Narrow your search

Library

KU Leuven (9)

Odisee (9)

Thomas More Kempen (9)

Thomas More Mechelen (9)

UCLL (9)

VIVES (9)

UGent (6)

ULB (6)

ULiège (6)

KBC (5)

More...

Resource type

book (9)


Language

English (9)


Year
From To Submit

2022 (2)

2021 (4)

2020 (1)

2009 (1)

2004 (1)

Listing 1 - 9 of 9
Sort by

Book
Handbook for CTFers
Author:
ISBN: 9789811903366 Year: 2022 Publisher: Singapore ; Beijing, China : Springer : Publishing House of Electronics Industry,


Book
Advances in human factors in robots, unmanned systems and cybersecurity : proceedings of the AHFE 2021 virtual conferences on human factors in robots, drones and unmanned systems, and human factors in cybersecurity, July 25-29, 2021, USA
Authors: --- ---
ISBN: 3030799972 3030799964 Year: 2021 Publisher: Cham, Switzerland : Springer,

Advances in biometric person authentication : 5th Chinese Conference on Biometric Recognition, SINOBIOMETRICS 2004, Guangzhou, China, December 13-14, 2004 : proceedings
Authors: ---
ISBN: 3540305483 3540240292 Year: 2004 Publisher: Berlin : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Following the previous four annual conferences, the 5th Chinese Conference on Biometrics Recognition (Sinobiometrics 2004) was held in Guangzhou, China in December 2004. The conference this year was aimed at promoting the international exchange of ideas and providing an opportunity for keeping abreast of the latest developments in biometric algorithms, systems, and applications. The 1st Biometrics Verification Competition (BVC) on face, iris, and fingerprint recognition was also conducted in conjunction with the conference. This book is composed of 74 papers presented at Sinobiometrics 2004, contributed by researchers and industrial practitioners from Korea, Japan, Singapore, Hong Kong, France, UK, US, as well as China. Of these, 60 papers were selected from 140 submissions and 14 were invited. The papers not only presented recent technical advances, but also addressed issues in biometric system design, standardization, and applications. Included among the invited were four feature papers on the ideas and algorithms of the best-performing biometric engines, which were either competition winners at the Face Authentication Test (FAT) 2004 or the Fingerprint Verification Competition (FVC) 2004, or they were the best-performing iris and palmprint recognition algorithms. The papers were complemented by five keynote lectures on biometrics, and face, fingerprint, and iris authentication and multimodal fusion by Arun Ross (West Virginia University) and Anil K. Jain (Michigan State University), Josef Kittler (University of Surrey), John Daugman (University of Cambridge), Raffaele Cappelli (University of Bologna), and Stan Z. Li (Chinese Academy of Sciences).

Keywords

Biometric identification --- Computer security --- Computer science. --- Special purpose computers. --- Multimedia information systems. --- Pattern recognition. --- Application software. --- Management information systems. --- Computer Science. --- Pattern Recognition. --- Computer Appl. in Social and Behavioral Sciences. --- Computer Appl. in Administrative Data Processing. --- Multimedia Information Systems. --- Special Purpose and Application-Based Systems. --- Management of Computing and Information Systems. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Design perception --- Pattern recognition --- Form perception --- Perception --- Figure-ground perception --- Computer-based multimedia information systems --- Multimedia computing --- Multimedia information systems --- Multimedia knowledge systems --- Information storage and retrieval systems --- Special purpose computers --- Computers --- Informatics --- Science --- Communication systems --- Optical pattern recognition. --- Social sciences --- Information systems. --- Multimedia systems. --- Software engineering. --- Information Systems. --- Data processing. --- Computer software engineering --- Engineering --- Optical data processing --- Pattern perception --- Perceptrons --- Visual discrimination --- Seguretat informàtica --- Reconeixement de formes (Informàtica) --- Biometria --- Bioestadística --- Biologia --- Estadística --- Herència (Biologia) --- Anàlisi de supervivència (Biometria) --- Censos --- Genètica quantitativa --- Biomatemàtica --- Estadística matemàtica --- Mostreig (Estadística) --- Autòmats cel·lulars --- Reconeixement automàtic de la parla --- Visió per ordinador --- Informàtica (Seguretat) --- Mesures de seguretat (Informàtica) --- Seguretat (Informàtica) --- Seguretat dels sistemes informàtics --- Sistemes de seguretat --- Protecció de dades --- Control d'accés als ordinadors --- Seguretat de les xarxes d'ordinadors --- Xifratge (Informàtica) --- Pirates informàtics


