Narrow your search

Library

FARO (7)

KU Leuven (7)

LUCA School of Arts (7)

Odisee (7)

Thomas More Kempen (7)

Thomas More Mechelen (7)

UCLL (7)

VIVES (7)

Vlaams Parlement (7)

UGent (4)

More...

Resource type

book (7)


Language

English (5)

German (2)


Year
From To Submit

2023 (1)

2022 (3)

2021 (1)

2020 (1)

2016 (1)

Listing 1 - 7 of 7
Sort by

Book
Unsicheren Kanäle : Negative und queere Sicherheit in Kryptologie und Informatik
Author:
ISBN: 3732863069 383766306X Year: 2022 Publisher: Bielefeld : transcript Verlag,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Zeitgenössische IT-Sicherheit operiert in einer Überbietungslogik zwischen Sicherheitsvorkehrungen und Angriffsszenarien. Diese paranoid strukturierte Form negativer Sicherheit lässt sich vom Ursprung der IT-Sicherheit in der modernen Kryptografie über Computerviren und -würmer, Ransomware und Backdoors bis hin zum AIDS-Diskurs der 1980er Jahre nachzeichnen. Doch Sicherheit in und mit digital vernetzten Medien lässt sich auch anders denken: Marie-Luise Shnayien schlägt die Verwendung eines reparativen, queeren Sicherheitsbegriffs vor, dessen Praktiken zwar nicht auf der Ebene des Technischen angesiedelt sind, aber dennoch nicht ohne ein genaues Wissen desselben auskommen.


Book
High Accuracy Detection of Mobile Malware Using Machine Learning
Author:
ISBN: 3036571744 3036571752 Year: 2023 Publisher: [Place of publication not identified] : MDPI - Multidisciplinary Digital Publishing Institute,

Loading...
Export citation

Choose an application

Bookmark

Abstract

As increasingly sophisticated and evasive malware attacks continue to emerge, more effective detection solutions to tackle the problem are being sought through the application of advanced machine learning techniques. This reprint presents several advances in the field including: a new method of generating adversarial samples through byte sequence feature extraction using deep learning; a state-of-the-art comparative evaluation of deep learning approaches for mobile botnet detection; a novel visualization-based approach that utilizes images for Android botnet detection; a study on the detection of drive-by exploits in images using deep learning; etc. Furthermore, this reprint presents state-of-the-art reviews about machine learning-based detection techniques that will increase researchers' knowledge in the field and enable them to identify future research and development directions.


Book
Das materielle Computerstrafrecht
Author:
Year: 2016 Publisher: Jan Sramek Verlag

Loading...
Export citation

Choose an application

Bookmark

Abstract

The aims of the present study are to describe the modern forms of cybercrime and analyze the substantive computer-specific offenses of the Austrian Penal Code by the means of specialist literature and - as available - relevant judgments. Based on the debate about the terms “cybercrime” or “computer criminal law” and the term of data in the Austrian Penal Code, the specific substantive computer-specific offenses, including the penal provision of the Data Protection Code concerning the criminal protection of personal data, are presented and discussed systematically.


Book
Advances in Computer Recognition, Image Processing and Communications, Selected Papers from CORES 2021 and IP&C 2021
Authors: --- --- --- ---
ISBN: 3036553142 3036553134 Year: 2022 Publisher: MDPI - Multidisciplinary Digital Publishing Institute

Loading...
Export citation

Choose an application

Bookmark

Abstract

As almost all human activities have been moved online due to the pandemic, novel robust and efficient approaches and further research have been in higher demand in the field of computer science and telecommunication. Therefore, this (reprint) book contains 13 high-quality papers presenting advancements in theoretical and practical aspects of computer recognition, pattern recognition, image processing and machine learning (shallow and deep), including, in particular, novel implementations of these techniques in the areas of modern telecommunications and cybersecurity.


Book
Cyber Security of Critical Infrastructures
Authors: --- ---
Year: 2021 Publisher: Basel, Switzerland MDPI - Multidisciplinary Digital Publishing Institute

Loading...
Export citation

Choose an application

Bookmark

Abstract

Critical infrastructures are vital assets for public safety, economic welfare, and the national security of countries. The vulnerabilities of critical infrastructures have increased with the widespread use of information technologies. As Critical National Infrastructures are becoming more vulnerable to cyber-attacks, their protection becomes a significant issue for organizations as well as nations. The risks to continued operations, from failing to upgrade aging infrastructure or not meeting mandated regulatory regimes, are considered highly significant, given the demonstrable impact of such circumstances. Due to the rapid increase of sophisticated cyber threats targeting critical infrastructures with significant destructive effects, the cybersecurity of critical infrastructures has become an agenda item for academics, practitioners, and policy makers. A holistic view which covers technical, policy, human, and behavioural aspects is essential to handle cyber security of critical infrastructures effectively. Moreover, the ability to attribute crimes to criminals is a vital element of avoiding impunity in cyberspace. In this book, both research and practical aspects of cyber security considerations in critical infrastructures are presented. Aligned with the interdisciplinary nature of cyber security, authors from academia, government, and industry have contributed 13 chapters. The issues that are discussed and analysed include cybersecurity training, maturity assessment frameworks, malware analysis techniques, ransomware attacks, security solutions for industrial control systems, and privacy preservation methods.

