Narrow your search

Library

UGent (9)

KU Leuven (8)

Odisee (7)

Thomas More Kempen (7)

Thomas More Mechelen (7)

UCLL (7)

ULB (7)

ULiège (7)

VIVES (7)

KBC (5)


Resource type

book (9)


Language

English (9)


Year
From To Submit

2020 (1)

2019 (1)

2018 (3)

2017 (1)

2016 (1)

More...
Listing 1 - 9 of 9
Sort by

Book
Green, Pervasive, and Cloud Computing : 11th International Conference, GPC 2016, Xi'an, China, May 6-8, 2016. Proceedings
Authors: --- ---
ISBN: 3319390767 3319390775 Year: 2016 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 8th International Conference on Grid and Pervasive Computing, GPC 2016, held in Seoul, Korea, in May 2016. The 20 revised papers were carefully reviewed and selected from 94 submissions. The conference contains various aspects including green computing, cloud computing, virtualisation, data and storage, and network security.

Keywords

Computer science. --- Computer communication systems. --- Software engineering. --- Algorithms. --- Information storage and retrieval. --- Computer Science. --- Computer Communication Networks. --- Information Systems Applications (incl. Internet). --- Software Engineering. --- Information Storage and Retrieval. --- Algorithm Analysis and Problem Complexity. --- Informatics --- Algorism --- Computer software engineering --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Science --- Algebra --- Arithmetic --- Engineering --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Foundations --- Distributed processing --- Information storage and retrieva. --- Computer software. --- Software, Computer --- Computer systems --- Information storage and retrieval systems. --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Computer-based information systems --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval --- Cloud computing --- Web services --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Computer networks. --- Computer and Information Systems Applications. --- Data centers


Book
Honeypot Frameworks and Their Applications: A New Framework
Authors: --- ---
ISBN: 9811077398 981107738X Year: 2018 Publisher: Singapore : Springer Singapore : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book presents the latest research on honeypots and their applications. After introducing readers to the basic concepts of honeypots and common types, it reviews various honeypot frameworks such as web-server-based, client-based, shadow and artificially intelligent honeypots. In addition, it offers extensive information on the contribution of honeypots in some of the most popular malware research area such as DDoS, Worm, APT, forensics and Bot attacks. The book subsequently tackles the issue of honeypot countermeasures, shows many of the tricks often used by hackers to discover honeypots, and proposes a counter-countermeasure to help conceal them. It then puts forward a new framework that integrates various novel concepts, and which can feasibly be used for the detection of potential ransomware and bitcoin. As such, the book provides non-experts with a concise guide to honeypots, and will also benefit practitioners working on security systems.

Keywords

Computer security. --- Malware (Computer software) --- Prevention. --- Computer science. --- Computer organization. --- Computer science --- Computer simulation. --- Computer Science. --- Security. --- Computer Systems Organization and Communication Networks. --- Systems and Data Security. --- Applications of Graph Theory and Complex Networks. --- Math Applications in Computer Science. --- Simulation and Modeling. --- Mathematics. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Computer code, Malicious --- Malevolent software --- Malicious computer code --- Malicious software --- Software, Malevolent --- Software, Malicious --- Computer software --- Data protection. --- Computer network architectures. --- Computer modeling --- Computer models --- Modeling, Computer --- Models, Computer --- Simulation, Computer --- Electromechanical analogies --- Mathematical models --- Simulation methods --- Model-integrated computing --- Informatics --- Science --- Architectures, Computer network --- Network architectures, Computer --- Computer architecture --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Physics. --- Computer science—Mathematics. --- Natural philosophy --- Philosophy, Natural --- Physical sciences --- Dynamics --- Organization, Computer


Book
Security and Privacy in Social Networks and Big Data : 6th International Symposium, SocialSec 2020, Tianjin, China, September 26–27, 2020, Proceedings
Authors: --- ---
ISBN: 9811590311 9811590303 Year: 2020 Publisher: Singapore : Springer Nature Singapore : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes revised and selected papers from the 6th International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2020, held in Tianjin, China, in September 2020. The 38 full papers presented in this volume were carefully reviewed and selected from a total of 111 submissions. The papers are organized according to the topical sections on big data security; social networks; privacy-preserving and security.

