Show simple item record

dc.contributor.editorPricop, Emil
dc.contributor.editorStamatescu, Grigore
dc.contributor.editorFattahi, Jaouhar
dc.date.accessioned2022-01-11T13:34:23Z
dc.date.available2022-01-11T13:34:23Z
dc.date.issued2021
dc.identifierONIX_20220111_9783036516233_255
dc.identifier.urihttps://directory.doabooks.org/handle/20.500.12854/76519
dc.description.abstractThis book presents valuable research results in the challenging field of systems (cyber)security. It is a reprint of the Information (MDPI, Basel) - Special Issue (SI) on Advanced Topics in Systems Safety and Security. The competitive review process of MDPI journals guarantees the quality of the presented concepts and results. The SI comprises high-quality papers focused on cutting-edge research topics in cybersecurity of computer networks and industrial control systems. The contributions presented in this book are mainly the extended versions of selected papers presented at the 7th and the 8th editions of the International Workshop on Systems Safety and Security—IWSSS. These two editions took place in Romania in 2019 and respectively in 2020. In addition to the selected papers from IWSSS, the special issue includes other valuable and relevant contributions. The papers included in this reprint discuss various subjects ranging from cyberattack or criminal activities detection, evaluation of the attacker skills, modeling of the cyber-attacks, and mobile application security evaluation. Given this diversity of topics and the scientific level of papers, we consider this book a valuable reference for researchers in the security and safety of systems.
dc.languageEnglish
dc.subject.classificationbic Book Industry Communication::T Technology, engineering, agriculture::TB Technology: general issues
dc.subject.otherindustrial control safety
dc.subject.otherattack quantification
dc.subject.othercommon vulnerability scoring system
dc.subject.otherattack tree
dc.subject.otherdistribution automation system
dc.subject.otherCommand and Control Citizen Security Center
dc.subject.otherCommand and Control Information System (C2IS)
dc.subject.othercrime detection
dc.subject.otherhomeland security
dc.subject.otherAndroid applications
dc.subject.othermulti-threading
dc.subject.otheroperational semantics
dc.subject.otherreverse engineering
dc.subject.otherSmali+
dc.subject.othercyber attack
dc.subject.otherattacker
dc.subject.otherattacker profile
dc.subject.otherattacker behaviour
dc.subject.othermetrics
dc.subject.otherfeatures
dc.subject.otherattributes
dc.subject.otherintelligent data analysis
dc.subject.otherattack forecasting
dc.subject.othercomparative review
dc.subject.otheralert correlation
dc.subject.otherattack evaluation
dc.subject.otherattacker skill level
dc.subject.otherattack prediction
dc.subject.otherattack projection
dc.subject.otherearly-stage detection
dc.subject.otherBayesian network
dc.titleAdvanced Topics in Systems Safety and Security
dc.typebook
oapen.identifier.doi10.3390/books978-3-0365-1624-0
oapen.relation.isPublishedBy46cabcaa-dd94-4bfe-87b4-55023c1b36d0
oapen.relation.isbn9783036516233
oapen.relation.isbn9783036516240
oapen.pages130
oapen.place.publicationBasel, Switzerland


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record

https://creativecommons.org/licenses/by/4.0/
Except where otherwise noted, this item's license is described as https://creativecommons.org/licenses/by/4.0/