LEADER 03922namaa2200805uu 4500
001 doab76519
003 oapen
005 20220111
006 m o d
007 cr|mn|---annan
008 220111s2021 xx |||||o ||| 0|eng d
020 |a 9783036516233 
020 |a 9783036516240 
020 |a books978-3-0365-1624-0 
024 7 |a 10.3390/books978-3-0365-1624-0  |2 doi 
040 |a oapen  |c oapen 
041 0 |a eng 
042 |a dc 
072 7 |a TB  |2 bicssc 
720 1 |a Pricop, Emil  |4 edt 
720 1 |a Fattahi, Jaouhar  |4 edt 
720 1 |a Fattahi, Jaouhar  |4 oth 
720 1 |a Pricop, Emil  |4 oth 
720 1 |a Stamatescu, Grigore  |4 edt 
720 1 |a Stamatescu, Grigore  |4 oth 
245 0 0 |a Advanced Topics in Systems Safety and Security 
260 |a Basel, Switzerland  |b MDPI - Multidisciplinary Digital Publishing Institute  |c 2021 
300 |a 1 online resource (130 p.) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
506 0 |a Open Access  |f Unrestricted online access  |2 star 
520 |a This book presents valuable research results in the challenging field of systems (cyber)security. It is a reprint of the Information (MDPI, Basel) - Special Issue (SI) on Advanced Topics in Systems Safety and Security. The competitive review process of MDPI journals guarantees the quality of the presented concepts and results. The SI comprises high-quality papers focused on cutting-edge research topics in cybersecurity of computer networks and industrial control systems. The contributions presented in this book are mainly the extended versions of selected papers presented at the 7th and the 8th editions of the International Workshop on Systems Safety and Security-IWSSS. These two editions took place in Romania in 2019 and respectively in 2020. In addition to the selected papers from IWSSS, the special issue includes other valuable and relevant contributions. The papers included in this reprint discuss various subjects ranging from cyberattack or criminal activities detection, evaluation of the attacker skills, modeling of the cyber-attacks, and mobile application security evaluation. Given this diversity of topics and the scientific level of papers, we consider this book a valuable reference for researchers in the security and safety of systems. 
540 |a Creative Commons  |f https://creativecommons.org/licenses/by/4.0/  |2 cc  |u https://creativecommons.org/licenses/by/4.0/ 
546 |a English 
650 7 |a Technology: general issues  |2 bicssc 
653 |a alert correlation 
653 |a Android applications 
653 |a attack evaluation 
653 |a attack forecasting 
653 |a attack prediction 
653 |a attack projection 
653 |a attack quantification 
653 |a attack tree 
653 |a attacker 
653 |a attacker behaviour 
653 |a attacker profile 
653 |a attacker skill level 
653 |a attributes 
653 |a Bayesian network 
653 |a Command and Control Citizen Security Center 
653 |a Command and Control Information System (C2IS) 
653 |a common vulnerability scoring system 
653 |a comparative review 
653 |a crime detection 
653 |a cyber attack 
653 |a distribution automation system 
653 |a early-stage detection 
653 |a features 
653 |a homeland security 
653 |a industrial control safety 
653 |a intelligent data analysis 
653 |a metrics 
653 |a multi-threading 
653 |a operational semantics 
653 |a reverse engineering 
653 |a Smali+ 
793 0 |a DOAB Library. 
856 4 0 |u https://directory.doabooks.org/handle/20.500.12854/76519  |7 0  |z Open Access: DOAB: description of the publication 
856 4 0 |u https://mdpi.com/books/pdfview/book/3965  |7 0  |z Open Access: DOAB, download the publication