Lente d'ingrandimento
Search Loader

Clive Blackwell & Hong Zhu 
Cyberpatterns 
Unifying Design Patterns with Security and Attack Patterns

Supporto
Cyberspace in increasingly important to people in their everyday lives for purchasing goods on the Internet, to energy supply increasingly managed remotely using Internet protocols. Unfortunately, this dependence makes us susceptible to attacks from nation states, terrorists, criminals and hactivists. Therefore, we need a better understanding of cyberspace, for which patterns, which are predictable regularities, may help to detect, understand and respond to incidents better. The inspiration for the workshop came from the existing work on formalising design patterns applied to cybersecurity, but we also need to understand the many other types of patterns that arise in cyberspace.
€53.49
Modalità di pagamento

Tabella dei contenuti

Cyberpatterns: Towards a Pattern Oriented Study of Cyberspace.- Towards a Conceptual Framework for Security Patterns.- Design Patterns: Applications and Open Issues.- Challenges For A Formal Framework for Patterns.- Design Space-Based Pattern Representation.- Extending AOP Principles for the Description of Network Security Patterns.- Management Patterns for Network Resilience: Design and Verification of Policy Configurations.- A Heuristic Approach for Secure Service Composition Adaptation.-  A Strategy for Structuring and Formalising Attack Patterns.- Attack Pattern Recognition through Correlating Cyber Situational Awareness in Computer Networks.- Towards a Penetration Testing Framework using Attack Patterns.- On the use of Design Patterns to Capture Memory Corruption Vulnerabilities.- ‘Weird Machine’ Patterns.- Towards a Simulation of Information Security Behaviour in Organisations.- Security Design Patterns in the MASTER Workbench.- Evaluating the Implications of Attack and Security Patterns with Premortems.- An Overview of Artificial Intelligence Based Pattern Matching in a Security and Digital Forensic Context.- Partitional Clustering of Malware using K-Means.- Dynamic Monitoring of Composed Services.- Where has this hard disk been? : Extracting geospatial intelligence from digital storage systems.- Future Directions for Research on Cyberpatterns.

Lingua Inglese ● Formato PDF ● Pagine 264 ● ISBN 9783319044477 ● Dimensione 5.3 MB ● Editore Clive Blackwell & Hong Zhu ● Casa editrice Springer International Publishing ● Città Cham ● Paese CH ● Pubblicato 2014 ● Scaricabile 24 mesi ● Moneta EUR ● ID 5232951 ● Protezione dalla copia DRM sociale

Altri ebook dello stesso autore / Editore

16.193 Ebook in questa categoria