


default search action
Search dblp for Publications
export results for "toc:db/series/lncs/lncs13300.bht:"
@incollection{DBLP:series/lncs/CarregaGSPLCR22, author = {Alessandro Carrega and Giovanni Grieco and Domenico Striccoli and Manos Papoutsakis and Tomas Lima and Jos{\'{e}} Ignacio Carretero and Matteo Repetto}, editor = {Joanna Kolodziej and Matteo Repetto and Armend Duzha}, title = {A Reference Architecture for Management of Security Operations in Digital Service Chains}, booktitle = {Cybersecurity of Digital Service Chains - Challenges, Methodologies, and Tools}, series = {Lecture Notes in Computer Science}, volume = {13300}, pages = {1--31}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-04036-8\_1}, doi = {10.1007/978-3-031-04036-8\_1}, timestamp = {Sat, 30 Sep 2023 10:30:32 +0200}, biburl = {https://dblp.org/rec/series/lncs/CarregaGSPLCR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lncs/KolodziejHCGW22, author = {Joanna Kolodziej and Cornelio Hopmann and Giovanni Coppa and Daniel Grzonka and Adrian Widlak}, editor = {Joanna Kolodziej and Matteo Repetto and Armend Duzha}, title = {Intelligent Transportation Systems - Models, Challenges, Security Aspects}, booktitle = {Cybersecurity of Digital Service Chains - Challenges, Methodologies, and Tools}, series = {Lecture Notes in Computer Science}, volume = {13300}, pages = {56--82}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-04036-8\_3}, doi = {10.1007/978-3-031-04036-8\_3}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lncs/KolodziejHCGW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lncs/KozhuharovaKA22, author = {Denitsa Kozhuharova and Atanas Kirov and Zhanin Al{-}Shargabi}, editor = {Joanna Kolodziej and Matteo Repetto and Armend Duzha}, title = {Ethics in Cybersecurity. What Are the Challenges We Need to Be Aware of and How to Handle Them?}, booktitle = {Cybersecurity of Digital Service Chains - Challenges, Methodologies, and Tools}, series = {Lecture Notes in Computer Science}, volume = {13300}, pages = {202--221}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-04036-8\_9}, doi = {10.1007/978-3-031-04036-8\_9}, timestamp = {Thu, 12 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lncs/KozhuharovaKA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lncs/KrzysztonLM22, author = {Mateusz Krzyszton and Marcin Lew and Michal Marks}, editor = {Joanna Kolodziej and Matteo Repetto and Armend Duzha}, title = {{NAD:} Machine Learning Based Component for Unknown Attack Detection in Network Traffic}, booktitle = {Cybersecurity of Digital Service Chains - Challenges, Methodologies, and Tools}, series = {Lecture Notes in Computer Science}, volume = {13300}, pages = {83--102}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-04036-8\_4}, doi = {10.1007/978-3-031-04036-8\_4}, timestamp = {Wed, 18 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lncs/KrzysztonLM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lncs/RepettoC22, author = {Matteo Repetto and Alessandro Carrega}, editor = {Joanna Kolodziej and Matteo Repetto and Armend Duzha}, title = {Monitoring Network Flows in Containerized Environments}, booktitle = {Cybersecurity of Digital Service Chains - Challenges, Methodologies, and Tools}, series = {Lecture Notes in Computer Science}, volume = {13300}, pages = {32--55}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-04036-8\_2}, doi = {10.1007/978-3-031-04036-8\_2}, timestamp = {Wed, 18 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lncs/RepettoC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lncs/SkopikWL22, author = {Florian Skopik and Markus Wurzenberger and Max Landauer}, editor = {Joanna Kolodziej and Matteo Repetto and Armend Duzha}, title = {Detecting Unknown Cyber Security Attacks Through System Behavior Analysis}, booktitle = {Cybersecurity of Digital Service Chains - Challenges, Methodologies, and Tools}, series = {Lecture Notes in Computer Science}, volume = {13300}, pages = {103--119}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-04036-8\_5}, doi = {10.1007/978-3-031-04036-8\_5}, timestamp = {Wed, 18 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lncs/SkopikWL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lncs/Szynkiewicz22, author = {Pawel Szynkiewicz}, editor = {Joanna Kolodziej and Matteo Repetto and Armend Duzha}, title = {Signature-Based Detection of Botnet DDoS Attacks}, booktitle = {Cybersecurity of Digital Service Chains - Challenges, Methodologies, and Tools}, series = {Lecture Notes in Computer Science}, volume = {13300}, pages = {120--135}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-04036-8\_6}, doi = {10.1007/978-3-031-04036-8\_6}, timestamp = {Wed, 18 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lncs/Szynkiewicz22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lncs/Tronnier0LR22, author = {Fr{\'{e}}d{\'{e}}ric Tronnier and Sebastian Pape and Sascha L{\"{o}}bner and Kai Rannenberg}, editor = {Joanna Kolodziej and Matteo Repetto and Armend Duzha}, title = {A Discussion on Ethical Cybersecurity Issues in Digital Service Chains}, booktitle = {Cybersecurity of Digital Service Chains - Challenges, Methodologies, and Tools}, series = {Lecture Notes in Computer Science}, volume = {13300}, pages = {222--256}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-04036-8\_10}, doi = {10.1007/978-3-031-04036-8\_10}, timestamp = {Thu, 02 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lncs/Tronnier0LR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lncs/WilczynskiK22, author = {Andrzej Wilczynski and Joanna Kolodziej}, editor = {Joanna Kolodziej and Matteo Repetto and Armend Duzha}, title = {Blockchain-Based Task and Information Management in Computational Cloud Systems}, booktitle = {Cybersecurity of Digital Service Chains - Challenges, Methodologies, and Tools}, series = {Lecture Notes in Computer Science}, volume = {13300}, pages = {162--201}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-04036-8\_8}, doi = {10.1007/978-3-031-04036-8\_8}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lncs/WilczynskiK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lncs/WurzenbergerLBS22, author = {Markus Wurzenberger and Max Landauer and Agron Bajraktari and Florian Skopik}, editor = {Joanna Kolodziej and Matteo Repetto and Armend Duzha}, title = {Automatic Attack Pattern Mining for Generating Actionable {CTI} Applying Alert Aggregation}, booktitle = {Cybersecurity of Digital Service Chains - Challenges, Methodologies, and Tools}, series = {Lecture Notes in Computer Science}, volume = {13300}, pages = {136--161}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-04036-8\_7}, doi = {10.1007/978-3-031-04036-8\_7}, timestamp = {Wed, 18 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lncs/WurzenbergerLBS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/lncs/13300, editor = {Joanna Kolodziej and Matteo Repetto and Armend Duzha}, title = {Cybersecurity of Digital Service Chains - Challenges, Methodologies, and Tools}, series = {Lecture Notes in Computer Science}, volume = {13300}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-04036-8}, doi = {10.1007/978-3-031-04036-8}, isbn = {978-3-031-04035-1}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lncs/13300.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.