |D s |
689 | 0 | 4 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 0 | |C b |5 DE-604 | |
700 | 1 | |a Maglaras, Leandros |0 (DE-588)1250695023 |4 edt | |
700 | 1 | |a Kantzavelou, Ioanna |0 (DE-588)1250695384 |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-1-00-310995-2 |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |o DOI 10.1201/9781003109952 |
856 | 4 | 2 | |m Digitalisierung UB Regensburg - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=033036453&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-033036453 |
Datensatz im Suchindex
_version_ | 1821017907827572736 |
---|---|
adam_text |
Contents Foreword Preface Editors Contributors 1 The Evolution of Hardware-Assisted Security GEORGE CHR1STOU, GIORGOS VASIUADIS, ELIAS ATHANASOPOULOS, AND SOTIRIOSIOANNIDIS 1.1 1.2 Introduction 1 Threat Landscape 2 1.2.1 Common Software Vulnerabilities 2 1.2.2 Software Exploitation 2 1.3 Security Mechanisms in Hardware 4 1.3.1 Protection Rings 4 1.3.2 Supervisor Mode Execute!Access Prevention 4 1.3.3 Data Execution Prevention 4 1.3.4 Intel Memory Protection Extensions 5 1.3.5 Intel Memory Protection Keys 6 1.3.6 ARM Memory Tagging 7 1.3.7 Instruction Set Randomization 7 1.3.8 Control-Flow Integrity 8 1.3.8.1 Intel Control-flow Enforcement Technology 10 1.3.8.2 ARM Pointer Integrity 10 1.4 Trusted Execution Environments 10 1.4.1 Execute Only Memory 11 1.4.2 Aegis 11 1.4.3 ARMTrustZone 11 1.4.4 Intel Software Guard Extensions 12 xiii xv xix xxi 1
vi Contents 1.5 Hardware Vulnerabilities 13 1.5.1 Transient Instruction Execution 13 1.5.2 Cache as a Side-Channel 14 1.5.3 Proposed Defenses 14 1.6 Conclusion 15 References 16 2 Cybersecurity of the Unmanned Ship SOKRATIS KATSIKAS AND GEORGIOS KAVALL1ERATOS 2.1 2.2 Introduction 21 Architectural Views 24 2.2.1 TheExtended Maritime Architecture Framework 24 2.2.2 The CPSs of the Unmanned Ship 26 2.3 Cyber Risks of the Unmanned Ship 28 2.4 Cybersecurity Requirements for the Unmanned Ship 32 2.5 Treating the Cyber Risk of the Unmanned Ship 36 2.6 Conclusions 39 References 39 3 Agile Incident Response in Industrial Control Environments HELGE JANICKE, RICHARD SMITH, LEANDROS MAGLARAS, ALLAN COOK, YING HE, AND FENIA FERRA 3.1 3.2 3.3 3.4 3.5 Introduction 43 Complying with Legal Requirements and Guidance for Operators 44 Current Issues in Managing Incidents in Industrial Control Environments 45 Agile Approach to Incident Management 46 Assessment Event 49 3.5.1 The Scenario 49 3.5.2 Blue Team Composition 49 3.5.3 Agile Methodologies 51 3.5.3.1 Sprints 51 3.5.3.2 Sprint Planning 51 3.5.3.3 Sprint Retrospectives 51 3.5.3.4 Scrum Meetings 51 3.5.4 Task Allocation 52 3.5.4.1 Self-Selection of Tasks 52 3.5.4.2 T-Shaped Team 52
Contents vii 3.5.5 Agile Tools 53 3.5.5.1 Incident Backlog 53 3.5.5.2 Scrum Board 54 3.5.5.3 Learning Matrix 55 3.5.6 Event Questionnaires 55 3.6 Discussion and Conclusions 55 3.7 Glossary 56 References 56 4 Multi-Stage Threat Modeling and Security Monitoring in 5GCN 59 ROBERT PELL, SOURIS MOSCHOYIANNIS, AND EMMANOUIL PANAOUSIS 4.1 4.2 Introduction 59 Related Work 61 4.2.1 5GCN Threats 62 4.2.2 Multi-Stage Attack Modeling 62 4.3 Threat Modeling of the 5GCN 63 4.3.1 Identification 64 4.3.2 Threat Decomposition 65 4.3.3 Modeling 5GCN Threats as Graphs 66 4.3.4 A 5GCN Threat Graph Example 66 4.4 Graph-Based Security Monitoring for the 5GCN Infrastructure 68 4.5 Open Research Challenges and Future Work 71 4.5.1 Detection of Multi-Stage Attack Scenarios 72 4.5.2 A Centralized Threat Detection Engine 73 4.5.3 A 5G Network TTP Matrix 73 Note 74 References 74 5 Blockchain Technology for 6G Communication Networks: A Vision for the Future OTHMANE FRIHA AND MOHAMED AMINE FERRAG 5.1 5.2 Introduction 77 5.1.1 Blockchain Overview 78 5.1.1.1 Blockchain Technology Architecture 78 Blockchain and Cryptography 80 5.2.1 Confidentiality 80 5.2.2 Integrity 81 5.2.3 Availability 83 5.2.4 Privacy 83 77