Keywords

Computer networks --- Application software. --- Computer communication systems. --- Computers. --- Data encryption (Computer science). --- Computer security. --- Mobile and Network Security. --- Information Systems Applications (incl. Internet). --- Computer Communication Networks. --- Computing Milieux. --- Cryptology. --- Systems and Data Security. --- Security measures. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Computer network security --- Network security, Computer --- Security of computer networks --- Protection --- Security measures --- Distributed processing --- Data encryption (Computer science) --- Computer networks. --- Cryptography. --- Data protection. --- Computer and Information Systems Applications. --- Data and Information Security. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers


Book
Testbeds and Research Infrastructures for the Development of Networks and Communities : 11th International Conference, TRIDENTCOM 2016, Hangzhou, China, June 14-15, 2016, Revised Selected Papers
Authors: --- --- --- ---
ISBN: 3319495801 3319495798 Year: 2017 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 11th International Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities, TridentCom 2016, held in Hangzhou, China, in June 2016. The 16 papers were carefully selected from 25 submissions and provide a forum about technologies of big data, cyber physical systems and computer communications. The papers cover future Internet and software defined networks, network testbed design and implementation, testbed for network applications, and QoS/QoE in networks.

Keywords

Computer science. --- Computer software --- Computer communication systems. --- Computer system failures. --- E-commerce. --- Computer Science. --- Computer Communication Networks. --- System Performance and Evaluation. --- Performance and Reliability. --- e-Commerce/e-business. --- Security. --- Reusability. --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Computer failures --- Computer malfunctions --- Computer systems --- Failure of computer systems --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Reusability of software --- Reusable code (Computer programs) --- Software reusability --- Informatics --- Failures --- Commerce --- Information superhighway --- System failures (Engineering) --- Fault-tolerant computing --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Software reengineering --- Generic programming (Computer science) --- Science --- Distributed processing --- Computer system performance. --- Operating systems (Computers). --- Data protection. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Computer operating systems --- Computers --- Disk operating systems --- Systems software --- Operating systems --- Computer networks --- Parallel processing (Electronic computers) --- Computer software—Reusability.


Book
Proceedings of the 1st ACM international workshop on Foundations of wireless ad hoc and sensor networking and computing
Authors: ---
ISBN: 1605581496 Year: 2008 Publisher: ACM

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Cloud Computing, Security, Privacy in New Computing Environments : 7th International Conference, CloudComp 2016, and First International Conference, SPNCE 2016, Guangzhou, China, November 25–26, and December 15–16, 2016, Proceedings
Authors: --- --- --- --- --- et al.
ISBN: 331969605X 3319696041 Year: 2018 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 7th International Conference on Cloud Computing, Security, Privacy in New Computing Environments, CloudComp 2016, and the First EAI International Conference SPNCE 2016, both held in Guangzhou, China, in November and December 2016. The proceedings contain 10 full papers selected from 27 submissions and presented at CloudComp 2016 and 12 full papers selected from 69 submissions and presented at SPNCE 2016. CloudComp 2016 presents recent advances and experiences in clouds, cloud computing and related ecosystems and business support. SPNCE 2016 focuses on security and privacy aspects of new computing environments including mobile computing, big data, cloud computing and other large-scale environments.

