Narrow your search

Library

KU Leuven (7)

Odisee (7)

Thomas More Kempen (7)

Thomas More Mechelen (7)

UCLL (7)

UGent (7)

ULiège (7)

VIVES (7)

VUB (7)

KBC (6)

More...

Resource type

book (14)

digital (2)


Language

English (16)


Year
From To Submit

2019 (16)

Listing 1 - 10 of 16 << page
of 2
>>
Sort by

Book
Handbook of Big Data and IoT Security
Authors: ---
ISBN: 3030105431 3030105423 Year: 2019 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This handbook provides an overarching view of cyber security and digital forensic challenges related to big data and IoT environment, prior to reviewing existing data mining solutions and their potential application in big data context, and existing authentication and access control for IoT devices. An IoT access control scheme and an IoT forensic framework is also presented in this book, and it explains how the IoT forensic framework can be used to guide investigation of a popular cloud storage service. A distributed file system forensic approach is also presented, which is used to guide the investigation of Ceph. Minecraft, a Massively Multiplayer Online Game, and the Hadoop distributed file system environment are also forensically studied and their findings reported in this book. A forensic IoT source camera identification algorithm is introduced, which uses the camera's sensor pattern noise from the captured image. In addition to the IoT access control and forensic frameworks, this handbook covers a cyber defense triage process for nine advanced persistent threat (APT) groups targeting IoT infrastructure, namely: APT1, Molerats, Silent Chollima, Shell Crew, NetTraveler, ProjectSauron, CopyKittens, Volatile Cedar and Transparent Tribe. The characteristics of remote-controlled real-world Trojans using the Cyber Kill Chain are also examined. It introduces a method to leverage different crashes discovered from two fuzzing approaches, which can be used to enhance the effectiveness of fuzzers. Cloud computing is also often associated with IoT and big data (e.g., cloud-enabled IoT systems), and hence a survey of the cloud security literature and a survey of botnet detection approaches are presented in the book. Finally, game security solutions are studied and explained how one may circumvent such solutions. This handbook targets the security, privacy and forensics research community, and big data research community, including policy makers and government agencies, public and private organizations policy makers. Undergraduate and postgraduate students enrolled in cyber security and forensic programs will also find this handbook useful as a reference.


Digital
Handbook of Big Data and IoT Security
Authors: ---
ISBN: 9783030105433 Year: 2019 Publisher: Cham Springer International Publishing

Loading...
Export citation

Choose an application

Bookmark

Abstract

This handbook provides an overarching view of cyber security and digital forensic challenges related to big data and IoT environment, prior to reviewing existing data mining solutions and their potential application in big data context, and existing authentication and access control for IoT devices. An IoT access control scheme and an IoT forensic framework is also presented in this book, and it explains how the IoT forensic framework can be used to guide investigation of a popular cloud storage service. A distributed file system forensic approach is also presented, which is used to guide the investigation of Ceph. Minecraft, a Massively Multiplayer Online Game, and the Hadoop distributed file system environment are also forensically studied and their findings reported in this book. A forensic IoT source camera identification algorithm is introduced, which uses the camera's sensor pattern noise from the captured image. In addition to the IoT access control and forensic frameworks, this handbook covers a cyber defense triage process for nine advanced persistent threat (APT) groups targeting IoT infrastructure, namely: APT1, Molerats, Silent Chollima, Shell Crew, NetTraveler, ProjectSauron, CopyKittens, Volatile Cedar and Transparent Tribe. The characteristics of remote-controlled real-world Trojans using the Cyber Kill Chain are also examined. It introduces a method to leverage different crashes discovered from two fuzzing approaches, which can be used to enhance the effectiveness of fuzzers. Cloud computing is also often associated with IoT and big data (e.g., cloud-enabled IoT systems), and hence a survey of the cloud security literature and a survey of botnet detection approaches are presented in the book. Finally, game security solutions are studied and explained how one may circumvent such solutions. This handbook targets the security, privacy and forensics research community, and big data research community, including policy makers and government agencies, public and private organizations policy makers. Undergraduate and postgraduate students enrolled in cyber security and forensic programs will also find this handbook useful as a reference.


Book
Pervasive Systems, Algorithms and Networks : 16th International Symposium, I-SPAN 2019, Naples, Italy, September 16-20, 2019, Proceedings
Authors: --- ---
ISBN: 3030301435 3030301427 Year: 2019 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 16th International Symposium on Pervasive Systems, Algorithms and Networks, I-SPAN 2019, held in Naples, Italy, in September 2019. The 32 full papers and 8 short papers were carefully reviewed and selected from 89 submissions. The papers focus on all aspects of: big data analytics & machine learning; cyber security; cloud fog & edge computing; communication solutions; high performance computing and applications; consumer cyber security; and vehicular technology.