viii Contents 5.3 Consensus Mechanism 83 5.3.1 The Consensus Problem 84 5.3.1.1 Ledger Consensus 84 5.3.2 Blockchain Consensus Algorithms 84 5.3.2.1 Proof-Based Algorithms 85 5.3.2.2 Voting-based Algorithms 86 5.4 Blockchain for 6G Networks 87 5.4.1 Challenges in 6G 87 5.4.2 Blockchain-Based Solutions 88 5.4.2.1 Infrastructure Solutions 88 5.4.2.2 Emerging Applications 89 5.5 Discussion 91 5.5.1 Open Research Issues 91 5.6 Conclusion 92 References 93 6 Securing Components on a 5G Core 97 JORGE PROENÇA, VASCO PEREIRA, DANIEL FERNANDES, MARCO SEQUEIRA, PEDRO QUITÉRIO, ANDRÉ GOMES, PAULO SIMÕES, TIAGO CRUZ, AND LUÍS CORDEIRO 6.1 6.2 6.3 6.4 6.5 Introduction 97 6.1.1 Security across Previous Generations 97 6.1.2 Structure of the M5G Project 98 6.1.3 The Need to Secure the 5G Core 98 6.1.4 Proposal 98 6.1.5 Chapter Structure 99 Security in 5G 99 6.2.1 Security Architecture of 5G Networks 99 6.2.2 Current Research 100 Related Work 101 Architecture and Components 102 6.4.1 Event Processing and Visualization Platform 102 6.4.2 AppIDPS 103 6.4.2.1 Internal View 103 6Л.2.2 Metrics and Policy Messages 105 6.4.3 NEF 105 First Results 105 6.5.1 Event Processing and Visualization Platform Tests 105 6.5.2 Network Exposure Function Tests 107 6.5.3 Integration Scenario 109 6.5.3.1 Testbed Description 110 6.5.3.2 Dashboard 110
Contents ix 6.6Conclusion 110 Acknowledgments 112 Notes 112 References 112 7 RF Jamming Attacks and Countermeasures in Wireless Vehicular Networks 115 DIMITRIOS KOSMANOS AND ANTONIOS ARGYRIOU 7.1 Introduction 115 7.1.1 Motivation 116 7.2 RF Jamming Attacks in Vehicular Networks 117 7.3 RF Jamming Classification Using Relative Speed Estimation 118 7.3.1 System Model 119 7.3.2 Jamming Attack Scenarios 120 7.3.3 Estimation of Relative Speed Metric 122 7.3.4 The variations of relative speed (V RS) Algorithm 122 7.3.5 Proposed IDS Based on Supervised Learning 123 7.4 Enhancing the Proposed IDS with Data Fusion Techniques 123 7.5 Simulation and Performance Evaluation 125 7.5.1 Detection Performance under Different Au Values 125 7.5.2 Evaluation under Different Interference Levels 128 7.5.3 Data Fusion Results 131 7.6 Discussion and Conclusions 131 7.7 Glossary 133 References 133 8 Smart Cars and Over-the-Air Updates 137 PANAGIOTIS EFSTATHIADIS, ANNA KARANIKA, NESTORAS CHOULIARAS, LEANDROS MAGLARAS, AND IOANNA KANTZAVELOU 8.1 8.2 8.3 8.4 Introduction 137 Benefits 138 Threats and Vulnerabilities 139 8.3.1 Smart Car Components 140 8.3.2 The Attacker’s Targets 140 8.3.3 Over-the-Air Updates and Security Issues 141 8.3.3.1 Classification of OTA Update Attacks 142 8.3.3.2 Attacks on OTA Updates 142 Existing Solutions 144 8.4.1 Considerations 145 8.4.2 External Protection 145
x Contents 8.4.3 Internal Protection 146 8.4.4 Update-Specific Protection 147 8.5 Discussion 147 8.6 Conclusions 149 8.7 Glossary 149 References 149 9 Emerging Malware Threats: The Case of Ransomware 153 AIKATERINI VARDALAKI AND VASILEIOS VLACHOS 9.1 Evolution of Ransomware 153 9.2 Emerging Threats 154 9.3 Financial Impact 157 9.4 Ransomware and Social Engineering 160 9.5 Legislation Challenges 163 9.6 Concluding Remarks 165 References 167 10 Holistic Immunization: A Comprehensive Model to Tackle Hybrid Threats in the Cyber Domain 171 ATHANASIOS KOSMOPOULOS 10.1 Introduction: Background and Driving Forces 171 10.2 Problem Definition - The Cyber Crisis Management 171 10.3 Proposed Model 179 10.4 Concluding Remarks 180 10.5 Glossary 182 References 182 11 The Cyber Skills Gap ISMINI VASILEIOU 11.1 Introduction 185 11.2 The Skills Gap in the Landscape of Industry 4.0 186 11.2.1 The Skills Gap 186 11.2.2 Tier 1: Employers 187 11.2.3 Tier 2: Academia 187 11.2.4 Tier 3: Government 189 11.3 Defining an Agenda for Cybersecurity Skills 189 11.3.1 Evolution of the Cyber Discipline 189 185
