Narrow your search

Library

KU Leuven (6)

AP (2)

KDG (2)

Odisee (2)

Thomas More Kempen (2)

Thomas More Mechelen (2)

UCLL (2)

ULB (2)

ULiège (2)

VIVES (2)

More...

Resource type

book (8)

digital (2)


Language

English (10)


Year
From To Submit

2022 (2)

2021 (2)

2020 (1)

2019 (3)

2013 (2)

Listing 1 - 10 of 10
Sort by

Book
Detection of Intrusions and Malware, and Vulnerability Assessment : 19th International Conference, DIMVA 2022, Cagliari, Italy, June 29 –July 1, 2022, Proceedings
Author:
ISBN: 3031094840 3031094832 Year: 2022 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the proceedings of the 19th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2022, held in Cagliari, Italy, in June – July 2021. The 10 full papers and 1 short paper presented in this volume were carefully reviewed and selected from 39 submissions. .


Book
Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems : 7th IFIP WG 11.2 International Workshop, WIST 2013, Heraklion, Greece, May 28-30, 2013, Proceedings
Authors: ---
ISBN: 364238529X 3642385303 Year: 2013 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This volume constitutes the refereed proceedings of the 7th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Mobile Devices in Wireless Communication, WISTP 2013, held in Heraklion, Crete, Greece, in May 2013. The 9 revised full papers presented together with  two keynote speeches were carefully reviewed and selected from 19 submissions. The scope of the workshop spans the theoretical aspects of cryptography and cryptanalysis, mobile security, smart cards and embedded devices.

Keywords

Computer science. --- Computer Communication Networks. --- Software engineering. --- Computer network architectures. --- Data protection. --- Data encryption (Computer science). --- Computer Science. --- Systems and Data Security. --- Data Encryption. --- Computer System Implementation. --- Special Purpose and Application-Based Systems. --- Computer Science, general. --- Engineering & Applied Sciences --- Computer Science --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Architectures, Computer network --- Network architectures, Computer --- Computer software engineering --- Informatics --- Computer communication systems. --- Special purpose computers. --- Architecture, Computer. --- Computer security. --- Computer security --- Ubiquitous computing --- Cryptology. --- Science --- Engineering --- Computer architecture --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Special purpose computers --- Architecture, Computer --- Distributed processing


Digital
Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems : 7th IFIP WG 11.2 International Workshop, WISTP 2013, Heraklion, Greece, May 28-30, 2013. Proceedings
Authors: ---
ISBN: 9783642385308 Year: 2013 Publisher: Berlin, Heidelberg Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract

This volume constitutes the refereed proceedings of the 7th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Mobile Devices in Wireless Communication, WISTP 2013, held in Heraklion, Crete, Greece, in May 2013. The 9 revised full papers presented together with  two keynote speeches were carefully reviewed and selected from 19 submissions. The scope of the workshop spans the theoretical aspects of cryptography and cryptanalysis, mobile security, smart cards and embedded devices.


Book
Proceedings of the 13th European workshop on Systems Security
Authors: ---
Year: 2020 Publisher: New York, NY : Association for Computing Machinery,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Each year, the workshop brings together researchers, practitioners, system administrators, system programmers, and others interested in the latest advances in the security of computer systems and networks. Over time, EuroSec has established itself as a forum for presenting and discussing novel ideas with the community, before they are further developed into full papers.

Keywords

Security systems


Book
CPS-SPC'19 : proceedings of the ACM Workshop on Cyber-Physical Systems Security & Privacy : November 11, 2019, London, United Kingdom
Authors: ---
Year: 2019 Publisher: New York, New York : Association for Computing Machinery,

