Narrow your search

Library

KU Leuven (2)

Odisee (2)

Thomas More Kempen (2)

Thomas More Mechelen (2)

UCLL (2)

ULB (2)

ULiège (2)

VIVES (2)

KBC (1)


Resource type

book (2)


Language

English (2)


Year
From To Submit

2022 (1)

2013 (1)

Listing 1 - 2 of 2
Sort by

Book
Detection of Intrusions and Malware, and Vulnerability Assessment : 19th International Conference, DIMVA 2022, Cagliari, Italy, June 29 –July 1, 2022, Proceedings
Author:
ISBN: 3031094840 3031094832 Year: 2022 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the proceedings of the 19th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2022, held in Cagliari, Italy, in June – July 2021. The 10 full papers and 1 short paper presented in this volume were carefully reviewed and selected from 39 submissions. .


Book
Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems : 7th IFIP WG 11.2 International Workshop, WIST 2013, Heraklion, Greece, May 28-30, 2013, Proceedings
Authors: ---
ISBN: 364238529X 3642385303 Year: 2013 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This volume constitutes the refereed proceedings of the 7th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Mobile Devices in Wireless Communication, WISTP 2013, held in Heraklion, Crete, Greece, in May 2013. The 9 revised full papers presented together with  two keynote speeches were carefully reviewed and selected from 19 submissions. The scope of the workshop spans the theoretical aspects of cryptography and cryptanalysis, mobile security, smart cards and embedded devices.

Keywords

Computer science. --- Computer Communication Networks. --- Software engineering. --- Computer network architectures. --- Data protection. --- Data encryption (Computer science). --- Computer Science. --- Systems and Data Security. --- Data Encryption. --- Computer System Implementation. --- Special Purpose and Application-Based Systems. --- Computer Science, general. --- Engineering & Applied Sciences --- Computer Science --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Architectures, Computer network --- Network architectures, Computer --- Computer software engineering --- Informatics --- Computer communication systems. --- Special purpose computers. --- Architecture, Computer. --- Computer security. --- Computer security --- Ubiquitous computing --- Cryptology. --- Science --- Engineering --- Computer architecture --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Special purpose computers --- Architecture, Computer --- Distributed processing

Listing 1 - 2 of 2
Sort by