Narrow your search

Library

ULiège (5)

KU Leuven (4)

Odisee (4)

Thomas More Kempen (4)

Thomas More Mechelen (4)

UCLL (4)

ULB (4)

VIVES (4)

DOAJ (2)

KBC (2)

More...

Resource type

book (3)

periodical (2)


Language

English (5)


Year
From To Submit

2020 (5)

Listing 1 - 5 of 5
Sort by

Book
Principles of cyber-physical systems : an interdisciplinary approach
Authors: ---
ISBN: 1108916651 1107588987 1108916074 9781107588981 9781107066618 Year: 2020 Publisher: Cambridge, United Kingdom : Cambridge University Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This unique introduction to the foundational concepts of cyber-physical systems (CPS) describes key design principles and emerging research trends in detail. Several interdisciplinary applications are covered, with a focus on the wide-area management of infrastructures including electric power systems, air transportation networks, and health care systems. Design, control and optimization of cyber-physical infrastructures are discussed, addressing security and privacy issues of networked CPS, presenting graph-theoretic and numerical approaches to CPS evaluation and monitoring, and providing readers with the knowledge needed to operate CPS in a reliable, efficient, and secure manner. Exercises are included. This is an ideal resource for researchers and graduate students in electrical engineering and computer science, as well as for practitioners using cyber-physical systems in aerospace and automotive engineering, medical technology, and large-scale infrastructure operations.


Book
Computer security and the Internet : tools and Jewels
Author:
ISBN: 3030336492 3030336484 9783030336493 Year: 2020 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book provides a concise yet comprehensive overview of computer and Internet security, suitable for a one-term introductory course for junior/senior undergrad or first-year graduate students. It is also suitable for self-study by anyone seeking a solid footing in security – including software developers and computing professionals, technical managers and government staff. An overriding focus is on brevity, without sacrificing breadth of core topics or technical detail within them. The aim is to enable a broad understanding in roughly 350 pages. Further prioritization is supported by designating as optional selected content within this. Fundamental academic concepts are reinforced by specifics and examples, and related to applied problems and real-world incidents. The first chapter provides a gentle overview and 20 design principles for security. The ten chapters that follow provide a framework for understanding computer and Internet security. They regularly refer back to the principles, with supporting examples. These principles are the conceptual counterparts of security-related error patterns that have been recurring in software and system designs for over 50 years. The book is “elementary” in that it assumes no background in security, but unlike “soft” high-level texts it does not avoid low-level details, instead it selectively dives into fine points for exemplary topics to concretely illustrate concepts and principles. The book is rigorous in the sense of being technically sound, but avoids both mathematical proofs and lengthy source-code examples that typically make books inaccessible to general audiences. Knowledge of elementary operating system and networking concepts is helpful, but review sections summarize the essential background. For graduate students, inline exercises and supplemental references provided in per-chapter endnotes provide a bridge to further topics and a springboard to the research literature; for those in industry and government, pointers are provided to helpful surveys and relevant standards, e.g., documents from the Internet Engineering Task Force (IETF), and the U.S. National Institute of Standards and Technology.


Periodical
IEEE open journal of the Computer Society.
Authors: ---
ISSN: 26441268 Year: 2020 Publisher: [New York, NY] : Institute of Electrical and Electronics Engineers,


Periodical
Machine learning : science and technology.
Author:
ISSN: 26322153 Year: 2020 Publisher: Bristol : IOP Publishing Ltd,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

machine learning --- artificial intelligence --- computational physics --- reinforcement learning --- neural networks --- applied algorithms --- Machine learning --- Learning, Machine --- Artificial intelligence --- Machine theory --- Informàtica. --- Processament de dades. --- Revistes electròniques. --- Revistes digitals --- Revistes en línia --- Revistes on line --- Revistes per Internet --- Publicacions electròniques --- Revistes --- Processament de dades electròniques --- Processament automàtic de dades --- Processament electrònic de dades --- Processament integrat de dades --- Sistematització de dades (Ordinadors) --- Tractament de dades --- Tractament electrònic de dades --- Tractament integrat de dades --- Automatització --- Informàtica --- Complexitat computacional --- Curació de dades --- Depuració (Informàtica) --- Estructures de dades (Informàtica) --- Gestió de bases de dades --- Informàtica mòbil --- Informàtica recreativa --- Intel·ligència artificial --- Sistemes en línia --- Temps real (Informàtica) --- Tractament del llenguatge natural (Informàtica) --- Processament òptic de dades --- Protecció de dades --- Transmissió de dades --- Tolerància als errors (Informàtica) --- Enginyeria --- Càlcul intensiu (Informàtica) --- Disseny de sistemes --- Història de la informàtica --- Geometria computacional --- Informàtica tova --- Processament de dades --- Programació (Ordinadors) --- Sistemes informàtics --- Teledocumentació --- Automatització d'arxius --- Automatització de biblioteques --- Automatització de museus --- Indústria informàtica --- Teoria de la informació --- Machine learning.


