Información del autor
Autor Petrocchi, Marinella |
Documentos disponibles escritos por este autor (2)
Crear una solicitud de compra Refinar búsqueda
TÃtulo : Security and Trust Management : 16th International Workshop, STM 2020, Guildford, UK, September 17–18, 2020, Proceedings / Tipo de documento: documento electrónico Autores: Markantonakis, Kostantinos, ; Petrocchi, Marinella, Mención de edición: 1 ed. Editorial: [s.l.] : Springer Fecha de publicación: 2020 Número de páginas: IX, 139 p. 80 ilustraciones, 13 ilustraciones en color. ISBN/ISSN/DL: 978-3-030-59817-4 Nota general: Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos. Idioma : Inglés (eng) Palabras clave: Protección de datos Software de la aplicacion Computadoras y civilización CriptografÃa Cifrado de datos (Informática) Red informática Red de computadoras Seguridad de datos e información Aplicaciones informáticas y de sistemas de información Computadoras y sociedad CriptologÃa Seguridad móvil y de red Redes de comunicación informática Clasificación: 005.8 Ciencia de los computadores (Programación, programas de sistemas) Resumen: Este libro constituye las actas del 16.º Taller Internacional sobre Seguridad y Gestión de Confianza, STM 2020, ubicado conjuntamente con el 25.º Simposio Europeo sobre Investigación en Seguridad Informática, ESORICS 2020. La conferencia estaba prevista para realizarse en Guildford, Reino Unido, pero no habÃa sido posible. se trasladará a un formato en lÃnea debido a la pandemia de COVID-19. El taller se llevó a cabo del 17 al 18 de septiembre de 2020. Los 8 artÃculos presentados en este volumen fueron cuidadosamente revisados ​​y seleccionados entre 20 presentaciones. Estaban organizados en secciones temáticas sobre propiedades de seguridad y ataques; esquema de confidencialidad y procesos de seguridad. . Nota de contenido: Security Properties and Attacks -- Modelling and Analysis of 802.11 4-Way Handshake Attacks and Security Properties -- Reducing the Forensic Footprint with Android Accessibility Attacks -- A Novel Machine Learning Methodology for Detecting /Phishing Attacks in Real Time -- Confidentiality Schema -- Revocable access to encrypted message boards -- Establishing Secure Communication Channels Using Remote Attestation With TPM 2.0 -- Security Processes -- Improved Feature Engineering for Free-Text Keystroke Dynamics -- Subversion-Resistant Commitment Schemes: Definitions and Constructions -- Challenges in IT Security Processes and Solution Approaches with Process Mining. Tipo de medio : Computadora Summary : This book constitutes the proceedings of the 16th International Workshop on Security and Trust Management, STM 2020, co-located with the 25th European Symposium on Research in Computer Security, ESORICS 2020. The conference was planned to take place in Guildford, UK, but had to be moved to an online format due to the COVID-19 pandemic. The workshop took place during September 17-18, 2020. The 8 papers presented in this volume were carefully reviewed and selected from 20 submissions. They were organized in topical sections on security properties and attacks; confidentiality schema and security processes. . Enlace de acceso : https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] Security and Trust Management : 16th International Workshop, STM 2020, Guildford, UK, September 17–18, 2020, Proceedings / [documento electrónico] / Markantonakis, Kostantinos, ; Petrocchi, Marinella, . - 1 ed. . - [s.l.] : Springer, 2020 . - IX, 139 p. 80 ilustraciones, 13 ilustraciones en color.
ISBN : 978-3-030-59817-4
Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos.
