Narrow your search

Library

KBC (23)

KU Leuven (22)

Odisee (22)

Thomas More Kempen (22)

Thomas More Mechelen (22)

UGent (22)

VIVES (22)

UCLL (20)

ULiège (19)

ULB (17)


Resource type

book (23)


Language

English (23)


Year
From To Submit

2022 (1)

2021 (4)

2020 (5)

2019 (6)

2018 (3)

More...
Listing 1 - 10 of 23 << page
of 3
>>
Sort by

Book
Big Digital Forensic Data : Volume 1: Data Reduction Framework and Selective Imaging
Authors: ---
ISBN: 9811077630 9811077622 Year: 2018 Publisher: Singapore : Springer Singapore : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book provides an in-depth understanding of big data challenges to digital forensic investigations, also known as big digital forensic data. It also develops the basis of using data mining in big forensic data analysis, including data reduction, knowledge management, intelligence, and data mining principles to achieve faster analysis in digital forensic investigations. By collecting and assembling a corpus of test data from a range of devices in the real world, it outlines a process of big data reduction, and evidence and intelligence extraction methods. Further, it includes the experimental results on vast volumes of real digital forensic data. The book is a valuable resource for digital forensic practitioners, researchers in big data, cyber threat hunting and intelligence, data mining and other related areas.

Keywords

Computer crimes --- Big data. --- Investigation. --- Computer science. --- Forensic science. --- Computer security. --- Application software. --- Computers. --- Law and legislation. --- Computer Science. --- Systems and Data Security. --- Information Systems Applications (incl. Internet). --- Forensic Science. --- Legal Aspects of Computing. --- Computer Appl. in Social and Behavioral Sciences. --- Data sets, Large --- Large data sets --- Computer forensics --- Cyber forensics --- Cyberforensics --- Internet forensics --- Criminal investigation --- Data sets --- Forensic medicine. --- Computers --- Social sciences --- Data processing. --- Forensic medicine --- Injuries (Law) --- Jurisprudence, Medical --- Legal medicine --- Forensic sciences --- Medicine --- Medical laws and legislation --- Computer privacy --- Computer system security --- Computer systems --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Cyberspace --- Protection --- Security measures --- Law and legislation --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Cybernetics --- Machine theory --- Calculators --- Criminalistics --- Forensic science --- Science --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software


Book
Handbook of Big Data and IoT Security
Authors: ---
ISBN: 3030105431 3030105423 Year: 2019 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This handbook provides an overarching view of cyber security and digital forensic challenges related to big data and IoT environment, prior to reviewing existing data mining solutions and their potential application in big data context, and existing authentication and access control for IoT devices. An IoT access control scheme and an IoT forensic framework is also presented in this book, and it explains how the IoT forensic framework can be used to guide investigation of a popular cloud storage service. A distributed file system forensic approach is also presented, which is used to guide the investigation of Ceph. Minecraft, a Massively Multiplayer Online Game, and the Hadoop distributed file system environment are also forensically studied and their findings reported in this book. A forensic IoT source camera identification algorithm is introduced, which uses the camera's sensor pattern noise from the captured image. In addition to the IoT access control and forensic frameworks, this handbook covers a cyber defense triage process for nine advanced persistent threat (APT) groups targeting IoT infrastructure, namely: APT1, Molerats, Silent Chollima, Shell Crew, NetTraveler, ProjectSauron, CopyKittens, Volatile Cedar and Transparent Tribe. The characteristics of remote-controlled real-world Trojans using the Cyber Kill Chain are also examined. It introduces a method to leverage different crashes discovered from two fuzzing approaches, which can be used to enhance the effectiveness of fuzzers. Cloud computing is also often associated with IoT and big data (e.g., cloud-enabled IoT systems), and hence a survey of the cloud security literature and a survey of botnet detection approaches are presented in the book. Finally, game security solutions are studied and explained how one may circumvent such solutions. This handbook targets the security, privacy and forensics research community, and big data research community, including policy makers and government agencies, public and private organizations policy makers. Undergraduate and postgraduate students enrolled in cyber security and forensic programs will also find this handbook useful as a reference.


Book
Handbook of Big Data Privacy
Authors: ---
ISBN: 3030385574 3030385566 Year: 2020 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This handbook provides comprehensive knowledge and includes an overview of the current state-of-the-art of Big Data Privacy, with chapters written by international world leaders from academia and industry working in this field. The first part of this book offers a review of security challenges in critical infrastructure and offers methods that utilize acritical intelligence (AI) techniques to overcome those issues. It then focuses on big data security and privacy issues in relation to developments in the Industry 4.0. Internet of Things (IoT) devices are becoming a major source of security and privacy concern in big data platforms. Multiple solutions that leverage machine learning for addressing security and privacy issues in IoT environments are also discussed this handbook. The second part of this handbook is focused on privacy and security issues in different layers of big data systems. It discusses about methods for evaluating security and privacy of big data systems on network, application and physical layers. This handbook elaborates on existing methods to use data analytic and AI techniques at different layers of big data platforms to identify privacy and security attacks. The final part of this handbook is focused on analyzing cyber threats applicable to the big data environments. It offers an in-depth review of attacks applicable to big data platforms in smart grids, smart farming, FinTech, and health sectors. Multiple solutions are presented to detect, prevent and analyze cyber-attacks and assess the impact of malicious payloads to those environments. This handbook provides information for security and privacy experts in most areas of big data including; FinTech, Industry 4.0, Internet of Things, Smart Grids, Smart Farming and more. Experts working in big data, privacy, security, forensics, malware analysis, machine learning and data analysts will find this handbook useful as a reference. Researchers and advanced-level computer science students focused on computer systems, Internet of Things, Smart Grid, Smart Farming, Industry 4.0 and network analysts will also find this handbook useful as a reference.