Keywords

crypto-ransomware --- locker-ransomware --- static analysis --- dynamic analysis --- machine learning --- assessment framework --- cybersecurity --- GDPR --- PCI-DSS --- DSPT --- NISD --- cyber-ranges --- security training --- security modelling --- serious games --- dynamic adaptation --- training programmes --- computers in education --- bloom --- STRIDE --- smart shipping --- military --- VMF --- hash chain --- T-OTP --- lightweight secure hash (LSH) --- CNR --- web application --- security vulnerability --- analysis security testing --- static analysis security testing --- dynamic analysis security testing --- interactive analysis security testing --- assessment methodology --- false positive --- false negative --- tools combination --- deep learning --- image classification --- transfer learning --- industrial control system --- fine-tuning --- testbeds --- cyber ranges --- cyber exercises --- education --- training --- research --- lattice cryptography --- code cryptography --- post quantum cryptography --- physical unclonable function --- public key infrastructure --- high performance computing --- malware analysis --- static malware analysis --- dynamic malware analysis --- malware classification --- random forest --- support vector machines --- smart grid --- risk assessment --- threat modeling --- formal verification --- probabilistic model checking --- cloud robotics --- image face recognition --- deep learning algorithms --- security --- encryption algorithms --- cybercrime --- Hasse diagram --- interval-valued complex intuitionistic fuzzy relations --- interval-valued complex intuitionistic fuzzy sets --- offensive cybersecurity --- cyber-attacks --- scoring model --- offensive cybersecurity framework --- n/a


Book
Cyber Security and Critical Infrastructures
Authors: --- ---
Year: 2022 Publisher: Basel MDPI Books

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book contains the manuscripts that were accepted for publication in the MDPI Special Topic "Cyber Security and Critical Infrastructure" after a rigorous peer-review process. Authors from academia, government and industry contributed their innovative solutions, consistent with the interdisciplinary nature of cybersecurity. The book contains 16 articles: an editorial explaining current challenges, innovative solutions, real-world experiences including critical infrastructure, 15 original papers that present state-of-the-art innovative solutions to attacks on critical systems, and a review of cloud, edge computing, and fog's security and privacy issues.


Book
Green, Energy-Efficient and Sustainable Networks
Authors: --- --- ---
ISBN: 3039280392 3039280384 Year: 2020 Publisher: MDPI - Multidisciplinary Digital Publishing Institute

Loading...
Export citation

Choose an application

Bookmark

Abstract

The book Green, Energy-Efficient and Sustainable Networks provides insights and solutions for a range of problems in the field of obtaining greener, energy-efficient, and sustainable networks. The book contains the outcomes of the Special Issue on “Green, Energy-Efficient and Sustainable Networks” of the Sensors journal. Seventeen high-quality papers published in the Special Issue have been collected and reproduced in this book, demonstrating significant achievements in the field. Among the published papers, one paper is an editorial and one is a review, while the remaining 15 works are research articles. The published papers are self-contained peer-reviewed scientific works that are authored by more than 75 different contributors with both academic and industry backgrounds. The editorial paper gives an introduction to the problem of information and communication technology (ICT) energy consumption and greenhouse gas emissions, presenting the state of the art and future trends in terms of improving the energy-efficiency of wireless networks and data centers, as the major energy consumers in the ICT sector. In addition, the published articles aim to improve energy efficiency in the fields of software-defined networking, Internet of things, machine learning, authentication, energy harvesting, wireless relay systems, routing metrics, wireless sensor networks, device-to-device communications, heterogeneous wireless networks, and image sensing. The last paper is a review that gives a detailed overview of energy-efficiency improvements and methods for the implementation of fifth-generation networks and beyond. This book can serve as a source of information in industrial, teaching, and/or research and development activities. The book is a valuable source of information, since it presents recent advances in different fields related to greening and improving the energy-efficiency and sustainability of those ICTs particularly addressed in this book

Keywords

node speed --- linear recovery --- resource block allocation --- social awareness --- internet-of-things --- scheduling algorithm --- renewables --- neural network --- battery capacity --- energy awareness --- measurement structure --- optimization --- energy efficiency --- charging efficiency --- random structural matrices --- SDN --- water filling algorithm --- ONOS --- energy harvesting --- malware detection --- node density --- HetNets --- sustainability --- cooperative smart community --- adversarial samples --- spatial modulation --- NOMA --- 5G --- light-weight authentication --- green networking --- Device-to-Device (D2D) --- lightweight cipher --- mobile edge computing --- wireless power transfer --- adaptive link rate --- successive interference cancellation (SIC) --- directional charging vehicle --- self-interference cancellation --- proportional rate constraint --- inter-meeting time --- sustainable --- RWSN --- channel state information --- stochastic geometry --- networks --- green internet of things (IoT) --- PHY-layer --- IoT --- Markov chain --- traffic engineering --- QoS --- energy-efficient Ethernet --- power --- lightweight authentication --- energy aware routing --- authentication --- wired access --- amplify-and-forward --- software defined networking (SDN) --- image compressive sensing (CS) --- green --- edge computing --- LTE-A --- opportunistic networks --- RF Fingerprinting --- data centre --- multiple-input multiple-output --- Internet of Things --- machine learning --- peer discovery --- full-duplex --- industrial --- carbon footprint --- WSN --- imperfect CSI --- data center --- symbol error probability --- physical-layer authentication --- interference coordination --- clustering --- control and data plane --- wireless --- ICT --- bisection based optimal power allocation --- energy-efficiency --- consumer preferences --- real-time traffic

Listing 1 - 7 of 7
Sort by