Narrow your search

Library

KU Leuven (4)

Odisee (4)

Thomas More Kempen (4)

Thomas More Mechelen (4)

ULB (4)

ULiège (4)

VIVES (4)

AP (3)

KDG (3)

UCLL (3)

More...

Resource type

book (6)

digital (3)


Language

English (8)


Year
From To Submit

2024 (1)

2018 (2)

2014 (2)

2008 (3)

Listing 1 - 8 of 8
Sort by

Book
Association Analysis Techniques and Applications in Bioinformatics
Author:
ISBN: 9789819982516 Year: 2024 Publisher: Singapore : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Secure transaction protocol analysis : models and applications
Authors: --- ---
ISBN: 3540850740 3540850732 Year: 2008 Publisher: Berlin, Heidelberg : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The present volume arose from the need for a comprehensive coverage of the state of the art in security protocol analysis. It aims to serve as an overall course-aid and to provide self-study material for researchers and students in formal methods theory and applications in e-commerce, data analysis and data mining. The volume will also be useful to anyone interested in secure e-commerce. The book is organized in eight chapters covering the main approaches and tools in formal methods for security protocol analysis. It starts with an introductory chapter presenting the fundamentals and background knowledge with respect to formal methods and security protocol analysis. Chapter 2 provides an overview of related work in this area, including basic concepts and terminology. Chapters 3 and 4 show a logical framework and a model checker for analyzing secure transaction protocols. Chapter 5 explains how to deal with uncertainty issues in secure messages, including inconsistent messages and conflicting beliefs in messages. Chapter 6 integrates data mining with security protocol analysis, and Chapter 7 develops a new technique for detecting collusion attack in security protocols. Chapter 8 gives a summary of the chapters and presents a brief discussion of some emerging issues in the field.

Keywords

Computer networks --- Electronic commerce --- Computer network protocols. --- Security measures. --- Protocols, Computer network --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Information Technology --- Computer Science (Hardware & Networks) --- Computer Communication Networks. --- Software engineering. --- Operating systems (Computers). --- Data mining. --- Information storage and retrieva. --- Software Engineering/Programming and Operating Systems. --- Operating Systems. --- Software Engineering. --- Data Mining and Knowledge Discovery. --- Information Storage and Retrieval. --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Database searching --- Computer operating systems --- Computers --- Disk operating systems --- Systems software --- Computer software engineering --- Engineering --- Operating systems --- Information storage and retrieval systems. --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Computer-based information systems --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Computer systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval --- Computer communication systems. --- Information storage and retrieval. --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Distributed processing


Book
Intelligent Strategies for Pathway Mining : Model and Pattern Identification
Authors: --- ---
ISBN: 3319041711 331904172X Year: 2014 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book is organized into thirteen chapters that range over the relevant approaches and tools in data integration, modeling, analysis and knowledge discovery for signaling pathways. Having in mind that the book is also addressed for students, the contributors present the main results and techniques in an easily accessed and understood way together with many references and instances. Chapter 1 presents an introduction to signaling pathway, including motivations, background knowledge and relevant data mining techniques for pathway data analysis. Chapter 2 presents a variety of data sources and data analysis with respect to signaling pathway, including data integration and relevant data mining applications. Chapter 3 presents a framework to measure the inconsistency between heterogenous biological databases. A GO-based (genome ontology) strategy is proposed to associate different data sources. Chapter 4 presents identification of positive regulation of kinase pathways in terms of association rule mining. The results derived from this project could be used when predicting essential relationships and enable a comprehensive understanding of kinase pathway interaction. Chapter 5 presents graphical model-based methods to identify regulatory network of protein kinases. A framework using negative association rule mining is introduced in Chapter 6 to discover featured inhibitory regulation patterns and the relationships between involved regulation factors. It is necessary to not only detect the objects that exhibit a positive regulatory role in a kinase pathway but also to discover those objects that inhibit the regulation. Chapter 7 presents methods to model ncRNA secondary structure data in terms of stems, loops and marked labels, and illustrates how to find matched structure patterns for a given query. Chapter 8 shows an interval-based distance metric for computing the distance between conserved RNA secondary structures. Chapter 9 presents a framework to explore structural and functional patterns of RNA pseudoknot structure according to probability matrix. Chapter 10 presents methods to model miRNA data and identify miRNA interaction of cross-species and within-species. Chapter 11 presents an approach to measure the importance of miRNA site and the adjacent base by using information redundancy and develops a novel measure to identify strongly correlated infrequent itemsets. The discover association rules not only present important structural features in miRNAs, but also promote a comprehensive understanding of regulatory roles of miRNAs. Chapter 12 presents bioinformatics techniques for protein kinase data management and analysis, kinase pathways and drug targets, and describes their potential application in pharmaceutical industry. Chapter 13 presents a summary of the chapters and give a brief discussion to some emerging issues.

