Abstract is missing.
- A Reference Architecture for Management of Security Operations in Digital Service ChainsAlessandro Carrega, Giovanni Grieco, Domenico Striccoli, Manos Papoutsakis, Tomas Lima, José Ignacio Carretero, Matteo Repetto. 1-31 [doi]
- Monitoring Network Flows in Containerized EnvironmentsMatteo Repetto, Alessandro Carrega. 32-55 [doi]
- Intelligent Transportation Systems - Models, Challenges, Security AspectsJoanna Kolodziej, Cornelio Hopmann, Giovanni Coppa, Daniel Grzonka, Adrian Widlak. 56-82 [doi]
- NAD: Machine Learning Based Component for Unknown Attack Detection in Network TrafficMateusz Krzyszton, Marcin Lew, Michal Marks. 83-102 [doi]
- Detecting Unknown Cyber Security Attacks Through System Behavior AnalysisFlorian Skopik, Markus Wurzenberger, Max Landauer. 103-119 [doi]
- Signature-Based Detection of Botnet DDoS AttacksPawel Szynkiewicz. 120-135 [doi]
- Automatic Attack Pattern Mining for Generating Actionable CTI Applying Alert AggregationMarkus Wurzenberger, Max Landauer, Agron Bajraktari, Florian Skopik. 136-161 [doi]
- Blockchain-Based Task and Information Management in Computational Cloud SystemsAndrzej Wilczynski, Joanna Kolodziej. 162-201 [doi]
- Ethics in Cybersecurity. What Are the Challenges We Need to Be Aware of and How to Handle Them?Denitsa Kozhuharova, Atanas Kirov, Zhanin Al-Shargabi. 202-221 [doi]
- A Discussion on Ethical Cybersecurity Issues in Digital Service ChainsFrédéric Tronnier, Sebastian Pape 0001, Sascha Löbner, Kai Rannenberg. 222-256 [doi]