Book
Handbook of Big Data Privacy
Authors: ---
ISBN: 3030385574 3030385566 Year: 2020 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This handbook provides comprehensive knowledge and includes an overview of the current state-of-the-art of Big Data Privacy, with chapters written by international world leaders from academia and industry working in this field. The first part of this book offers a review of security challenges in critical infrastructure and offers methods that utilize acritical intelligence (AI) techniques to overcome those issues. It then focuses on big data security and privacy issues in relation to developments in the Industry 4.0. Internet of Things (IoT) devices are becoming a major source of security and privacy concern in big data platforms. Multiple solutions that leverage machine learning for addressing security and privacy issues in IoT environments are also discussed this handbook. The second part of this handbook is focused on privacy and security issues in different layers of big data systems. It discusses about methods for evaluating security and privacy of big data systems on network, application and physical layers. This handbook elaborates on existing methods to use data analytic and AI techniques at different layers of big data platforms to identify privacy and security attacks. The final part of this handbook is focused on analyzing cyber threats applicable to the big data environments. It offers an in-depth review of attacks applicable to big data platforms in smart grids, smart farming, FinTech, and health sectors. Multiple solutions are presented to detect, prevent and analyze cyber-attacks and assess the impact of malicious payloads to those environments. This handbook provides information for security and privacy experts in most areas of big data including; FinTech, Industry 4.0, Internet of Things, Smart Grids, Smart Farming and more. Experts working in big data, privacy, security, forensics, malware analysis, machine learning and data analysts will find this handbook useful as a reference. Researchers and advanced-level computer science students focused on computer systems, Internet of Things, Smart Grid, Smart Farming, Industry 4.0 and network analysts will also find this handbook useful as a reference.

Keywords

Data protection. --- Computer organization. --- Artificial intelligence. --- Computers. --- Security. --- Computer Systems Organization and Communication Networks. --- Artificial Intelligence. --- Information Systems and Communication Service. --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- AI (Artificial intelligence) --- Artificial thinking --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Organization, Computer --- Electronic digital computers --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Big data --- Security measures. --- Data sets, Large --- Large data sets --- Data sets --- Seguretat informàtica --- Dades massives --- Protecció de dades --- Intel·ligència artificial --- Ciència cognitiva --- Mètodes de simulació --- Processament de dades --- Sistemes autoorganitzatius --- Aprenentatge automàtic --- Demostració automàtica de teoremes --- Intel·ligència artificial distribuïda --- Intel·ligència computacional --- Sistemes adaptatius --- Tractament del llenguatge natural (Informàtica) --- Raonament qualitatiu --- Representació del coneixement (Teoria de la informació) --- Sistemes de pregunta i resposta --- Traducció automàtica --- Visió per ordinador --- Xarxes neuronals (Informàtica) --- Xarxes semàntiques (Teoria de la informació) --- Agents intel·ligents (Programes d'ordinador) --- Programació per restriccions --- Vida artificial --- Protecció de dades personals --- Protecció de la informació (Informàtica) --- Regulació de dades --- Xifratge (Informàtica) --- Delegats de protecció de dades --- Dret a l'oblit --- Identitat digital --- Macrodades --- Bases de dades --- Informàtica (Seguretat) --- Mesures de seguretat (Informàtica) --- Seguretat (Informàtica) --- Seguretat dels sistemes informàtics --- Sistemes de seguretat --- Control d'accés als ordinadors --- Seguretat de les xarxes d'ordinadors --- Pirates informàtics


Book
Smart card research and advanced applications : 19th International Conference, CARDIS 2020, Virtual Event, November 18-19, 2020, revised selected papers
Authors: ---
ISBN: 3030684873 3030684865 Year: 2021 Publisher: Cham, Switzerland : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the proceedings of the 19th International Conference on Smart Card Research and Advanced Applications, CARDIS 2020, which took place during November 18-20, 2020. The conference was originally planned to take place in Lübeck, Germany, and changed to an online format due to the COVID-19 pandemic. The 12 full papers presented in this volume were carefully reviewed and selected from 26 submissions. They were organized in topical sections named: post-quantum cryptography; efficient implementations; and physical attacks.