Contents xi 11.4 A Framework to Address the Skills Gap in Cyber 191 11.5 Recommendations 192 11.6 Conclusion 192 References 195 Index 199 |
adam_txt |
Contents Foreword Preface Editors Contributors 1 The Evolution of Hardware-Assisted Security GEORGE CHR1STOU, GIORGOS VASIUADIS, ELIAS ATHANASOPOULOS, AND SOTIRIOSIOANNIDIS 1.1 1.2 Introduction 1 Threat Landscape 2 1.2.1 Common Software Vulnerabilities 2 1.2.2 Software Exploitation 2 1.3 Security Mechanisms in Hardware 4 1.3.1 Protection Rings 4 1.3.2 Supervisor Mode Execute!Access Prevention 4 1.3.3 Data Execution Prevention 4 1.3.4 Intel Memory Protection Extensions 5 1.3.5 Intel Memory Protection Keys 6 1.3.6 ARM Memory Tagging 7 1.3.7 Instruction Set Randomization 7 1.3.8 Control-Flow Integrity 8 1.3.8.1 Intel Control-flow Enforcement Technology 10 1.3.8.2 ARM Pointer Integrity 10 1.4 Trusted Execution Environments 10 1.4.1 Execute Only Memory 11 1.4.2 Aegis 11 1.4.3 ARMTrustZone 11 1.4.4 Intel Software Guard Extensions 12 xiii xv xix xxi 1
vi Contents 1.5 Hardware Vulnerabilities 13 1.5.1 Transient Instruction Execution 13 1.5.2 Cache as a Side-Channel 14 1.5.3 Proposed Defenses 14 1.6 Conclusion 15 References 16 2 Cybersecurity of the Unmanned Ship SOKRATIS KATSIKAS AND GEORGIOS KAVALL1ERATOS 2.1 2.2 Introduction 21 Architectural Views 24 2.2.1 TheExtended Maritime Architecture Framework 24 2.2.2 The CPSs of the Unmanned Ship 26 2.3 Cyber Risks of the Unmanned Ship 28 2.4 Cybersecurity Requirements for the Unmanned Ship 32 2.5 Treating the Cyber Risk of the Unmanned Ship 36 2.6 Conclusions 39 References 39 3 Agile Incident Response in Industrial Control Environments HELGE JANICKE, RICHARD SMITH, LEANDROS MAGLARAS, ALLAN COOK, YING HE, AND FENIA FERRA 3.1 3.2 3.3 3.4 3.5 Introduction 43 Complying with Legal Requirements and Guidance for Operators 44 Current Issues in Managing Incidents in Industrial Control Environments 45 Agile Approach to Incident Management 46 Assessment Event 49 3.5.1 The Scenario 49 3.5.2 Blue Team Composition 49 3.5.3 Agile Methodologies 51 3.5.3.1 Sprints 51 3.5.3.2 Sprint Planning 51 3.5.3.3 Sprint Retrospectives 51 3.5.3.4 Scrum Meetings 51 3.5.4 Task Allocation 52 3.5.4.1 Self-Selection of Tasks 52 3.5.4.2 T-Shaped Team 52
Contents vii 3.5.5 Agile Tools 53 3.5.5.1 Incident Backlog 53 3.5.5.2 Scrum Board 54 3.5.5.3 Learning Matrix 55 3.5.6 Event Questionnaires 55 3.6 Discussion and Conclusions 55 3.7 Glossary 56 References 56 4 Multi-Stage Threat Modeling and Security Monitoring in 5GCN 59 ROBERT PELL, SOURIS MOSCHOYIANNIS, AND EMMANOUIL PANAOUSIS 4.1 4.2 Introduction 59 Related Work 61 4.2.1 5GCN Threats 62 4.2.2 Multi-Stage Attack Modeling 62 4.3 Threat Modeling of the 5GCN 63 4.3.1 Identification 64 4.3.2 Threat Decomposition 65 4.3.3 Modeling 5GCN Threats as Graphs 66 4.3.4 A 5GCN Threat Graph Example 66 4.4 Graph-Based Security Monitoring for the 5GCN Infrastructure 68 4.5 Open Research Challenges and Future Work 71 4.5.1 Detection of Multi-Stage Attack Scenarios 72 4.5.2 A Centralized Threat Detection Engine 73 4.5.3 A 5G Network TTP Matrix 73 Note 74 References 74 5 Blockchain Technology for 6G Communication Networks: A Vision for the Future OTHMANE FRIHA AND MOHAMED AMINE FERRAG 5.1 5.2 Introduction 77 5.1.1 Blockchain Overview 78 5.1.1.1 Blockchain Technology Architecture 78 Blockchain and Cryptography 80 5.2.1 Confidentiality 80 5.2.2 Integrity 81 5.2.3 Availability 83 5.2.4 Privacy 83 77
