Narrow your search

Library

VIVES (140)

Thomas More Kempen (138)

Thomas More Mechelen (138)

UCLL (138)

Odisee (137)

KU Leuven (135)

ULB (135)

ULiège (133)

LUCA School of Arts (23)

Vlerick Business School (11)

More...

Resource type

book (127)

periodical (13)


Language

English (137)

French (2)

Chinese (1)


Year
From To Submit

2018 (1)

2015 (3)

2014 (1)

2012 (1)

2011 (1)

More...
Listing 1 - 10 of 140 << page
of 14
>>
Sort by

Periodical
网络与信息安全学报/#/网络与信息安全学报 [[Wang Luo Yu Xin Xi An Quan Xue Bao]]
Author:
Year: 2015 Publisher: Beijing : Beijing xin tong chuan mei you xian ze ren gong si,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Periodical
Infosecurity.
ISSN: 1878741X Year: 2007 Publisher: [New York, N.Y.] : Elsevier Science,


Periodical
International journal of information security.
ISSN: 16155262 16155270 Year: 2001 Publisher: Berlin : Springer-Verlag,

Computers at risk : safe computing in the information age
Author:
ISBN: 0309043883 9786610212125 1280212128 0309574609 0585020094 9780585020099 0309074819 9780309074810 9780309043885 9781280212123 6610212120 9780309574600 Year: 1991 Publisher: Washington, D.C. : National Academy Press,

Security and privacy in dynamic environments : proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22-24 May 2006, Karlstad, Sweden
Authors: ---
ISBN: 9780387334059 038733405X 9786610624027 1280624027 0387334068 Year: 2006 Publisher: New York, New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

International Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of referred international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing. For more information about the 300 other books in the IFIP series, please visit www.springeronline.com. For more information about IFIP, please visit www.ifip.org.


Periodical
Journal of computer security.
ISSN: 18758924 0926227X Year: 1992 Publisher: Netherlands : IOS Press


Book
La sécurité informatique
Authors: ---
ISBN: 2213666377 2821814801 272260146X Year: 2011 Publisher: Collège de France

Loading...
Export citation

Choose an application

Bookmark

Abstract

Leçon inaugurale prononcée le 10 mars 2011 Chaire dInformatique et sciences numériques Aujourdhui, les questions de sécurité informatique sont omniprésentes, non seulement dans le renseignement militaire mais également dans la finance, le commerce, la gestion de données médicales, les réseaux sociaux et bien dautres cadres. À partir dun exemple de la vie courante, le spam, Martin Abadi aborde des aspects variés de linformatique tels que les protocoles cryptographiques, les modèles de ca--

Recent Advances in Intrusion Detection : 8th International Symposium, RAID 2005, Seattle, WA, USA, September 7-9, 2005, Revised Papers
Authors: --- ---
ISSN: 03029743 ISBN: 9783540317784 3540317783 3540317791 Year: 2006 Volume: 3858 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

On behalf of the Program Committee, it is our pleasure to present the proceedings of the 8th Symposium on Recent Advances in Intrusion Detection (RAID 2005), which took place in Seattle, Washington, USA, September 7-9, 2005. The symposium brought together leading researchers and practitioners from academia, government and industry to discuss intrusion detection from research as well as commercial prospectives. We also encouraged discussions that addressed issues that arise when studying intrusion detection, including monitoring, performance and validation, from a wider perspective. We had sessions on the detection and containment of Internet worm attacks, anomaly detection, automated response to intrusions, host-based intrusion detection using system calls, network intrusion detection, and intrusion detection, in mobile wireless networks. The RAID 2005 Program Committee received 83 paper submissions from all over the world. All submissions were carefully reviewed by several members of Program Committee and selection was made on the basis of scientific novelty, importance to the field, and technical quality. Final selection took place at a Program Committee meeting held on May 11 and 12 in Oakland, California. Fifteen papers and two practical experience reports were selected for presentation and publication in the conference proceedings. The keynote address was given by Phil Attfield of the Northwest Security Institute.

Keywords

Computer security --- Computers --- Sécurité informatique --- Ordinateurs --- Congresses. --- Access control --- Congrès --- Accès --- Contrôle --- Computer Science --- Engineering & Applied Sciences --- Computer science. --- Computer communication systems. --- Operating systems (Computers). --- Data encryption (Computer science). --- Computers and civilization. --- Management information systems. --- Computer Science. --- Management of Computing and Information Systems. --- Computer Communication Networks. --- Operating Systems. --- Data Encryption. --- Computers and Society. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Civilization and computers --- Civilization --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer operating systems --- Disk operating systems --- Systems software --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Communication systems --- Operating systems --- Distributed processing --- Information Systems. --- Cryptology. --- Sécurité informatique - Congrès --- Ordinateurs - Accès - Contrôle - Congrès

Listing 1 - 10 of 140 << page
of 14
>>
Sort by