Keywords

Data protection. --- Computer organization. --- Artificial intelligence. --- Computers. --- Security. --- Computer Systems Organization and Communication Networks. --- Artificial Intelligence. --- Information Systems and Communication Service. --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- AI (Artificial intelligence) --- Artificial thinking --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Organization, Computer --- Electronic digital computers --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Big data --- Security measures. --- Data sets, Large --- Large data sets --- Data sets --- Seguretat informàtica --- Dades massives --- Protecció de dades --- Intel·ligència artificial --- Ciència cognitiva --- Mètodes de simulació --- Processament de dades --- Sistemes autoorganitzatius --- Aprenentatge automàtic --- Demostració automàtica de teoremes --- Intel·ligència artificial distribuïda --- Intel·ligència computacional --- Sistemes adaptatius --- Tractament del llenguatge natural (Informàtica) --- Raonament qualitatiu --- Representació del coneixement (Teoria de la informació) --- Sistemes de pregunta i resposta --- Traducció automàtica --- Visió per ordinador --- Xarxes neuronals (Informàtica) --- Xarxes semàntiques (Teoria de la informació) --- Agents intel·ligents (Programes d'ordinador) --- Programació per restriccions --- Vida artificial --- Protecció de dades personals --- Protecció de la informació (Informàtica) --- Regulació de dades --- Xifratge (Informàtica) --- Delegats de protecció de dades --- Dret a l'oblit --- Identitat digital --- Macrodades --- Bases de dades --- Informàtica (Seguretat) --- Mesures de seguretat (Informàtica) --- Seguretat (Informàtica) --- Seguretat dels sistemes informàtics --- Sistemes de seguretat --- Control d'accés als ordinadors --- Seguretat de les xarxes d'ordinadors --- Pirates informàtics


Book
Handbook of big data analytics and forensics
Authors: ---
ISBN: 3030747530 3030747522 Year: 2021 Publisher: Cham, Switzerland : Springer,


Book
Big Digital Forensic Data : Volume 2: Quick Analysis for Evidence and Intelligence
Authors: ---
ISBN: 9789811302633 9811302626 9811302634 Year: 2018 Publisher: Singapore : Springer Singapore : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book provides an in-depth understanding of big data challenges to digital forensic investigations, also known as big digital forensic data. It also develops the basis of using data mining in big forensic data analysis, including data reduction, knowledge management, intelligence, and data mining principles to achieve faster analysis in digital forensic investigations. By collecting and assembling a corpus of test data from a range of devices in the real world, it outlines a process of big digital forensic data analysis for evidence and intelligence. It includes the results of experiments on vast volumes of real digital forensic data. The book is a valuable resource for digital forensic practitioners, researchers in big data, cyber threat hunting and intelligence, data mining and other related areas.


Book
Algorithms and Architectures for Parallel Processing : 17th International Conference, ICA3PP 2017, Helsinki, Finland, August 21-23, 2017, Proceedings
Authors: --- --- ---
ISBN: 3319654829 3319654810 Year: 2017 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the proceedings of the 17th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2017, held in Helsinki, Finland, in August 2017. The 25 full papers presented were carefully reviewed and selected from 117 submissions. They cover topics such as parallel and distributed architectures;  software systems and programming models; distributed and network-based computing; big data and its applications; parallel and distributed algorithms; applications of parallel and distributed computing; service dependability and security in distributed and parallel systems; service dependability and security in distributed and parallel systems; performance modeling and evaluation. This volume also includes 41 papers of four workshops, namely: the 4th International Workshop on Data, Text, Web, and Social Network Mining (DTWSM 2017), the 5th International Workshop on Parallelism in Bioinformatics (PBio 2017) , the First International Workshop on Distributed Autonomous Computing in Smart City (DACSC 2017), and the Second International Workshop on Ultrascale Computing for Early Researchers (UCER 2017). .