viii Contents 5.3 Consensus Mechanism 83 5.3.1 The Consensus Problem 84 5.3.1.1 Ledger Consensus 84 5.3.2 Blockchain Consensus Algorithms 84 5.3.2.1 Proof-Based Algorithms 85 5.3.2.2 Voting-based Algorithms 86 5.4 Blockchain for 6G Networks 87 5.4.1 Challenges in 6G 87 5.4.2 Blockchain-Based Solutions 88 5.4.2.1 Infrastructure Solutions 88 5.4.2.2 Emerging Applications 89 5.5 Discussion 91 5.5.1 Open Research Issues 91 5.6 Conclusion 92 References 93 6 Securing Components on a 5G Core 97 JORGE PROENÇA, VASCO PEREIRA, DANIEL FERNANDES, MARCO SEQUEIRA, PEDRO QUITÉRIO, ANDRÉ GOMES, PAULO SIMÕES, TIAGO CRUZ, AND LUÍS CORDEIRO 6.1 6.2 6.3 6.4 6.5 Introduction 97 6.1.1 Security across Previous Generations 97 6.1.2 Structure of the M5G Project 98 6.1.3 The Need to Secure the 5G Core 98 6.1.4 Proposal 98 6.1.5 Chapter Structure 99 Security in 5G 99 6.2.1 Security Architecture of 5G Networks 99 6.2.2 Current Research 100 Related Work 101 Architecture and Components 102 6.4.1 Event Processing and Visualization Platform 102 6.4.2 AppIDPS 103 6.4.2.1 Internal View 103 6Л.2.2 Metrics and Policy Messages 105 6.4.3 NEF 105 First Results 105 6.5.1 Event Processing and Visualization Platform Tests 105 6.5.2 Network Exposure Function Tests 107 6.5.3 Integration Scenario 109 6.5.3.1 Testbed Description 110 6.5.3.2 Dashboard 110
Contents ix 6.6Conclusion 110 Acknowledgments 112 Notes 112 References 112 7 RF Jamming Attacks and Countermeasures in Wireless Vehicular Networks 115 DIMITRIOS KOSMANOS AND ANTONIOS ARGYRIOU 7.1 Introduction 115 7.1.1 Motivation 116 7.2 RF Jamming Attacks in Vehicular Networks 117 7.3 RF Jamming Classification Using Relative Speed Estimation 118 7.3.1 System Model 119 7.3.2 Jamming Attack Scenarios 120 7.3.3 Estimation of Relative Speed Metric 122 7.3.4 The variations of relative speed (V RS) Algorithm 122 7.3.5 Proposed IDS Based on Supervised Learning 123 7.4 Enhancing the Proposed IDS with Data Fusion Techniques 123 7.5 Simulation and Performance Evaluation 125 7.5.1 Detection Performance under Different Au Values 125 7.5.2 Evaluation under Different Interference Levels 128 7.5.3 Data Fusion Results 131 7.6 Discussion and Conclusions 131 7.7 Glossary 133 References 133 8 Smart Cars and Over-the-Air Updates 137 PANAGIOTIS EFSTATHIADIS, ANNA KARANIKA, NESTORAS CHOULIARAS, LEANDROS MAGLARAS, AND IOANNA KANTZAVELOU 8.1 8.2 8.3 8.4 Introduction 137 Benefits 138 Threats and Vulnerabilities 139 8.3.1 Smart Car Components 140 8.3.2 The Attacker’s Targets 140 8.3.3 Over-the-Air Updates and Security Issues 141 8.3.3.1 Classification of OTA Update Attacks 142 8.3.3.2 Attacks on OTA Updates 142 Existing Solutions 144 8.4.1 Considerations 145 8.4.2 External Protection 145
x Contents 8.4.3 Internal Protection 146 8.4.4 Update-Specific Protection 147 8.5 Discussion 147 8.6 Conclusions 149 8.7 Glossary 149 References 149 9 Emerging Malware Threats: The Case of Ransomware 153 AIKATERINI VARDALAKI AND VASILEIOS VLACHOS 9.1 Evolution of Ransomware 153 9.2 Emerging Threats 154 9.3 Financial Impact 157 9.4 Ransomware and Social Engineering 160 9.5 Legislation Challenges 163 9.6 Concluding Remarks 165 References 167 10 Holistic Immunization: A Comprehensive Model to Tackle Hybrid Threats in the Cyber Domain 171 ATHANASIOS KOSMOPOULOS 10.1 Introduction: Background and Driving Forces 171 10.2 Problem Definition - The Cyber Crisis Management 171 10.3 Proposed Model 179 10.4 Concluding Remarks 180 10.5 Glossary 182 References 182 11 The Cyber Skills Gap ISMINI VASILEIOU 11.1 Introduction 185 11.2 The Skills Gap in the Landscape of Industry 4.0 186 11.2.1 The Skills Gap 186 11.2.2 Tier 1: Employers 187 11.2.3 Tier 2: Academia 187 11.2.4 Tier 3: Government 189 11.3 Defining an Agenda for Cybersecurity Skills 189 11.3.1 Evolution of the Cyber Discipline 189 185