Idioma : Inglés (eng)
Palabras clave: Protección de datos Software de la aplicacion Computadoras y civilización CriptografÃa Cifrado de datos (Informática) Red informática Red de computadoras Seguridad de datos e información Aplicaciones informáticas y de sistemas de información Computadoras y sociedad CriptologÃa Seguridad móvil y de red Redes de comunicación informática Clasificación: 005.8 Ciencia de los computadores (Programación, programas de sistemas) Resumen: Este libro constituye las actas del 16.º Taller Internacional sobre Seguridad y Gestión de Confianza, STM 2020, ubicado conjuntamente con el 25.º Simposio Europeo sobre Investigación en Seguridad Informática, ESORICS 2020. La conferencia estaba prevista para realizarse en Guildford, Reino Unido, pero no habÃa sido posible. se trasladará a un formato en lÃnea debido a la pandemia de COVID-19. El taller se llevó a cabo del 17 al 18 de septiembre de 2020. Los 8 artÃculos presentados en este volumen fueron cuidadosamente revisados ​​y seleccionados entre 20 presentaciones. Estaban organizados en secciones temáticas sobre propiedades de seguridad y ataques; esquema de confidencialidad y procesos de seguridad. . Nota de contenido: Security Properties and Attacks -- Modelling and Analysis of 802.11 4-Way Handshake Attacks and Security Properties -- Reducing the Forensic Footprint with Android Accessibility Attacks -- A Novel Machine Learning Methodology for Detecting /Phishing Attacks in Real Time -- Confidentiality Schema -- Revocable access to encrypted message boards -- Establishing Secure Communication Channels Using Remote Attestation With TPM 2.0 -- Security Processes -- Improved Feature Engineering for Free-Text Keystroke Dynamics -- Subversion-Resistant Commitment Schemes: Definitions and Constructions -- Challenges in IT Security Processes and Solution Approaches with Process Mining. Tipo de medio : Computadora Summary : This book constitutes the proceedings of the 16th International Workshop on Security and Trust Management, STM 2020, co-located with the 25th European Symposium on Research in Computer Security, ESORICS 2020. The conference was planned to take place in Guildford, UK, but had to be moved to an online format due to the COVID-19 pandemic. The workshop took place during September 17-18, 2020. The 8 papers presented in this volume were carefully reviewed and selected from 20 submissions. They were organized in topical sections on security properties and attacks; confidentiality schema and security processes. . Enlace de acceso : https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] Service-Oriented Computing – ICSOC 2020 Workshops / Hacid, Hakim ; Outay, Fatma ; Paik, Hye-young ; Alloum, Amira ; Petrocchi, Marinella ; Bouadjenek, Mohamed Reda ; Beheshti, Amin ; Liu, Xumin ; Maaradji, Abderrahmane
TÃtulo : Service-Oriented Computing – ICSOC 2020 Workshops : AIOps, CFTIC, STRAPS, AI-PA, AI-IOTS, and Satellite Events, Dubai, United Arab Emirates, December 14–17, 2020, Proceedings / Tipo de documento: documento electrónico Autores: Hacid, Hakim, ; Outay, Fatma, ; Paik, Hye-young, ; Alloum, Amira, ; Petrocchi, Marinella, ; Bouadjenek, Mohamed Reda, ; Beheshti, Amin, ; Liu, Xumin, ; Maaradji, Abderrahmane, Mención de edición: 1 ed. Editorial: [s.l.] : Springer Fecha de publicación: 2021 Número de páginas: XIII, 652 p. 216 ilustraciones, 158 ilustraciones en color. ISBN/ISSN/DL: 978-3-030-76352-7 Nota general: Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos. Idioma : Inglés (eng) Palabras clave: Software de la aplicacion IngenierÃa Informática Red de computadoras TeorÃa de la codificación TeorÃa de la información Protección de datos IngenierÃa de software Aprendizaje automático Aplicaciones informáticas y de sistemas de información IngenierÃa Informática y Redes TeorÃa de la codificación y la información Seguridad de datos e información Clasificación: 005.3 Ciencia de los computadores (Programas) Resumen: Este libro constituye artÃculos revisados ​​y seleccionados de los eventos de satélites cientÃficos celebrados junto con la 18.