Listing 1 - 7 of 7 |
Sort by
|
Choose an application
This book constitutes the refereed proceedings of the 5th International Conference on Decision and Game Theory for Security, GameSec 2014, held in Los Angeles, CA, USA, in November 2014. The 16 revised full papers presented together with 7 short papers were carefully reviewed and selected from numerous submissions. The covered topics cover multiple facets of cyber security that include: rationality of adversary, game-theoretic cryptographic techniques, vulnerability discovery and assessment, multi-goal security analysis, secure computation, economic-oriented security, and surveillance for security. Those aspects are covered in a multitude of domains that include networked systems, wireless communications, border patrol security, and control systems.
Complex analysis --- Operational research. Game theory --- Mathematics --- Computer science --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- draadloze computernetwerken --- complexe analyse (wiskunde) --- bedrijfssoftware --- computers --- informatica --- informatiesystemen --- speltheorie --- wiskunde --- computerbeveiliging --- informatica management --- computernetwerken --- computerkunde
Choose an application
Ergodic theory. Information theory --- Computer science --- Computer architecture. Operating systems --- Information systems --- coderen --- draadloze computernetwerken --- DES (data encryption standard) --- cryptologie --- ad-hocnetwerken --- computerbesturingssystemen --- database management --- programmatielogica --- OS (operating system) --- computernetwerken --- informatietheorie
Choose an application
Cyber security research is one of the important areas in the computer science domain which also plays a major role in the life of almost every individual, enterprise, society and country, which this book illustrates. A large number of advanced security books focus on either cryptography or system security which covers both information and network security. However, there is hardly any books available for advanced-level students and research scholars in security research to systematically study how the major attacks are studied, modeled, planned and combated by the community. This book aims to fill this gap. This book provides focused content related to specific attacks or attack families. These dedicated discussions in the form of individual chapters covers the application or area specific aspects, while discussing the placement of defense solutions to combat the attacks. It includes eight high quality chapters from established security research groups worldwide, which address important attacks from theoretical (modeling) as well as practical aspects. Each chapter brings together comprehensive and structured information on an attack or an attack family. The authors present crisp detailing on the state of the art with quality illustration of defense mechanisms and open research problems. This book also covers various important attacks families such as insider threats, semantics social engineering attacks, distributed denial of service attacks, botnet based attacks, cyber physical malware based attacks, cross-vm attacks, and IoT covert channel attacks. This book will serve the interests of cyber security enthusiasts, undergraduates, post-graduates, researchers and professionals working in this field. .
Production management --- Computer architecture. Operating systems --- Computer. Automation --- veiligheid (mensen) --- IoT (Internet of Things) --- informatica --- computerbeveiliging --- computernetwerken
Choose an application
This book presents a framework for the control of networked systems utilizing submodular optimization techniques. The main focus is on selecting input nodes for the control of networked systems, an inherently discrete optimization problem with applications in power system stability, social influence dynamics, and the control of vehicle formations. The first part of the book is devoted to background information on submodular functions, matroids, and submodular optimization, and presents algorithms for distributed submodular optimization that are scalable to large networked systems. In turn, the second part develops a unifying submodular optimization approach to controlling networked systems based on multiple performance and controllability criteria. Techniques are introduced for selecting input nodes to ensure smooth convergence, synchronization, and robustness to environmental and adversarial noise. Submodular optimization is the first unifying approach towards guaranteeing both performance and controllability with provable optimality bounds in static as well as time-varying networks. Throughout the text, the submodular framework is illustrated with the help of numerical examples and application-based case studies in biological, energy and vehicular systems. The book effectively combines two areas of growing interest, and will be especially useful for researchers in control theory, applied mathematics, networking or machine learning with experience in submodular optimization but who are less familiar with the problems and tools available for networked systems (or vice versa). It will also benefit graduate students, offering consistent terminology and notation that greatly reduces the initial effort associated with beginning a course of study in a new area.
Electrical engineering --- Applied physical engineering --- Engineering sciences. Technology --- Mass communications --- Artificial intelligence. Robotics. Simulation. Graphics --- procesautomatisering --- machine learning --- systeemtheorie --- controleleer --- systeembeheer --- ingenieurswetenschappen --- elektrotechniek --- communicatietechnologie --- regeltechniek
Choose an application
This book constitutes the refereed proceedings of the 11th International Conference on Decision and Game Theory for Security, GameSec 2020,held in College Park, MD, USA, in October 2020. Due to COVID-19 pandemic the conference was held virtually The 21 full papers presented together with 2 short papers were carefully reviewed and selected from 29 submissions. The papers focus on machine learning and security; cyber deception; cyber-physical systems security; security of network systems; theoretic foundations of security games; emerging topics.
Electronics --- Telecommunication technology --- Computer architecture. Operating systems --- Artificial intelligence. Robotics. Simulation. Graphics --- Computer. Automation --- optische communicatie --- optische elektronica --- computers --- informatica --- datacommunicatie --- computerbeveiliging --- KI (kunstmatige intelligentie) --- netwerk management --- AI (artificiële intelligentie)
Choose an application
This two-volume set LNICST 398 and 399 constitutes the post-conference proceedings of the 17th International Conference on Security and Privacy in Communication Networks, SecureComm 2021, held in September 2021. Due to COVID-19 pandemic the conference was held virtually. The 56 full papers were carefully reviewed and selected from 143 submissions. The papers focus on the latest scientific research results in security and privacy in wired, mobile, hybrid and ad hoc networks, in IoT technologies, in cyber-physical systems, in next-generation communication systems in web and systems security and in pervasive and ubiquitous computing.
Criminal law. Criminal procedure --- Programming --- Computer architecture. Operating systems --- Computer. Automation --- veiligheid (technologie) --- applicatiebeheer --- apps --- netwerken (informatica) --- computerbeveiliging --- computercriminaliteit --- computernetwerken --- architectuur (informatica) --- mobiele communicatie
Choose an application
This two-volume set LNICST 398 and 399 constitutes the post-conference proceedings of the 17th International Conference on Security and Privacy in Communication Networks, SecureComm 2021, held in September 2021. Due to COVID-19 pandemic the conference was held virtually. The 56 full papers were carefully reviewed and selected from 143 submissions. The papers focus on the latest scientific research results in security and privacy in wired, mobile, hybrid and ad hoc networks, in IoT technologies, in cyber-physical systems, in next-generation communication systems in web and systems security and in pervasive and ubiquitous computing.
Programming --- Computer architecture. Operating systems --- Computer. Automation --- veiligheid (technologie) --- cryptografie --- informatica --- netwerken (informatica) --- computerbeveiliging --- computernetwerken --- mobiele communicatie
Listing 1 - 7 of 7 |
Sort by
|