Book
International Conference on Applications and Techniques in Cyber Security and Intelligence : Applications and Techniques in Cyber Security and Intelligence
Authors: --- ---
ISBN: 3319670719 9783319670713 3319670700 Year: 2018 Publisher: Cham : Springer International Publishing : Imprint: Edizioni della Normale,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book presents the outcomes of the 2017 International Conference on Applications and Techniques in Cyber Security and Intelligence, which focused on all aspects of techniques and applications in cyber and electronic security and intelligence research. The conference provides a forum for presenting and discussing innovative ideas, cutting-edge research findings, and novel techniques, methods and applications on all aspects of cyber and electronic security and intelligence.


Book
Security, Privacy, and Anonymity in Computation, Communication, and Storage : 10th International Conference, SpaCCS 2017, Guangzhou, China, December 12-15, 2017, Proceedings
Authors: --- --- ---
ISBN: 3319723898 331972388X Year: 2017 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 10th International Conference on Security, Privacy and Anonymity in Computation, Communication, and Storage, SpaCCS 2017, held in Guangzhou, China, in December 2017. The 47 papers presented in this volume were carefully reviewed and selected from 140 submissions. They deal with research findings, achievements, innovations and perspectives in information security and related fields covering topics such as security algorithms and architectures, privacy-aware policies, regulations and techniques, anonymous computation and communication, encompassing fundamental theoretical approaches, practical experimental projects, and commercial application systems for computation, communication and storage.

Keywords

Computer science. --- Computer organization. --- Computer security. --- Data encryption (Computer science). --- Computers. --- Artificial intelligence. --- Computer Science. --- Security. --- Systems and Data Security. --- Information Systems and Communication Service. --- Computer Systems Organization and Communication Networks. --- Data Encryption. --- Artificial Intelligence (incl. Robotics). --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Organization, Computer --- Informatics --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Protection --- Security measures --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Cybernetics --- Calculators --- Cyberspace --- Computer security --- Cryptography --- Data protection --- Security systems --- Hacking --- Science --- Data protection. --- Information systems. --- Computer network architectures. --- Cryptology. --- Artificial Intelligence. --- Architectures, Computer network --- Network architectures, Computer --- Computer architecture --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Computer science


Book
Security, Privacy, and Anonymity in Computation, Communication, and Storage : SpaCCS 2017 International Workshops, Guangzhou, China, December 12-15, 2017, Proceedings
Authors: --- --- ---
ISBN: 3319723952 3319723944 Year: 2017 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of 11 symposia and workshops held at the 10th International Conference on Security, Privacy and Anonymity in Computation, Communication, and Storage, SpaCCS 2017, held in Guangzhou, China, in December 2017. The total of 75 papers presented in this volume was carefully reviewed and selected from a total of 190 submissions to all workshops: UbiSafe 2017: The 9th IEEE International Symposium on UbiSafe Computing ISSR 2017: The 9th IEEE International Workshop on Security in e-Science and e-Research TrustData 2017: The 8th International Workshop on Trust, Security and Privacy for Big Data TSP 2017: The 7th International Symposium on Trust, Security and Privacy for Emerging Applications SPIoT 2017: The 6th International Symposium on Security and Privacy on Internet of Things NOPE 2017: The 5th International Workshop on Network Optimization and Performance Evaluation DependSys 2017: The Third International Symposium on Dependability in Sensor, Cloud, and Big Data Systems and Applications SCS 2017: The Third International Symposium on Sensor-Cloud Systems WCSSC 2017: The Second International Workshop on Cloud Storage Service and Computing MSCF 2017: The First International Symposium on Multimedia Security and Digital Forensics SPBD 2017: The 2017 International Symposium on Big Data and Machine Learning in Information Security, Privacy and Anonymity .

Keywords

Computer science. --- Computer organization. --- Computer security. --- Data encryption (Computer science). --- Computers. --- Artificial intelligence. --- Computer Science. --- Security. --- Systems and Data Security. --- Information Systems and Communication Service. --- Data Encryption. --- Computer Systems Organization and Communication Networks. --- Artificial Intelligence (incl. Robotics). --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Organization, Computer --- Informatics --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Protection --- Security measures --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Cybernetics --- Calculators --- Cyberspace --- Computer security --- Cryptography --- Data protection --- Security systems --- Hacking --- Science --- Data protection. --- Information systems. --- Computer network architectures. --- Cryptology. --- Artificial Intelligence. --- Architectures, Computer network --- Network architectures, Computer --- Computer architecture --- Data governance --- Data regulation --- Personal data protection --- Protection, Data


Book
National Cyber Summit (NCS) Research Track
Authors: --- ---
ISBN: 3030312399 3030312380 Year: 2020 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

These proceedings gather papers presented at the Cyber Security Education Stream and Cyber Security Technology Stream of The National Cyber Summit’s Research Track, and report on the latest advances in areas ranging from software security to cyber attack detection and modeling; the use of machine learning in cyber security; legislation and policy; surveying small businesses; cyber competition, and so on. Understanding the latest capabilities in cyber security is the best way to prepare users and organizations for potential negative events. Consequently, this book will be of interest to cyber security researchers, educators and practitioners, as well as students who want to learn about cyber security. .

Listing 1 - 10 of 23 << page
of 3
>>
Sort by