ª Conferencia Internacional sobre Computación Orientada a Servicios, ICSOC 2020. La conferencia se celebró virtualmente del 14 al 17 de diciembre de 2020. Se recibió un total de 125 presentaciones para el Eventos satelitales. El volumen incluye 9 artÃculos del PhD Symposium Track, 4 artÃculos del Demonstration Track y 45 artÃculos de los siguientes talleres: Taller internacional sobre inteligencia artificial para operaciones de TI (AIOps) Taller internacional sobre ciberforense y desafÃos de investigación de amenazas en infraestructuras emergentes ( CFTIC 2020) 2do Taller sobre Integración y Procesamiento Inteligente de Datos (STRAPS 2020) Taller Internacional sobre Automatización de Procesos habilitados por IA (AI-PA 2020) Taller Internacional sobre Inteligencia Artificial en los Servicios de Seguridad de IoT (AI-IOTS 2020). Nota de contenido: PhD Symposium -- Staking Assets Management on Blockchains: Vision and Roadmap -- Hybrid Context aware method for quality assessment of data streams -- Container-Based Network Architecture for Mobility, Energy and Security Management as a Service in IoT Environments -- Towards a Rule-based Recommendation Approach for Business Process Modeling -- Towards a Privacy Conserved and Linked OpenData Based Device Recommendation in IoT -- Learning Performance Models Automatically -- Formal Foundations for Intel SGX Data Center Attestation Primitives -- Blockchain-Based Business Processes: A Solidity-to-CPN Formal Verification Approach -- Formal Quality of Service analysis in the Service Selection problem -- Software Demonstrations -- A Crowdsourcing-Based Knowledge Graph Construction Platform -- Data Interaction for IoT-Aware Wearable Process Management -- SiDD: The Situation-Aware Distributed Deployment System -- AuraEN: Autonomous Resource Allocation for Cloud-hosted Data Processing Pipelines -- AIOps 2020 -- Performance Diagnosis in Cloud Microservices using Deep Learning -- Anomaly Detection at Scale: The Case for Deep Distributional Time Series Models -- A Systematic Mapping Study in AIOps -- An Influence-based Approach for Root Cause Alarm Discovery in Telecom Networks -- Localization of operational faults in cloud applications by mining causal dependencies in logs using Golden Signals -- Pre-training Language Models for IT Operations -- Towards Runtime Verification via Event Stream Processing in Cloud Computing Infrastructures -- Decentralized Federated Learning Preserves Model and Data Privacy -- Online Memory Leak Detection in the Cloud-based Infrastructures -- Multi-Source Anomaly Detection in Distributed IT Systems -- TELESTO: A Graph Neural Network Model for Anomaly Classification in Cloud Services -- Discovering Alarm Correlation Rules for Network Fault Management -- Resource Sharing in Public Cloud System with Evolutionary Multi-agent Artificial Swarm Intelligence -- SLMAD: Statistical Learning-Based Metric Anomaly Detection -- Software Reliability Engineering for Resilient Cloud Operations -- AI-PA 2020 -- The Future of Robotic Process Automation (RPA) -- Adaptive Summaries: A Personalized Concept-based Summarization Approach by Learning from Users' Feedback -- TAP: A Two-Level Trust and Personality-aware Recommender System -- Am I Rare? An Intelligent Summarization Approach for Identifying Hidden Anomalies -- On how Cognitive Computing will plan your next Systematic Review -- Security Professionals' Skills Representation for Bug Bounty Programs -- Stage-Based Process Performance Mining -- AudioLens: Audio-Aware Video Recommendation for Mitigating New Item Problem -- Scalable Online Conformance Checking Using Incremental Prefix-Alignment Computation -- Bringing Cognitive Augmentation to Web Browsing Accessibility -- Towards Knowledge-Driven Automatic Service Composition for Wildfire Prediction -- Eyewitness Prediction During Crisis via Linguistic Features -- STRAPS 2020 -- On the definition of Data Regulation Risk -- Classifying Micro-Text Document Datasets: Application to Crisis-Related Tweets -- Data Centred and Usage-based Security service -- XYZ Monitor: IoT Monitoring of Infrastructures using Microservices -- Multi-cloud Solution Design for Migrating a Portfolio of Applications to the Cloud -- Higher Order Statistical Analysis in Multiresolution Domain - Application to Breast Cancer Histopathology -- Ontology Evolution using Recoverable SQL Logs -- AI-IOTS 2020 -- A Novel Automated System for Hospital Acquired Infection Monitoring and Prevention -- A novel approach for detecting IoT Botnet using balanced network traffic attributes -- KMeans Kernel- Learning based AI-IoT framework for plant