Contents xi 11.4 A Framework to Address the Skills Gap in Cyber 191 11.5 Recommendations 192 11.6 Conclusion 192 References 195 Index 199 |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author2 | Maglaras, Leandros Kantzavelou, Ioanna |
author2_role | edt edt |
author2_variant | l m lm i k ik |
author_GND | (DE-588)1250695023 (DE-588)1250695384 |
author_facet | Maglaras, Leandros Kantzavelou, Ioanna |
building | Verbundindex |
bvnumber | BV047652412 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
classification_rvk | ST 276 |
ctrlnum | (OCoLC)1296312963 (DE-599)BVBBV047652412 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
edition | First edition |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 c 4500</leader><controlfield tag="001">BV047652412</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20220211</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">211222s2022 xxua||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780367626174</subfield><subfield code="c">hbk</subfield><subfield code="9">978-0-367-62617-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781032110363</subfield><subfield code="c">pbk</subfield><subfield code="9">978-1-03-211036-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1296312963</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047652412</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">XD-US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield><subfield code="a">DE-739</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cybersecurity issues in emerging technologies</subfield><subfield code="c">edited by Leandros Maglaras and Ioanna Kantzavelou</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">First edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton ; London ; New York</subfield><subfield code="b">CRC Press, Taylor & Francis Group</subfield><subfield code="c">2022</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xxii, 204 Seiten</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Künstliche Intelligenz</subfield><subfield code="0">(DE-588)4033447-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Blockchain</subfield><subfield code="0">(DE-588)1124028595</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Maschinelles Lernen</subfield><subfield code="0">(DE-588)4193754-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Hacking / Prevention</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Internet of things / Security measures</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Blockchain</subfield><subfield code="0">(DE-588)1124028595</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Maschinelles Lernen</subfield><subfield code="0">(DE-588)4193754-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Künstliche Intelligenz</subfield><subfield code="0">(DE-588)4033447-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="C">b</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Maglaras, Leandros</subfield><subfield code="0">(DE-588)1250695023</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kantzavelou, Ioanna</subfield><subfield code="0">(DE-588)1250695384</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-1-00-310995-2</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="o">DOI 10.1201/9781003109952</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Regensburg - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=033036453&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-033036453</subfield></datafield></record></collection> |
