linkedin
X

Copyright © 2026. All rights reserved – C5I S.r.l.  P.Iva: IT03336610591

ab71569d-15c7-4170-bbf5-6497ae908e24

C5I®S.r.l.

Privacy

e342c242-df44-4667-b9d4-a6860bfbb9ee

La Sicurezza del Software

I player del digital single market condividono l’obiettivo di un ambiente digitale sicuro, in cui siano limitati i reati informatici e tutelati i benefici di tutti. La necessità di lanciare un nuovo prodotto o servizio battendo sul tempo la concorrenza, spesso ne compromette la qualità, il funzionamento e la sicurezza, che sono elementi fondamentali per la gestione del mercato unico digitale, il contenimento del cybercrimine e la salvaguardia della cybersicurezza, componente a sua volta essenziale del digital single market. La richiesta di software sicuri è in aumento, sia per una maggiore consapevolezza da parte dell’utente finale sia per la capacità delle aziende di stimare i costi derivanti da cybercrimini o da malfunzionamenti software. Le organizzazioni più attente sono consapevoli che sia maggiormente proficuo prevenire l’errore e il danno, piuttosto che correggerlo o ripararlo. Per alcuni settori verticali inoltre – trasporti, aerospace&defence, sanità – la sicurezza del software dovrebbe essere una priorità assoluta. Il libro rappresenta una guida metodologica per definire i requisiti, progettare, sviluppare, testare e documentare un prodotto secondo lo standard Common Criteria, il cui rigore consente di sviluppare sistemi sicuri, e fornisce indicazioni utili per velocizzare il processo di certificazione di tali prodotti. Use case ed esempi reali sostengono le finalità professionali e didattiche del testo.

3f099c67-df2c-4469-bd85-1b7b4335c126

Cyber Electromagnetic Activities and Signals Intelligence: a Command and Control framework

You go to the attack with the most advanced alignments, but you win with the side ones". Modern operations see even actual this quote in two new domains of warfare: electromagnetic spectrum and cyberspace. These new domains are potentially accessible from every classic one and represent dimensions that commanders have to schedule and use both during an operation by using ' Sensors ' and ' Effector

210014b9-e9b3-4e21-9c15-1b021542befb

Exploiting the MIL-STD-1553 avionic data bus with an active cyber device

The ensemble of cyber and electromagnetic activities has become predominant in present-day battlegrounds and armed forces are witnessing the introduction of complex and interconnected weapon systems. According to United States military doctrine, cyberspace has been classified as the fifth dimension of the battlespace and much effort is being devoted by NATO to secure activities in such an environment. This paper delves its roots in a vast research endeavor aimed at granting cyber resilience of current and future assets. Within such a broad and challenging domain, the work has a very precise scope: to address the vulnerabilities of a specific avionic platform protocol, namely the MIL-STD-1553 standard. The discussion will unfold into the design and implementation of a cyber device that is able to exploit the identified vulnerabilities. The device in question will also be tested to prove the effectiveness of the proposed solution. The outcomes will stand as a call to action towards improving the security of state-of-the-art avionic systems

79efed6a-38c8-4163-9970-153feeb3ff4c

Effective Surveillance for Homeland Security: Balancing Technology and Social Issues

Effective Surveillance for Homeland Security: Balancing Technology and Social Issues provides a comprehensive survey of state-of-the-art methods and tools for the surveillance and protection of citizens and critical infrastructures against natural and deliberate threats.

71dcf6d0-a284-4d5d-9863-9b409f3fec29

Applications in Electronics Pervading Industry, Environment and Society

This book provides a thorough overview of cutting-edge research on electronics applications relevant to industry, the environment and society at large. A wide spectrum of application domains are covered, from automotive to space and from health to security and special attention is devoted to the use of embedded devices and sensors for imaging, communication and control. The book is based on the 2013 APPLEPIES Conference, held in Rome, which brought together researchers and stakeholders to consider the most significant current trends in the field of applied electronics and to debate visions for the future. Areas covered by the conference included information communication technology, biotechnology and biomedical imaging, space, secure, clean and efficient energy, the environment, smart, green and integrated transport. As electronics technology continues to develop apace, constantly meeting previously unthinkable targets, further attention needs to be directed toward the electronics applications and the development of systems that facilitate human activities. This book, written by industrial and academic professionals, will hopefully contribute in this endeavor.