Loading...
Export citation

Choose an application

Bookmark

Abstract

It is our great pleasure to welcome you to the Fifth ACM Workshop on Cyber-Physical Systems Security and PrivaCy (CPS-SPC) in conjunction with the 26th ACM Conference on Computer and Communications Security (CCS) in London, United Kingdom. Our increased dependency on cyber-physical systems (CPS) has amplified concerns of cyber attacks on these systems. These transformative attack methods require additional research into secure control systems and related architectures of CPS. The majority of the published literature addressing the security and privacy of CPS reflect a field that is still developing. As such, the overall principles, models, and theories for securing CPS have not yet emerged. The CPS-SPC workshop series provides a focal point for the research community to begin addressing the security and privacy of CPS in a comprehensive and interdisciplinary manner and, in tandem with other efforts, build a comprehensive research roadmap. As a workshop, we expect to attract papers that reflect new research directions in CPS security and privacy as well as early results based on "works in progress". This year's workshop builds on the foundation laid last year to become one of the premier forums for presentation of interdisciplinary research results and experience reports at the interface of control theory, information security, embedded and real-time systems and human factors applied to CPS. The mission of the workshop is to create a community of researchers focusing on diverse aspects of CPS Security and Privacy, and to provide researchers and practitioners a premier forum to share their perspectives with others interested in interdisciplinary approaches to solve the challenging security and privacy problems in CPS.


Book
Proceedings of the 18th ACM Workshop on Privacy in the Electronic Society
Authors: --- ---
Year: 2019 Publisher: New York : Association for Computing Machinery,

Loading...
Export citation

Choose an application

Bookmark

Abstract

These proceedings contain the papers selected for inclusion in the program for the eighteenth ACM Workshop on Privacy in the Electronic Society (WPES 2019), held in conjunction with the 26th ACM Conference on Computer and Communications Security (CCS 2019) on November 11, 2019 in London, United Kingdom. In response to the workshop's call for papers, 67 submissions were received. These papers were evaluated by a Program Committee comprised of 58 researchers whose backgrounds include a diverse array of topics related to privacy. As a rule, each paper was reviewed by three members of the Program Committee, with an average of 2.9 reviews per paper. Each paper was assessed in terms of importance, novelty, technical quality, and potential to stimulate discussion at the workshop. After a period of online discussion, the Program Committee selected 14 full papers and 5 short papers for presentation at WPES, leading to a full paper acceptance rate of 21% and an overall acceptance rate of 28%.


Digital
Detection of Intrusions and Malware, and Vulnerability Assessment : 18th International Conference, DIMVA 2021, Virtual Event, July 14-16, 2021, Proceedings
Authors: --- --- ---
ISBN: 9783030808259 9783030808266 9783030808242 Year: 2021 Publisher: Cham Springer International Publishing

Loading...
Export citation

Choose an application

Bookmark

Abstract

Chapter "SPECULARIZER: Detecting Speculative Execution Attacks via Performance Tracing" is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.


Book
Detection of Intrusions and Malware, and Vulnerability Assessment
Authors: --- --- --- ---
ISBN: 9783030808259 9783030808266 9783030808242 Year: 2021 Publisher: Cham Springer International Publishing :Imprint: Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Detection of Intrusions and Malware, and Vulnerability Assessment
Authors: --- --- --- ---
ISBN: 9783031094842 Year: 2022 Publisher: Cham Springer International Publishing :Imprint: Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords


Book
Proceedings of the 12th ACM Workshop on Artificial Intelligence and Security
Authors: --- --- --- --- --- et al.
Year: 2019 Publisher: New York, NY : Association for Computing Machinery,

Loading...
Export citation

Choose an application

Bookmark

Abstract

It is our pleasure to welcome you to the 12th ACM Workshop on Artificial Intelligence and Security - AISec 2019. AISec, having been annually co-located with CCS for 12 consecutive years, is the premier meeting place for researchers interested in the intersection of security, privacy, AI, and machine learning. Its role as a venue has been to merge practical security problems with advances in AI and machine learning. In doing so, researchers also have been developing theory and analytics unique to this domain and have explored diverse topics such as learning in game-theoretic adversarial environments, privacy-preserving learning, and applications to malware, spam and intrusion detection. AISec 2019 received 40 submissions, of which 10 (25%) were selected for publication and presentation as full papers. Submissions arrived from researchers in many different countries, from a wide variety of institutions both academic and corporate.

Listing 1 - 10 of 10
Sort by