Narrow your search

Library

AP (7)

KDG (7)

VUB (2)


Resource type

digital (7)

book (2)


Language

English (7)


Year
From To Submit

2021 (2)

2020 (1)

2018 (1)

2016 (1)

2014 (1)

More...
Listing 1 - 7 of 7
Sort by

Digital
Decision and Game Theory for Security : 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings
Authors: ---
ISBN: 9783319126012 Year: 2014 Publisher: Cham Springer International Publishing

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 5th International Conference on Decision and Game Theory for Security, GameSec 2014, held in Los Angeles, CA, USA, in November 2014. The 16 revised full papers presented together with 7 short papers were carefully reviewed and selected from numerous submissions. The covered topics cover multiple facets of cyber security that include: rationality of adversary, game-theoretic cryptographic techniques, vulnerability discovery and assessment, multi-goal security analysis, secure computation, economic-oriented security, and surveillance for security. Those aspects are covered in a multitude of domains that include networked systems, wireless communications, border patrol security, and control systems.


Digital
Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks
Authors: --- ---
ISBN: 9780387462769 Year: 2007 Publisher: Boston, MA Springer Science+Business Media, LLC


Digital
Versatile Cybersecurity
Authors: --- ---
ISBN: 9783319976433 Year: 2018 Publisher: Cham Springer International Publishing

Loading...
Export citation

Choose an application

Bookmark

Abstract

Cyber security research is one of the important areas in the computer science domain which also plays a major role in the life of almost every individual, enterprise, society and country, which this book illustrates. A large number of advanced security books focus on either cryptography or system security which covers both information and network security. However, there is hardly any books available for advanced-level students and research scholars in security research to systematically study how the major attacks are studied, modeled, planned and combated by the community. This book aims to fill this gap. This book provides focused content related to specific attacks or attack families. These dedicated discussions in the form of individual chapters covers the application or area specific aspects, while discussing the placement of defense solutions to combat the attacks. It includes eight high quality chapters from established security research groups worldwide, which address important attacks from theoretical (modeling) as well as practical aspects. Each chapter brings together comprehensive and structured information on an attack or an attack family. The authors present crisp detailing on the state of the art with quality illustration of defense mechanisms and open research problems. This book also covers various important attacks families such as insider threats, semantics social engineering attacks, distributed denial of service attacks, botnet based attacks, cyber physical malware based attacks, cross-vm attacks, and IoT covert channel attacks. This book will serve the interests of cyber security enthusiasts, undergraduates, post-graduates, researchers and professionals working in this field. .


Digital
Submodularity in Dynamics and Control of Networked Systems
Authors: --- --- ---
ISBN: 9783319269771 Year: 2016 Publisher: Cham Springer International Publishing

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book presents a framework for the control of networked systems utilizing submodular optimization techniques. The main focus is on selecting input nodes for the control of networked systems, an inherently discrete optimization problem with applications in power system stability, social influence dynamics, and the control of vehicle formations. The first part of the book is devoted to background information on submodular functions, matroids, and submodular optimization, and presents algorithms for distributed submodular optimization that are scalable to large networked systems. In turn, the second part develops a unifying submodular optimization approach to controlling networked systems based on multiple performance and controllability criteria. Techniques are introduced for selecting input nodes to ensure smooth convergence, synchronization, and robustness to environmental and adversarial noise. Submodular optimization is the first unifying approach towards guaranteeing both performance and controllability with provable optimality bounds in static as well as time-varying networks. Throughout the text, the submodular framework is illustrated with the help of numerical examples and application-based case studies in biological, energy and vehicular systems. The book effectively combines two areas of growing interest, and will be especially useful for researchers in control theory, applied mathematics, networking or machine learning with experience in submodular optimization but who are less familiar with the problems and tools available for networked systems (or vice versa). It will also benefit graduate students, offering consistent terminology and notation that greatly reduces the initial effort associated with beginning a course of study in a new area.


Multi
Decision and Game Theory for Security : 11th International Conference, GameSec 2020, College Park, MD, USA, October 28–30, 2020, Proceedings
Authors: --- --- ---
ISBN: 9783030647933 Year: 2020 Publisher: Cham Springer International Publishing

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 11th International Conference on Decision and Game Theory for Security, GameSec 2020,held in College Park, MD, USA, in October 2020. Due to COVID-19 pandemic the conference was held virtually The 21 full papers presented together with 2 short papers were carefully reviewed and selected from 29 submissions. The papers focus on machine learning and security; cyber deception; cyber-physical systems security; security of network systems; theoretic foundations of security games; emerging topics.


Multi
Security and Privacy in Communication Networks : 17th EAI International Conference, SecureComm 2021, Virtual Event, September 6-9, 2021, Proceedings, Part I
Authors: --- --- --- ---
ISBN: 9783030900199 9783030900205 9783030900182 Year: 2021 Publisher: Cham Springer International Publishing

Loading...
Export citation

Choose an application

Bookmark

Abstract

This two-volume set LNICST 398 and 399 constitutes the post-conference proceedings of the 17th International Conference on Security and Privacy in Communication Networks, SecureComm 2021, held in September 2021. Due to COVID-19 pandemic the conference was held virtually. The 56 full papers were carefully reviewed and selected from 143 submissions. The papers focus on the latest scientific research results in security and privacy in wired, mobile, hybrid and ad hoc networks, in IoT technologies, in cyber-physical systems, in next-generation communication systems in web and systems security and in pervasive and ubiquitous computing.


Digital
Security and Privacy in Communication Networks : 17th EAI International Conference, SecureComm 2021, Virtual Event, September 6-9, 2021, Proceedings, Part II
Authors: --- --- --- ---
ISBN: 9783030900229 9783030900236 9783030900212 Year: 2021 Publisher: Cham Springer International Publishing

Loading...
Export citation

Choose an application

Bookmark

Abstract

This two-volume set LNICST 398 and 399 constitutes the post-conference proceedings of the 17th International Conference on Security and Privacy in Communication Networks, SecureComm 2021, held in September 2021. Due to COVID-19 pandemic the conference was held virtually. The 56 full papers were carefully reviewed and selected from 143 submissions. The papers focus on the latest scientific research results in security and privacy in wired, mobile, hybrid and ad hoc networks, in IoT technologies, in cyber-physical systems, in next-generation communication systems in web and systems security and in pervasive and ubiquitous computing.

Listing 1 - 7 of 7
Sort by