Zobrazeno 1 - 10
of 23
pro vyhledávání: '"Giuseppe Settanni"'
Publikováno v:
Computers & Security. 79:94-116
Technological advances and increased interconnectivity have led to a higher risk of previously unknown threats. Cyber Security therefore employs Intrusion Detection Systems that continuously monitor log lines in order to protect systems from such att
Publikováno v:
e & i Elektrotechnik und Informationstechnik. 135:278-285
This paper presents a novel approach to flexibly control the depth of monitoring applied to CPS-enabled safety-critical infrastructures, to timely detect deviations from the desired operational status, and discusses how the application of anomaly det
Autor:
Giuseppe Settanni
Publikováno v:
European Business Law Review. 28:731-746
In developed countries, elderly are often homeowners, but sometimes they face with problems of liquidity since their pension incomes do not always provide them with adequate revenues. For this reason, some solutions have been studied in different law
Publikováno v:
ICIT
2019 IEEE International Conference on Industrial Technology (ICIT)
2019 IEEE International Conference on Industrial Technology (ICIT)
Manufacturing enterprises are constantly exploring new ways to improve their own production processes to address the increasing demand of customized production. However, such enterprises show a low degree of flexibility, which mainly results from the
Autor:
Giuseppe Settanni
Publikováno v:
European Business Law Review. 27:697-708
Payments of interest amounts in floating rate loans are generally linked to specific reference parameters, such as EURIBOR. Given the decrease of such parameters to reference values around zero, what would happen if such a fall continued below this v
Publikováno v:
Information Systems. 60:13-33
Today Information and Communications Technology (ICT) networks are a dominating component of our daily life. Centralized logging allows keeping track of events occurring in ICT networks. Therefore a central log store is essential for timely detection
Publikováno v:
ICPS
The industrial world is going through its fourth revolution also known as Industry 4.0. Modern industrial processes leverage advanced IT technologies to increase productivity and often combine multiple system concepts such as Internet of Things (IoT)
Publikováno v:
Encyclopedia of Big Data Technologies ISBN: 9783319639628
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::c3981d2ad0033ec88aeec925f0472371
https://doi.org/10.1007/978-3-319-63962-8_163-1
https://doi.org/10.1007/978-3-319-63962-8_163-1
Publikováno v:
Information Security Practice and Experience ISBN: 9783319998060
ISPEC
ISPEC
Anomaly detection on log data is an important security mechanism that allows the detection of unknown attacks. Self-learning algorithms capture the behavior of a system over time and are able to identify deviations from the learned normal behavior on
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::2ecdec621a8cace55ee5cfa0c828be77
https://doi.org/10.1007/978-3-319-99807-7_2
https://doi.org/10.1007/978-3-319-99807-7_2
Publikováno v:
Computers & Security. 48:35-57
An advanced persistent threat (also known as APT) is a deliberately slow-moving cyberattack that is applied to quietly compromise interconnected information systems without revealing itself. APTs often use a variety of attack methods to get unauthori