Keywords

Computer science. --- Computer communication systems. --- Computer security. --- Data encryption (Computer science). --- Artificial intelligence. --- Computer Science. --- Computer Communication Networks. --- Information Systems Applications (incl. Internet). --- Systems and Data Security. --- Data Encryption. --- Security. --- Artificial Intelligence (incl. Robotics). --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Informatics --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Protection --- Security measures --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Computer security --- Cryptography --- Data protection --- Security systems --- Hacking --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Science --- Distributed processing --- Data protection. --- Cryptology. --- Artificial Intelligence. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Cloud computing --- Social aspects. --- Web services --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software


Book
Internet and Distributed Computing Systems : 11th International Conference, IDCS 2018, Tokyo, Japan, October 11–13, 2018, Proceedings
Authors: --- --- --- ---
ISBN: 3030027384 3030027376 Year: 2018 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the proceedings of the 11th International Conference on Internet and Distributed Computing Systems, IDCS 2018, held in Tokyo, Japan, in October 2018. The 21 full papers presented together with 5 poster and 2 short papers in this volume were carefully reviewed and selected from 40 submissions. This conference desired to look for inspiration in diverse areas (e.g., infrastructure and system design, software development, big data, control theory, artificial intelligence, IoT, self-adaptation, emerging models, paradigms, applications and technologies related to Internet-based distributed systems) to develop new ways to design and mange such complex and adaptive computation resources. .

Keywords

Computer Communication Networks. --- Software engineering. --- Artificial intelligence. --- Computer security. --- Special Purpose and Application-Based Systems. --- Artificial Intelligence. --- Systems and Data Security. --- Information Systems Applications (incl. Internet). --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Computer software engineering --- Engineering --- Protection --- Security measures --- Internet --- Computer communication systems. --- Special purpose computers. --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Special purpose computers --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Distributed processing


Book
Malicious Attack Propagation and Source Identification
Authors: --- --- --- --- --- et al.
ISBN: 3030021785 3030021793 Year: 2019 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book covers and makes four major contributions: 1) analyzing and surveying the pros and cons of current approaches for identifying rumor sources on complex networks; 2) proposing a novel approach to identify rumor sources in time-varying networks; 3) developing a fast approach to identify multiple rumor sources; 4) proposing a community-based method to overcome the scalability issue in this research area. These contributions enable rumor source identification to be applied effectively in real-world networks, and eventually diminish rumor damages, which the authors rigorously illustrate in this book. In the modern world, the ubiquity of networks has made us vulnerable to various risks. For instance, viruses propagate throughout the Internet and infect millions of computers. Misinformation spreads incredibly fast in online social networks, such as Facebook and Twitter. Infectious diseases, such as SARS, H1N1 or Ebola, have spread geographically and killed hundreds of thousands people. In essence, all of these situations can be modeled as a rumor spreading through a network, where the goal is to find the source of the rumor so as to control and prevent network risks. So far, extensive work has been done to develop new approaches to effectively identify rumor sources. However, current approaches still suffer from critical weaknesses. The most serious one is the complex spatiotemporal diffusion process of rumors in time-varying networks, which is the bottleneck of current approaches. The second problem lies in the expensively computational complexity of identifying multiple rumor sources. The third important issue is the huge scale of the underlying networks, which makes it difficult to develop efficient strategies to quickly and accurately identify rumor sources. These weaknesses prevent rumor source identification from being applied in a broader range of real-world applications. This book aims to analyze and address these issues to make rumor source identification more effective and applicable in the real world. The authors propose a novel reverse dissemination strategy to narrow down the scale of suspicious sources, which dramatically promotes the efficiency of their method. The authors then develop a Maximum-likelihood estimator, which can pin point the true source from the suspects with high accuracy. For the scalability issue in rumor source identification, the authors explore sensor techniques and develop a community structure based method. Then the authors take the advantage of the linear correlation between rumor spreading time and infection distance, and develop a fast method to locate the rumor diffusion source. Theoretical analysis proves the efficiency of the proposed method, and the experiment results verify the significant advantages of the proposed method in large-scale networks. This book targets graduate and post-graduate students studying computer science and networking. Researchers and professionals working in network security, propagation models and other related topics, will also be interested in this book.

Listing 1 - 9 of 9
Sort by