Narrow your search

Library

ULiège (8)

KU Leuven (7)

Odisee (7)

Thomas More Kempen (7)

Thomas More Mechelen (7)

UCLL (7)

ULB (7)

VIVES (7)

UGent (5)

KBC (3)


Resource type

book (8)


Language

English (8)


Year
From To Submit

2020 (1)

2018 (4)

2017 (1)

2015 (1)

2013 (1)

Listing 1 - 8 of 8
Sort by

Book
Introductory Computer Forensics : A Hands-on Practical Approach
Author:
ISBN: 303000581X 3030005801 Year: 2018 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This textbook provides an introduction to digital forensics, a rapidly evolving field for solving crimes. Beginning with the basic concepts of computer forensics, each of the book’s 21 chapters focuses on a particular forensic topic composed of two parts: background knowledge and hands-on experience through practice exercises. Each theoretical or background section concludes with a series of review questions, which are prepared to test students’ understanding of the materials, while the practice exercises are intended to afford students the opportunity to apply the concepts introduced in the section on background knowledge. This experience-oriented textbook is meant to assist students in gaining a better understanding of digital forensics through hands-on practice in collecting and preserving digital evidence by completing various exercises. With 20 student-directed, inquiry-based practice exercises, students will better understand digital forensic concepts and learn digital forensic investigation techniques. This textbook is intended for upper undergraduate and graduate-level students who are taking digital-forensic related courses or working in digital forensics research. It can also be used by digital forensics practitioners, IT security analysts, and security engineers working in the IT security industry, particular IT professionals responsible for digital investigation and incident handling or researchers working in these related fields as a reference book. .


Book
Vehicular ad hoc network security and privacy
Authors: ---
ISBN: 1119082161 1119082153 1119082145 Year: 2015 Publisher: Hoboken [New Jersey] : [Piscataqay, New Jersey] : IEEE Press/Wiley, IEEE Xplore,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Unlike any other book in this area, this book provides innovative solutions to security issues, making this book a must read for anyone working with or studying security measures. Vehicular Ad Hoc Network Security and Privacy mainly focuses on security and privacy issues related to vehicular communication systems. It begins with a comprehensive introduction to vehicular ad hoc network and its unique security threats and privacy concerns and then illustrates how to address those challenges in highly dynamic and large size wireless network environments from multiple perspectives. This book is richly illustrated with detailed designs and results for approaching security and privacy threats. Additional features of this book include: . An introduction to standardization and industry activities as well as government regulation in secure vehicular networking. Eight novel secure and privacy-preserving schemes for vehicular communications. Explorations into interdisciplinary methods by combining social science, cryptography, and privacy enhancing technique The authors have taken a non-traditional method toward securing communications, allowing for new research directions in security and privacy in VANETs, which will be helpful to students, researchers, and IT practitioners.


Book
Privacy-Enhancing Fog Computing and Its Applications
Authors: --- ---
ISBN: 3030021130 3030021122 Year: 2018 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This SpringerBrief covers the security and privacy challenges in fog computing, and proposes a new secure and privacy-preserving mechanisms to resolve these challenges for securing fog-assisted IoT applications. Chapter 1 introduces the architecture of fog-assisted IoT applications and the security and privacy challenges in fog computing. Chapter 2 reviews several promising privacy-enhancing techniques and illustrates examples on how to leverage these techniques to enhance the privacy of users in fog computing. Specifically, the authors divide the existing privacy-enhancing techniques into three categories: identity-hidden techniques, location privacy protection and data privacy enhancing techniques. The research is of great importance since security and privacy problems faced by fog computing impede the healthy development of its enabled IoT applications. With the advanced privacy-enhancing techniques, the authors propose three secure and privacy-preserving protocols for fog computing applications, including smart parking navigation, mobile crowdsensing and smart grid. Chapter 3 introduces identity privacy leakage in smart parking navigation systems, and proposes a privacy-preserving smart parking navigation system to prevent identity privacy exposure and support efficient parking guidance retrieval through road-side units (fogs) with high retrieving probability and security guarantees. Chapter 4 presents the location privacy leakage, during task allocation in mobile crowdsensing, and propose a strong privacy-preserving task allocation scheme that enables location-based task allocation and reputation-based report selection without exposing knowledge about the location and reputation for participators in mobile crowdsensing. Chapter 5 introduces the data privacy leakage in smart grid, and proposes an efficient and privacy-preserving smart metering protocol to allow collectors (fogs) to achieve real-time measurement collection with privacy-enhanced data aggregation. Finally, conclusions and future research directions are given in Chapter 6. This brief validates the significant feature extension and efficiency improvement of IoT devices without sacrificing the security and privacy of users against dishonest fog nodes. It also provides valuable insights on the security and privacy protection for fog-enabled IoT applications. Researchers and professionals who carry out research on security and privacy in wireless communication will want to purchase this SpringerBrief. Also, advanced level students, whose main research area is mobile network security will also be interested in this SpringerBrief. .