leaf disease detection -- System for Monitoring and Control of Vehicle's Carbon Emissions Using Embedded Hardwares and Cloud Applications -- CFTIC 2020 -- An Information Retrieval-based Approach to Activity Recognition in Smart Homes -- Botnet sizes: when maths meet myths -- Cyber Security Education and Future Provision -- Efficient Threat Hunting Methodology for Analyzing Malicious Binaries in Windows Platform -- Peer-to-peer application threat investigation. Tipo de medio : Computadora Summary : This book constitutes revised and selected papers from the scientific satellite events held in conjunction with the18th International Conference on Service-Oriented Computing, ICSOC 2020. The conference was held virtually during December 14-17, 2020. A total of 125 submissions were received for the satellite events. The volume includes 9 papers from the PhD Symposium Track, 4 papers from the Demonstration Track, and 45 papers from the following workshops: International Workshop on Artificial Intelligence for IT Operations (AIOps) International Workshop on Cyber Forensics and Threat Investigations Challenges in Emerging Infrastructures (CFTIC 2020) 2nd Workshop on Smart Data Integration and Processing (STRAPS 2020) International Workshop on AI-enabled Process Automation (AI-PA 2020) International Workshop on Artificial Intelligence in the IoT Security Services (AI-IOTS 2020) . Enlace de acceso : https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] Service-Oriented Computing – ICSOC 2020 Workshops : AIOps, CFTIC, STRAPS, AI-PA, AI-IOTS, and Satellite Events, Dubai, United Arab Emirates, December 14–17, 2020, Proceedings / [documento electrónico] / Hacid, Hakim, ; Outay, Fatma, ; Paik, Hye-young, ; Alloum, Amira, ; Petrocchi, Marinella, ; Bouadjenek, Mohamed Reda, ; Beheshti, Amin, ; Liu, Xumin, ; Maaradji, Abderrahmane, . - 1 ed. . - [s.l.] : Springer, 2021 . - XIII, 652 p. 216 ilustraciones, 158 ilustraciones en color.
ISBN : 978-3-030-76352-7
Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos.
Idioma : Inglés (eng)
Palabras clave: Software de la aplicacion IngenierÃa Informática Red de computadoras TeorÃa de la codificación TeorÃa de la información Protección de datos IngenierÃa de software Aprendizaje automático Aplicaciones informáticas y de sistemas de información IngenierÃa Informática y Redes TeorÃa de la codificación y la información Seguridad de datos e información Clasificación: 005.3 Ciencia de los computadores (Programas) Resumen: Este libro constituye artÃculos revisados ​​y seleccionados de los eventos de satélites cientÃficos celebrados junto con la 18.ª Conferencia Internacional sobre Computación Orientada a Servicios, ICSOC 2020. La conferencia se celebró virtualmente del 14 al 17 de diciembre de 2020. Se recibió un total de 125 presentaciones para el Eventos satelitales. El volumen incluye 9 artÃculos del PhD Symposium Track, 4 artÃculos del Demonstration Track y 45 artÃculos de los siguientes talleres: Taller internacional sobre inteligencia artificial para operaciones de TI (AIOps) Taller internacional sobre ciberforense y desafÃos de investigación de amenazas en infraestructuras emergentes ( CFTIC 2020) 2do Taller sobre Integración y Procesamiento Inteligente de Datos (STRAPS 2020) Taller Internacional sobre Automatización de Procesos habilitados por IA (AI-PA 2020) Taller Internacional sobre Inteligencia Artificial en los Servicios de Seguridad de IoT (AI-IOTS 2020). Nota de contenido: PhD Symposium -- Staking Assets Management on Blockchains: Vision and Roadmap -- Hybrid Context aware method for quality assessment of data streams -- Container-Based Network Architecture for Mobility, Energy and Security Management as a Service in IoT Environments -- Towards a Rule-based Recommendation Approach for Business Process Modeling -- Towards a Privacy Conserved and Linked OpenData Based Device Recommendation in IoT -- Learning Performance Models Automatically -- Formal Foundations for Intel SGX Data Center Attestation Primitives -- Blockchain-Based Business Processes: A Solidity-to-CPN Formal Verification Approach -- Formal Quality of Service analysis in the Service Selection problem -- Software Demonstrations -- A Crowdsourcing-Based Knowledge Graph Construction Platform -- Data Interaction for IoT-Aware Wearable Process Management -- SiDD: The Situation-Aware