Keywords

Computer science. --- Computer software. --- Database management. --- Information storage and retrieval systems. --- Artificial intelligence. --- Computer Science. --- Artificial Intelligence (incl. Robotics). --- Database Management. --- Algorithm Analysis and Problem Complexity. --- Information Systems Applications (incl. Internet). --- Information Storage and Retrieval. --- Computation by Abstract Devices. --- Mechanical Engineering --- Engineering & Applied Sciences --- Computer Science --- Mechanical Engineering - General --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Computer-based information systems --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Data base management --- Data services (Database management) --- Database management services --- DBMS (Computer science) --- Generalized data management systems --- Services, Database management --- Systems, Database management --- Systems, Generalized database management --- Software, Computer --- Informatics --- Computers. --- Algorithms. --- Information storage and retrieval. --- Bioinformatics. --- Computational biology. --- Data mining. --- Biology --- Bioinformatics --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Database searching --- Bio-informatics --- Biological informatics --- Information science --- Computational biology --- Systems biology --- Data processing --- Information storage and retrieva. --- Artificial Intelligence. --- Science --- Computer systems --- Electronic data processing --- Bionics --- Cognitive science --- Digital computer simulation --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Application software. --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Cybernetics --- Calculators --- Cyberspace --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Algorism --- Algebra --- Arithmetic --- Foundations


Digital
Intelligent Strategies for Pathway Mining : Model and Pattern Identification
Authors: --- ---
ISBN: 9783319041728 Year: 2014 Publisher: Cham Springer International Publishing

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book is organized into thirteen chapters that range over the relevant approaches and tools in data integration, modeling, analysis and knowledge discovery for signaling pathways. Having in mind that the book is also addressed for students, the contributors present the main results and techniques in an easily accessed and understood way together with many references and instances. Chapter 1 presents an introduction to signaling pathway, including motivations, background knowledge and relevant data mining techniques for pathway data analysis. Chapter 2 presents a variety of data sources and data analysis with respect to signaling pathway, including data integration and relevant data mining applications. Chapter 3 presents a framework to measure the inconsistency between heterogenous biological databases. A GO-based (genome ontology) strategy is proposed to associate different data sources. Chapter 4 presents identification of positive regulation of kinase pathways in terms of association rule mining. The results derived from this project could be used when predicting essential relationships and enable a comprehensive understanding of kinase pathway interaction. Chapter 5 presents graphical model-based methods to identify regulatory network of protein kinases. A framework using negative association rule mining is introduced in Chapter 6 to discover featured inhibitory regulation patterns and the relationships between involved regulation factors. It is necessary to not only detect the objects that exhibit a positive regulatory role in a kinase pathway but also to discover those objects that inhibit the regulation. Chapter 7 presents methods to model ncRNA secondary structure data in terms of stems, loops and marked labels, and illustrates how to find matched structure patterns for a given query. Chapter 8 shows an interval-based distance metric for computing the distance between conserved RNA secondary structures. Chapter 9 presents a framework to explore structural and functional patterns of RNA pseudoknot structure according to probability matrix. Chapter 10 presents methods to model miRNA data and identify miRNA interaction of cross-species and within-species. Chapter 11 presents an approach to measure the importance of miRNA site and the adjacent base by using information redundancy and develops a novel measure to identify strongly correlated infrequent itemsets. The discover association rules not only present important structural features in miRNAs, but also promote a comprehensive understanding of regulatory roles of miRNAs. Chapter 12 presents bioinformatics techniques for protein kinase data management and analysis, kinase pathways and drug targets, and describes their potential application in pharmaceutical industry. Chapter 13 presents a summary of the chapters and give a brief discussion to some emerging issues.


Book
Secure Transaction Protocol Analysis : Models and Applications
Authors: --- --- ---
ISBN: 9783540850748 Year: 2008 Publisher: Berlin Heidelberg Springer Berlin Heidelberg

Loading...
Export citation

Choose an application

Bookmark

Abstract

The present volume arose from the need for a comprehensive coverage of the state of the art in security protocol analysis. It aims to serve as an overall course-aid and to provide self-study material for researchers and students in formal methods theory and applications in e-commerce, data analysis and data mining. The volume will also be useful to anyone interested in secure e-commerce. The book is organized in eight chapters covering the main approaches and tools in formal methods for security protocol analysis. It starts with an introductory chapter presenting the fundamentals and background knowledge with respect to formal methods and security protocol analysis. Chapter 2 provides an overview of related work in this area, including basic concepts and terminology. Chapters 3 and 4 show a logical framework and a model checker for analyzing secure transaction protocols. Chapter 5 explains how to deal with uncertainty issues in secure messages, including inconsistent messages and conflicting beliefs in messages. Chapter 6 integrates data mining with security protocol analysis, and Chapter 7 develops a new technique for detecting collusion attack in security protocols. Chapter 8 gives a summary of the chapters and presents a brief discussion of some emerging issues in the field.


Book
Applications and Techniques in Information Security : 9th International Conference, ATIS 2018, Nanning, China, November 9–11, 2018, Proceedings
Authors: --- --- --- --- --- et al.
ISBN: 9811329079 9811329060 Year: 2018 Publisher: Singapore : Springer Singapore : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 9th International Conference on Applications and Techniques in Information Security, ATIS 2018, held in Nanning, China, in November 2018. The 19 full papers were carefully reviewed and selected from 59 submissions. The papers are organized in the following topical sections: information security, information abuse prevention, security implementations, knowledge discovery, and applications.


Digital
Applications and Techniques in Information Security : 9th International Conference, ATIS 2018, Nanning, China, November 9–11, 2018, Proceedings
Authors: --- --- --- --- --- et al.
ISBN: 9789811329074 Year: 2018 Publisher: Singapore Springer Singapore, Imprint: Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 9th International Conference on Applications and Techniques in Information Security, ATIS 2018, held in Nanning, China, in November 2018. The 19 full papers were carefully reviewed and selected from 59 submissions. The papers are organized in the following topical sections: information security, information abuse prevention, security implementations, knowledge discovery, and applications.

Listing 1 - 8 of 8
Sort by