Book
Encyclopedia of Wireless Networks
Authors: --- ---
ISBN: 3319782622 3319782614 Year: 2020 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Wireless networking technologies are witnessed to become the integral part of industry, business, entertainment and daily life. Encyclopedia of Wireless Networks is expected to provide comprehensive references to key concepts of wireless networks, including research results of historical significance, areas of current interests, and growing directions in the future wireless networks. It can serve as a valuable and authoritative literature for students, researchers, engineers, and practitioners who need a quick reference to the subjects of wireless network technology and its relevant applications. Areas covered: 5G Network / Editors: Rahim Tafazolli, Rose Hu Ad hoc Network / Editor: Cheng Li Big Data for Networking / Editor: Song Guo Cellular Network, 2G/3G Network, 4G/LTE Network / Editor: Hsiao-hwa Chen Cognitive Radio Network / Editor: Ning Zhang Cooperative Communications / Editor: Kaoru Ota Cyber Physical Systems / Editor: Shiyan Hu Data Center Network / Editor: Lei Lei Delay Tolerant and Opportunistic Network / Editor: Yuanguo Bi Equalization, Synchronization and Channel Estimation / Editor: Yingying Chen Future Network Architecture / Editor: Wei Quan Game Theory in Wireless Network / Editor: Dusit Niyato Interference Characterization and Mitigation / Editor: Lin Cai Internet of Things / Editors: Xiuzhen Cheng, Wei Cheng Internet of Things and its Applications / Editor: Phone Lin Interworking Heterogeneous Wireless Network / Editor: Ping Wang Medium Access Control / Editors: Hassan Omar, Qiang Ye Millimeter-wave Communications / Editor: Ming Xiao MIMO-based Network / Editor: Prof. Wei Zhang Mobility Management and Models / Editors: Sandra Cespedes, Sangheon Pack Molecular, Biological and Multi-scale Communications / Editor: Adam Noel Network Economics and pricing / Editors: Jianwei Huang, Yuan Luo Network Forensics and surveillance, Fault Tolerance and Reliability / Editor: Hongwei Li Network Measurement and Virtualization / Editor: Yusheng Ji Quality of Service, Quality of Experience and Quality of Protection / Editors: Rui Luis Aguiar, Yu Cheng Resource Allocation and Management / Editors: Junshan Zhang, Nan Cheng Routing and Multi-cast, Router and Switch Design / Editor: Richard Yu Scaling Laws and Fundamental Limits / Editor: Ning Lu Security, Privacy and Trust / Editor: Kui Ren Short Range Communications, RFID and NFC / Editor: Zhiguo Shi Smart Grid Communications / Editor: Vincent W. S. Wong Vehicular Network / Editors: Lian Zhao, Qing Yang Video Streaming / Editor: Zhi Liu Wireless Body Area Network and e-healthcare / Editor: Honggang Wang Wireless Security / Editors: Haojin Zhu, Jian Shen Wireless Sensor Network / Editors: Jiming Chen, Ruilong Deng WLAN and OFDM / Editor: Xianbin Wang.

Keywords

Computer communication systems. --- Wireless communication systems. --- Mobile communication systems. --- Electrical engineering. --- Power electronics. --- Computer Communication Networks. --- Wireless and Mobile Communication. --- Communications Engineering, Networks. --- Power Electronics, Electrical Machines and Networks. --- Communication systems, Wireless --- Wireless data communication systems --- Wireless information networks --- Wireless telecommunication systems --- Telecommunication systems --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Electric engineering --- Engineering --- Vehicles --- Vehicular communication systems --- Radio --- Wireless communication systems --- Electronics, Power --- Electric power --- Electronics --- Distributed processing --- Communication systems --- Computer networks --- Computer networks. --- Telecommunication. --- Electric power production. --- Electrical Power Engineering. --- Electric power generation --- Electricity generation --- Power production, Electric --- Electric power systems --- Electrification --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Telecommunications --- Communication --- Information theory --- Telecommuting