Book
Handbook of Big Data Privacy
Authors: ---
ISBN: 3030385574 3030385566 Year: 2020 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This handbook provides comprehensive knowledge and includes an overview of the current state-of-the-art of Big Data Privacy, with chapters written by international world leaders from academia and industry working in this field. The first part of this book offers a review of security challenges in critical infrastructure and offers methods that utilize acritical intelligence (AI) techniques to overcome those issues. It then focuses on big data security and privacy issues in relation to developments in the Industry 4.0. Internet of Things (IoT) devices are becoming a major source of security and privacy concern in big data platforms. Multiple solutions that leverage machine learning for addressing security and privacy issues in IoT environments are also discussed this handbook. The second part of this handbook is focused on privacy and security issues in different layers of big data systems. It discusses about methods for evaluating security and privacy of big data systems on network, application and physical layers. This handbook elaborates on existing methods to use data analytic and AI techniques at different layers of big data platforms to identify privacy and security attacks. The final part of this handbook is focused on analyzing cyber threats applicable to the big data environments. It offers an in-depth review of attacks applicable to big data platforms in smart grids, smart farming, FinTech, and health sectors. Multiple solutions are presented to detect, prevent and analyze cyber-attacks and assess the impact of malicious payloads to those environments. This handbook provides information for security and privacy experts in most areas of big data including; FinTech, Industry 4.0, Internet of Things, Smart Grids, Smart Farming and more. Experts working in big data, privacy, security, forensics, malware analysis, machine learning and data analysts will find this handbook useful as a reference. Researchers and advanced-level computer science students focused on computer systems, Internet of Things, Smart Grid, Smart Farming, Industry 4.0 and network analysts will also find this handbook useful as a reference.

Keywords

Data protection. --- Computer organization. --- Artificial intelligence. --- Computers. --- Security. --- Computer Systems Organization and Communication Networks. --- Artificial Intelligence. --- Information Systems and Communication Service. --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- AI (Artificial intelligence) --- Artificial thinking --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Organization, Computer --- Electronic digital computers --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Big data --- Security measures. --- Data sets, Large --- Large data sets --- Data sets --- Seguretat informàtica --- Dades massives --- Protecció de dades --- Intel·ligència artificial --- Ciència cognitiva --- Mètodes de simulació --- Processament de dades --- Sistemes autoorganitzatius --- Aprenentatge automàtic --- Demostració automàtica de teoremes --- Intel·ligència artificial distribuïda --- Intel·ligència computacional --- Sistemes adaptatius --- Tractament del llenguatge natural (Informàtica) --- Raonament qualitatiu --- Representació del coneixement (Teoria de la informació) --- Sistemes de pregunta i resposta --- Traducció automàtica --- Visió per ordinador --- Xarxes neuronals (Informàtica) --- Xarxes semàntiques (Teoria de la informació) --- Agents intel·ligents (Programes d'ordinador) --- Programació per restriccions --- Vida artificial --- Protecció de dades personals --- Protecció de la informació (Informàtica) --- Regulació de dades --- Xifratge (Informàtica) --- Delegats de protecció de dades --- Dret a l'oblit --- Identitat digital --- Macrodades --- Bases de dades --- Informàtica (Seguretat) --- Mesures de seguretat (Informàtica) --- Seguretat (Informàtica) --- Seguretat dels sistemes informàtics --- Sistemes de seguretat --- Control d'accés als ordinadors --- Seguretat de les xarxes d'ordinadors --- Pirates informàtics --- Intel·ligència artificial.

Listing 1 - 5 of 5
Sort by