Keywords

Data encryption (Computer science). --- Computer security. --- Special purpose computers. --- Application software. --- Computer communication systems. --- Cryptology. --- Systems and Data Security. --- Special Purpose and Application-Based Systems. --- Information Systems Applications (incl. Internet). --- Computer Communication Networks. --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Special purpose computers --- Computers --- Computer privacy --- Computer system security --- Computer systems --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Distributed processing --- Protection --- Security measures --- Smart cards --- Cards, Smart --- Chip cards --- IC cards --- Integrated circuit cards --- Memory cards --- Computer storage devices --- Expansion boards (Microcomputers) --- Near-field communication --- Criptografia --- Seguretat informàtica --- Targetes intel·ligents --- Targetes amb circuits integrats --- Targetes chip --- Sistemes de seguretat --- Microprocessadors --- Informàtica (Seguretat) --- Mesures de seguretat (Informàtica) --- Seguretat (Informàtica) --- Seguretat dels sistemes informàtics --- Protecció de dades --- Control d'accés als ordinadors --- Seguretat de les xarxes d'ordinadors --- Xifratge (Informàtica) --- Pirates informàtics --- Escriptura secreta --- Escriptura --- Símbols


Book
Emerging Information Security and Applications : Second International Symposium, EISA 2021, Copenhagen, Denmark, November 12-13, 2021, Revised Selected Papers
Authors: ---
ISBN: 3030939561 3030939553 Year: 2022 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This volume constitutes selected papers presented at the Second International Symposium on Emerging Information Security and Applications, EISA 2021, held in Copenhagen, Denmark, in November 2021.* The 10 full papers and 1 short paper presented in this volume were thoroughly reviewed and selected from the 36 submissions. They present a discussion on the emerging techniques, theories and applications to enhance information and application security in practice. *Due to the COVID-19 pandemic the conference was held online. .

Keywords

Computer security. --- Computer security --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Computer engineering. --- Computer networks. --- Data protection. --- Computer networks --- Cryptography. --- Data encryption (Computer science). --- Computer Engineering and Networks. --- Data and Information Security. --- Mobile and Network Security. --- Security Services. --- Cryptology. --- Security measures. --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Computer network security --- Network security, Computer --- Security of computer networks --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Distributed processing --- Design and construction --- Seguretat informàtica --- Seguretat de les xarxes d'ordinadors --- Control d'accés als ordinadors --- Xifratge (Informàtica)


Book
Foundations and applications of security analysis : Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, ARSPA-WITS 2009, York, UK, March 28-29, 2009 ; revised selected papers

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the thoroughly refereed post-conference proceedings of the Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, ARSPA-WITS 2009, held in York, UK, in March 2009, in association with ETAPS 2009. The 12 revised full papers presented together with 2 invited talks were carefully reviewed and selected from 27 submissions. The papers feature topics including formal specification, analysis and design of security protocols and their applications, the formal definition of various aspects of security such as access control mechanisms, mobile code security and denial-of-service attacks, the modeling of information flow and its application to confidentiality policies, system composition and covert channel analysis.

Keywords

Computer security --- Formal methods (Computer science) --- Cryptography --- Computer Science --- Engineering & Applied Sciences --- Data protection --- Computer science. --- Computer organization. --- Computer communication systems. --- Data structures (Computer science). --- Data encryption (Computer science). --- Coding theory. --- Algorithms. --- Computer Science. --- Data Encryption. --- Data Structures, Cryptology and Information Theory. --- Coding and Information Theory. --- Computer Communication Networks. --- Algorithm Analysis and Problem Complexity. --- Computer Systems Organization and Communication Networks. --- Algorism --- Algebra --- Arithmetic --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Organization, Computer --- Electronic digital computers --- Informatics --- Science --- Foundations --- Distributed processing --- Data structures (Computer scienc. --- Computer software. --- Computer network architectures. --- Cryptology. --- Data Structures and Information Theory. --- Architectures, Computer network --- Network architectures, Computer --- Computer architecture --- Software, Computer --- Computer systems --- Information theory. --- Communication theory --- Communication --- Cybernetics --- Intel·ligència artificial --- Seguretat informàtica --- Informàtica (Seguretat) --- Mesures de seguretat (Informàtica) --- Seguretat (Informàtica) --- Seguretat dels sistemes informàtics --- Sistemes de seguretat --- Protecció de dades --- Control d'accés als ordinadors --- Seguretat de les xarxes d'ordinadors --- Xifratge (Informàtica) --- Pirates informàtics --- Ciència cognitiva --- Mètodes de simulació --- Processament de dades --- Sistemes autoorganitzatius --- Aprenentatge automàtic --- Demostració automàtica de teoremes --- Intel·ligència artificial distribuïda --- Intel·ligència computacional --- Sistemes adaptatius --- Tractament del llenguatge natural (Informàtica) --- Raonament qualitatiu --- Representació del coneixement (Teoria de la informació) --- Sistemes de pregunta i resposta --- Traducció automàtica --- Visió per ordinador --- Xarxes neuronals (Informàtica) --- Xarxes semàntiques (Teoria de la informació) --- Agents intel·ligents (Programes d'ordinador) --- Programació per restriccions --- Vida artificial

Listing 1 - 9 of 9
Sort by