Book
Security and privacy in mobile social networks
Authors: --- --- ---
ISSN: 21915768 ISBN: 1461488567 1461488575 Year: 2013 Publisher: New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book focuses on three emerging research topics in mobile social networks (MSNs): privacy-preserving profile matching (PPM) protocols, privacy-preserving cooperative data forwarding (PDF) protocols, and trustworthy service evaluation (TSE) systems. The PPM helps two users compare their personal profiles without disclosing the profiles. The PDF helps users forward data to their friends via multiple cooperative relay peers while preserving their identity and location privacy. The TSE enables users to locally share service reviews on the vendors such that users receive more valuable information about the services not only from vendors but also from their trusted social friends. The authors address both theoretic and practical aspects of these topics by introducing the system model, reviewing the related works, and presenting the solutions. Security and Privacy for Mobile Social Networks further provides the security analysis and the performance evaluation based on real-trace simulations. It also summarizes the future research directions for this rapidly growing area of research. The book will be valuable for researchers and practitioners who work with mobile social networks, communication platforms, wireless communication techniques, and internet applications. "Suitable for any type of reader as an introduction to the topic... The chapters are well motivated and presented... It is recommended for researchers." -ACM Computing Reviews, 21 July 2014.

Keywords

Computer networks. --- Computer science. --- Data protection. --- Information storage and retrieval systems. --- Telecommunication. --- Computer networks --- Computer science --- Data protection --- Information storage and retrieval systems --- Telecommunication --- Online social networks --- Mobile computing --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Telecommunications --- Security measures --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Computer-based information systems --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Informatics --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Computer communication systems. --- Computer security. --- Computers. --- Electrical engineering. --- Computer Science. --- Computer Communication Networks. --- Communications Engineering, Networks. --- Information Systems Applications (incl. Internet). --- Systems and Data Security. --- Information Systems and Communication Service. --- Science --- Communication --- Information theory --- Telecommuting --- Computer systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Distributed processing --- Information systems. --- Computer privacy --- Computer system security --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Security systems --- Hacking --- Protection --- Application software. --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Electric engineering --- Engineering --- Security measures.


Book
Testbeds and Research Infrastructures for the Development of Networks and Communities : 11th International Conference, TRIDENTCOM 2016, Hangzhou, China, June 14-15, 2016, Revised Selected Papers
Authors: --- --- --- ---
ISBN: 3319495801 3319495798 Year: 2017 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 11th International Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities, TridentCom 2016, held in Hangzhou, China, in June 2016. The 16 papers were carefully selected from 25 submissions and provide a forum about technologies of big data, cyber physical systems and computer communications. The papers cover future Internet and software defined networks, network testbed design and implementation, testbed for network applications, and QoS/QoE in networks.

Keywords

Computer science. --- Computer software --- Computer communication systems. --- Computer system failures. --- E-commerce. --- Computer Science. --- Computer Communication Networks. --- System Performance and Evaluation. --- Performance and Reliability. --- e-Commerce/e-business. --- Security. --- Reusability. --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Computer failures --- Computer malfunctions --- Computer systems --- Failure of computer systems --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Reusability of software --- Reusable code (Computer programs) --- Software reusability --- Informatics --- Failures --- Commerce --- Information superhighway --- System failures (Engineering) --- Fault-tolerant computing --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Software reengineering --- Generic programming (Computer science) --- Science --- Distributed processing --- Computer system performance. --- Operating systems (Computers). --- Data protection. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Computer operating systems --- Computers --- Disk operating systems --- Systems software --- Operating systems --- Computer networks --- Parallel processing (Electronic computers) --- Computer software—Reusability.


Book
Security and Privacy in Communication Networks : 13th International Conference, SecureComm 2017, Niagara Falls, ON, Canada, October 22–25, 2017, Proceedings
Authors: --- --- --- ---
ISBN: 3319788132 3319788124 Year: 2018 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the thoroughly refereed roceedings of the 13th International Conference on Security and Privacy in Communications Networks, SecureComm 2017, held in Niagara Falls, ON, Canada, in October 2017. The 31 revised regular papers and 15 short papers were carefully reviewed and selected from 105 submissions. The topics range from security and privacy in machine learning to differential privacy, which are currently hot research topics in cyber security research.


Book
Security and Privacy in Communication Networks : SecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22–25, 2017, Proceedings
Authors: --- --- --- ---
ISBN: 3319788167 3319788159 Year: 2018 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of two workshops held at the 13th International Conference on Security and Privacy in Communications Networks, SecureComm 2017, held in Niagara Falls, ON, Canada, in October 2017: the 5th International Workshop on Applications and Techniques in Cyber Security, ATCS 2017, and the First Workshop on Security and Privacy in the Internet Of Things, SePrIoT 2017. The 22 revised regular papers were carefully reviewed and selected from 105 submissions. The topics range from access control; language-based security; malicious software; network security; cloud security; software security; operating system security; privacy protection, database security, security models; and many more. The SePrIoT workshop targets to address novel approaches in security and privacy. The papers focuse, amongst others, on novel models, techniques, protocols, algorithms, or architectures.

Listing 1 - 8 of 8
Sort by