Book
Handbook of Big Data and IoT Security
Authors: --- ---
ISBN: 9783030105433 Year: 2019 Publisher: Cham Springer International Publishing :Imprint: Springer


Book
International Conference on Applications and Techniques in Cyber Security and Intelligence ATCI 2018 : Applications and Techniques in Cyber Security and Intelligence
Authors: --- --- --- ---
ISBN: 3319987763 3319987755 Year: 2019 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The book highlights innovative ideas, cutting-edge findings, and novel techniques, methods and applications touching on all aspects of technology and intelligence in smart city management and services. Above all, it explores developments and applications that are of practical use and value for Cyber Intelligence-related methods, which are frequently used in the context of city management and services.


Book
Advanced Multimedia and Ubiquitous Engineering : MUE/FutureTech 2018
Authors: --- --- ---
ISBN: 9811313288 981131327X Year: 2019 Publisher: Singapore : Springer Singapore : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book presents the combined proceedings of the 12th International Conference on Multimedia and Ubiquitous Engineering (MUE 2018) and the 13th International Conference on Future Information Technology (Future Tech 2018), both held in Salerno, Italy, April 23 - 25, 2018. The aim of these two meetings was to promote discussion and interaction among academics, researchers and professionals in the field of ubiquitous computing technologies. These proceedings reflect the state of the art in the development of computational methods, involving theory, algorithms, numerical simulation, error and uncertainty analysis and novel applications of new processing techniques in engineering, science, and other disciplines related to ubiquitous computing.


Book
Smart City and Informatization : 7th International Conference, iSCI 2019, Guangzhou, China, November 12–15, 2019, Proceedings
Authors: --- --- --- ---
ISBN: 9811513015 9811513007 Year: 2019 Publisher: Singapore : Springer Singapore : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 7th International Conference on Smart City and Informatization, iSCI 2019, held in Guangzhou, China, in November 2019. The volume presents 52 full papers, which were carefully reviewed and selected from 139 submissions. The papers are organized in topical sections on Internet of Things (IoT) and smart sensing; urban computing and big data; smart society informatization technologies; cloud/edge/fog computing for smart city; applications for smart city informatization; assistive engineering and information technology; cyberspace security; blockchain and applications. .

Keywords

Computer communication systems. --- Architecture, Computer. --- Computer security. --- Artificial intelligence. --- Application software. --- Computer Communication Networks. --- Computer System Implementation. --- Systems and Data Security. --- Artificial Intelligence. --- Information Systems Applications (incl. Internet). --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Architecture, Computer --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Protection --- Security measures --- Distributed processing --- Computer networks. --- Computer architecture.


Book
Security and Privacy in Communication Networks : 15th EAI International Conference, SecureComm 2019, Orlando, FL, USA, October 23–25, 2019, Proceedings, Part II
Authors: --- --- --- ---
ISBN: 3030372316 3030372308 Year: 2019 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This two-volume set LNICST 304-305 constitutes the post-conference proceedings of the 15thInternational Conference on Security and Privacy in Communication Networks, SecureComm 2019, held in Orlando, FL, USA, in October 2019. The 38 full and 18 short papers were carefully reviewed and selected from 149 submissions. The papers are organized in topical sections on blockchains, internet of things, machine learning, everything traffic security communicating covertly, let’s talk privacy, deep analysis, systematic theory, bulletproof defenses, blockchains and IoT, security and analytics, machine learning, private, better clouds, ATCS workshop.


Book
Security and Privacy in Communication Networks : 15th EAI International Conference, SecureComm 2019, Orlando, FL, USA, October 23-25, 2019, Proceedings, Part I
Authors: --- --- --- ---
ISBN: 3030372286 3030372278 Year: 2019 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This two-volume set LNICST 304-305 constitutes the post-conference proceedings of the 15thInternational Conference on Security and Privacy in Communication Networks, SecureComm 2019, held in Orlando, FL, USA, in October 2019. The 38 full and 18 short papers were carefully reviewed and selected from 149 submissions. The papers are organized in topical sections on blockchains, internet of things, machine learning, everything traffic security communicating covertly, let’s talk privacy, deep analysis, systematic theory, bulletproof defenses, blockchains and IoT, security and analytics, machine learning, private, better clouds, ATCS workshop.


Book
Advanced Multimedia and Ubiquitous Engineering
Authors: --- --- --- ---
ISBN: 9789811313288 Year: 2019 Publisher: Singapore Springer Singapore :Imprint: Springer

Listing 1 - 10 of 16 << page
of 2
>>
Sort by