Blackwell / Zhu | Cyberpatterns | E-Book | sack.de
E-Book

E-Book, Englisch, 255 Seiten, eBook

Blackwell / Zhu Cyberpatterns

Unifying Design Patterns with Security and Attack Patterns
2014
ISBN: 978-3-319-04447-7
Verlag: Springer International Publishing
Format: PDF
Kopierschutz: 1 - PDF Watermark

Unifying Design Patterns with Security and Attack Patterns

E-Book, Englisch, 255 Seiten, eBook

ISBN: 978-3-319-04447-7
Verlag: Springer International Publishing
Format: PDF
Kopierschutz: 1 - PDF Watermark



Cyberspace in increasingly important to people in their everyday lives for purchasing goods on the Internet, to energy supply increasingly managed remotely using Internet protocols. Unfortunately, this dependence makes us susceptible to attacks from nation states, terrorists, criminals and hactivists. Therefore, we need a better understanding of cyberspace, for which patterns, which are predictable regularities, may help to detect, understand and respond to incidents better. The inspiration for the workshop came from the existing work on formalising design patterns applied to cybersecurity, but we also need to understand the many other types of patterns that arise in cyberspace.

Blackwell / Zhu Cyberpatterns jetzt bestellen!

Zielgruppe


Research


Autoren/Hrsg.


Weitere Infos & Material


Cyberpatterns: Towards a Pattern Oriented Study of Cyberspace.- Towards a Conceptual Framework for Security Patterns.- Design Patterns: Applications and Open Issues.- Challenges For A Formal Framework for Patterns.- Design Space-Based Pattern Representation.- Extending AOP Principles for the Description of Network Security Patterns.- Management Patterns for Network Resilience: Design and Verification of Policy Configurations.- A Heuristic Approach for Secure Service Composition Adaptation.-  A Strategy for Structuring and Formalising Attack Patterns.- Attack Pattern Recognition through Correlating Cyber Situational Awareness in Computer Networks.- Towards a Penetration Testing Framework using Attack Patterns.- On the use of Design Patterns to Capture Memory Corruption Vulnerabilities.- ‘Weird Machine’ Patterns.- Towards a Simulation of Information Security Behaviour in Organisations.- Security Design Patterns in the MASTER Workbench.- Evaluating the Implications of Attack and Security Patterns with Premortems.- An Overview of Artificial Intelligence Based Pattern Matching in a Security and Digital Forensic Context.- Partitional Clustering of Malware using K-Means.- Dynamic Monitoring of Composed Services.- Where has this hard disk been? : Extracting geospatial intelligence from digital storage systems.- Future Directions for Research on Cyberpatterns.



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.