genre | (DE-588)4143413-4 Aufsatzsammlung gnd-content |
genre_facet | Aufsatzsammlung |
id | DE-604.BV047652412 |
illustrated | Illustrated |
index_date | 2024-07-03T18:50:12Z |
indexdate | 2025-01-12T05:00:08Z |
institution | BVB |
isbn | 9780367626174 9781032110363 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-033036453 |
oclc_num | 1296312963 |
open_access_boolean | |
owner | DE-355 DE-BY-UBR DE-739 |
owner_facet | DE-355 DE-BY-UBR DE-739 |
physical | xxii, 204 Seiten Illustrationen, Diagramme |
publishDate | 2022 |
publishDateSearch | 2022 |
publishDateSort | 2022 |
publisher | CRC Press, Taylor & Francis Group |
record_format | marc |
spelling | Cybersecurity issues in emerging technologies edited by Leandros Maglaras and Ioanna Kantzavelou First edition Boca Raton ; London ; New York CRC Press, Taylor & Francis Group 2022 xxii, 204 Seiten Illustrationen, Diagramme txt rdacontent n rdamedia nc rdacarrier Includes bibliographical references and index Künstliche Intelligenz (DE-588)4033447-8 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf Blockchain (DE-588)1124028595 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Maschinelles Lernen (DE-588)4193754-5 gnd rswk-swf Computer security Computer networks / Security measures Hacking / Prevention Internet of things / Security measures (DE-588)4143413-4 Aufsatzsammlung gnd-content Computersicherheit (DE-588)4274324-2 s Blockchain (DE-588)1124028595 s Maschinelles Lernen (DE-588)4193754-5 s Künstliche Intelligenz (DE-588)4033447-8 s Rechnernetz (DE-588)4070085-9 s b DE-604 Maglaras, Leandros (DE-588)1250695023 edt Kantzavelou, Ioanna (DE-588)1250695384 edt Erscheint auch als Online-Ausgabe 978-1-00-310995-2 Erscheint auch als Online-Ausgabe DOI 10.1201/9781003109952 Digitalisierung UB Regensburg - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=033036453&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Cybersecurity issues in emerging technologies Künstliche Intelligenz (DE-588)4033447-8 gnd Rechnernetz (DE-588)4070085-9 gnd Blockchain (DE-588)1124028595 gnd Computersicherheit (DE-588)4274324-2 gnd Maschinelles Lernen (DE-588)4193754-5 gnd |
subject_GND | (DE-588)4033447-8 (DE-588)4070085-9 (DE-588)1124028595 (DE-588)4274324-2 (DE-588)4193754-5 (DE-588)4143413-4 |
title | Cybersecurity issues in emerging technologies |
title_auth | Cybersecurity issues in emerging technologies |
title_exact_search | Cybersecurity issues in emerging technologies |
title_exact_search_txtP | Cybersecurity issues in emerging technologies |
title_full | Cybersecurity issues in emerging technologies edited by Leandros Maglaras and Ioanna Kantzavelou |
title_fullStr | Cybersecurity issues in emerging technologies edited by Leandros Maglaras and Ioanna Kantzavelou |
title_full_unstemmed | Cybersecurity issues in emerging technologies edited by Leandros Maglaras and Ioanna Kantzavelou |
title_short | Cybersecurity issues in emerging technologies |
title_sort | cybersecurity issues in emerging technologies |
topic | Künstliche Intelligenz (DE-588)4033447-8 gnd Rechnernetz (DE-588)4070085-9 gnd Blockchain (DE-588)1124028595 gnd Computersicherheit (DE-588)4274324-2 gnd Maschinelles Lernen (DE-588)4193754-5 gnd |
topic_facet | Künstliche Intelligenz Rechnernetz Blockchain Computersicherheit Maschinelles Lernen Aufsatzsammlung |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=033036453&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT maglarasleandros cybersecurityissuesinemergingtechnologies AT kantzavelouioanna cybersecurityissuesinemergingtechnologies |