Distributed Deployment System -- AuraEN: Autonomous Resource Allocation for Cloud-hosted Data Processing Pipelines -- AIOps 2020 -- Performance Diagnosis in Cloud Microservices using Deep Learning -- Anomaly Detection at Scale: The Case for Deep Distributional Time Series Models -- A Systematic Mapping Study in AIOps -- An Influence-based Approach for Root Cause Alarm Discovery in Telecom Networks -- Localization of operational faults in cloud applications by mining causal dependencies in logs using Golden Signals -- Pre-training Language Models for IT Operations -- Towards Runtime Verification via Event Stream Processing in Cloud Computing Infrastructures -- Decentralized Federated Learning Preserves Model and Data Privacy -- Online Memory Leak Detection in the Cloud-based Infrastructures -- Multi-Source Anomaly Detection in Distributed IT Systems -- TELESTO: A Graph Neural Network Model for Anomaly Classification in Cloud Services -- Discovering Alarm Correlation Rules for Network Fault Management -- Resource Sharing in Public Cloud System with Evolutionary Multi-agent Artificial Swarm Intelligence -- SLMAD: Statistical Learning-Based Metric Anomaly Detection -- Software Reliability Engineering for Resilient Cloud Operations -- AI-PA 2020 -- The Future of Robotic Process Automation (RPA) -- Adaptive Summaries: A Personalized Concept-based Summarization Approach by Learning from Users' Feedback -- TAP: A Two-Level Trust and Personality-aware Recommender System -- Am I Rare? An Intelligent Summarization Approach for Identifying Hidden Anomalies -- On how Cognitive Computing will plan your next Systematic Review -- Security Professionals' Skills Representation for Bug Bounty Programs -- Stage-Based Process Performance Mining -- AudioLens: Audio-Aware Video Recommendation for Mitigating New Item Problem -- Scalable Online Conformance Checking Using Incremental Prefix-Alignment Computation -- Bringing Cognitive Augmentation to Web Browsing Accessibility -- Towards Knowledge-Driven Automatic Service Composition for Wildfire Prediction -- Eyewitness Prediction During Crisis via Linguistic Features -- STRAPS 2020 -- On the definition of Data Regulation Risk -- Classifying Micro-Text Document Datasets: Application to Crisis-Related Tweets -- Data Centred and Usage-based Security service -- XYZ Monitor: IoT Monitoring of Infrastructures using Microservices -- Multi-cloud Solution Design for Migrating a Portfolio of Applications to the Cloud -- Higher Order Statistical Analysis in Multiresolution Domain - Application to Breast Cancer Histopathology -- Ontology Evolution using Recoverable SQL Logs -- AI-IOTS 2020 -- A Novel Automated System for Hospital Acquired Infection Monitoring and Prevention -- A novel approach for detecting IoT Botnet using balanced network traffic attributes -- KMeans Kernel- Learning based AI-IoT framework for plant leaf disease detection -- System for Monitoring and Control of Vehicle's Carbon Emissions Using Embedded Hardwares and Cloud Applications -- CFTIC 2020 -- An Information Retrieval-based Approach to Activity Recognition in Smart Homes -- Botnet sizes: when maths meet myths -- Cyber Security Education and Future Provision -- Efficient Threat Hunting Methodology for Analyzing Malicious Binaries in Windows Platform -- Peer-to-peer application threat investigation. Tipo de medio : Computadora Summary : This book constitutes revised and selected papers from the scientific satellite events held in conjunction with the18th International Conference on Service-Oriented Computing, ICSOC 2020. The conference was held virtually during December 14-17, 2020. A total of 125 submissions were received for the satellite events. The volume includes 9 papers from the PhD Symposium Track, 4 papers from the Demonstration Track, and 45 papers from the following workshops: International Workshop on Artificial Intelligence for IT Operations (AIOps) International Workshop on Cyber Forensics and Threat Investigations Challenges in Emerging Infrastructures (CFTIC 2020) 2nd Workshop on Smart Data Integration and Processing (STRAPS 2020) International Workshop on AI-enabled Process Automation (AI-PA 2020) International Workshop on Artificial Intelligence in the IoT Security Services (AI-IOTS 2020) . Enlace de acceso : https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...]