Narrow your search

Library

VUB (41)

KU Leuven (40)

Odisee (36)

Thomas More Kempen (36)

Thomas More Mechelen (36)

VIVES (36)

UGent (35)

UCLL (30)

ULiège (29)

AP (24)

More...

Resource type

book (80)

digital (26)


Language

English (92)


Year
From To Submit

2024 (1)

2023 (3)

2022 (13)

2021 (11)

2020 (29)

More...
Listing 1 - 10 of 92 << page
of 10
>>
Sort by

Book
Secure key establishment
Author:
ISBN: 0387879684 1441946896 9786611861308 1281861308 0387879692 Year: 2009 Publisher: New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Research on Secure Key Establishment has become very active within the last few years. Secure Key Establishment discusses the problems encountered in this field. This book also introduces several improved protocols with new proofs of security. Secure Key Establishment identifies several variants of the key sharing requirement. Several variants of the widely accepted Bellare and Rogaway (1993) model are covered. A comparative study of the relative strengths of security notions between these variants of the Bellare–Rogaway model and the Canetti–Krawczyk model is included. An integrative framework is proposed that allows protocols to be analyzed in a modified version of the Bellare–Rogaway model using the automated model checker tool. Secure Key Establishment is designed for advanced level students in computer science and mathematics, as a secondary text or reference book. This book is also suitable for practitioners and researchers working for defense agencies or security companies.

Keywords

Computer network protocols. --- Computer networks -- Security measures. --- Data protection. --- Public key infrastructure (Computer security). --- Computer networks --- Computer network protocols --- Public key infrastructure (Computer security) --- Telecommunications --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Security measures --- Security measures. --- Protocols, Computer network --- Infrastructure, Public key (Computer security) --- PKI (Computer security) --- Trust hierarchy (Computer security) --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer science. --- Computer communication systems. --- Computer security. --- Data structures (Computer science). --- Data encryption (Computer science). --- Coding theory. --- Computer Science. --- Data Encryption. --- Data Structures, Cryptology and Information Theory. --- Systems and Data Security. --- Computer Communication Networks. --- Coding and Information Theory. --- Computer security --- Data structures (Computer scienc. --- Cryptology. --- Data Structures and Information Theory. --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Protection --- Information theory. --- Communication theory --- Communication --- Cybernetics --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- File organization (Computer science) --- Abstract data types (Computer science) --- Distributed processing


Book
National Cyber Summit (NCS) research track 2020
Author:
ISBN: 3030587037 3030587029 Year: 2020 Publisher: Cham, Switzerland : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book presents findings from the papers accepted at the Cyber Security Education Stream and Cyber Security Technology Stream of The National Cyber Summit’s Research Track, reporting on the latest advances on topics ranging from software security to cyber attack detection and modelling to the use of machine learning in cyber security to legislation and policy to surveying of small businesses to cyber competition, and so on. Understanding the latest capabilities in cyber security ensures that users and organizations are best prepared for potential negative events. This book is of interest to cyber security researchers, educators, and practitioners, as well as students seeking to learn about cyber security.


Book
National Cyber Summit (NCS) Research Track 2021
Author:
ISBN: 3030846148 303084613X Year: 2022 Publisher: Cham, Switzerland : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Contemporary digital forensic investigations of cloud and mobile applications
Authors: ---
ISBN: 0128054484 0128053038 9780128054482 9780128053034 Year: 2017 Publisher: Cambridge, MA

Loading...
Export citation

Choose an application

Bookmark

Abstract

Contemporary Digital Forensic Investigations of Cloud and Mobile Applications comprehensively discusses the implications of cloud (storage) services and mobile applications on digital forensic investigations. The book provides both digital forensic practitioners and researchers with an up-to-date and advanced knowledge of collecting and preserving electronic evidence from different types of cloud services, such as digital remnants of cloud applications accessed through mobile devices. This is the first book that covers the investigation of a wide range of cloud services. Dr. Kim-Kwang Raymond Choo and Dr. Ali Dehghantanha are leading researchers in cloud and mobile security and forensics, having organized research, led research, and been published widely in the field. Users will gain a deep overview of seminal research in the field while also identifying prospective future research topics and open challenges. Presents the most current, leading edge research on cloud and mobile application forensics, featuring a panel of top experts in the field Introduces the first book to provide an in-depth overview of the issues surrounding digital forensic investigations in cloud and associated mobile apps Covers key technical topics and provides readers with a complete understanding of the most current research findings Includes discussions on future research directions and challenges


Book
Big Digital Forensic Data : Volume 1: Data Reduction Framework and Selective Imaging
Authors: ---
ISBN: 9811077630 9811077622 Year: 2018 Publisher: Singapore : Springer Singapore : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book provides an in-depth understanding of big data challenges to digital forensic investigations, also known as big digital forensic data. It also develops the basis of using data mining in big forensic data analysis, including data reduction, knowledge management, intelligence, and data mining principles to achieve faster analysis in digital forensic investigations. By collecting and assembling a corpus of test data from a range of devices in the real world, it outlines a process of big data reduction, and evidence and intelligence extraction methods. Further, it includes the experimental results on vast volumes of real digital forensic data. The book is a valuable resource for digital forensic practitioners, researchers in big data, cyber threat hunting and intelligence, data mining and other related areas.

Keywords

Computer crimes --- Big data. --- Investigation. --- Computer science. --- Forensic science. --- Computer security. --- Application software. --- Computers. --- Law and legislation. --- Computer Science. --- Systems and Data Security. --- Information Systems Applications (incl. Internet). --- Forensic Science. --- Legal Aspects of Computing. --- Computer Appl. in Social and Behavioral Sciences. --- Data sets, Large --- Large data sets --- Computer forensics --- Cyber forensics --- Cyberforensics --- Internet forensics --- Criminal investigation --- Data sets --- Forensic medicine. --- Computers --- Social sciences --- Data processing. --- Forensic medicine --- Injuries (Law) --- Jurisprudence, Medical --- Legal medicine --- Forensic sciences --- Medicine --- Medical laws and legislation --- Computer privacy --- Computer system security --- Computer systems --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Cyberspace --- Protection --- Security measures --- Law and legislation --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Cybernetics --- Machine theory --- Calculators --- Criminalistics --- Forensic science --- Science --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software


Book
Handbook of Big Data and IoT Security
Authors: ---
ISBN: 3030105431 3030105423 Year: 2019 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This handbook provides an overarching view of cyber security and digital forensic challenges related to big data and IoT environment, prior to reviewing existing data mining solutions and their potential application in big data context, and existing authentication and access control for IoT devices. An IoT access control scheme and an IoT forensic framework is also presented in this book, and it explains how the IoT forensic framework can be used to guide investigation of a popular cloud storage service. A distributed file system forensic approach is also presented, which is used to guide the investigation of Ceph. Minecraft, a Massively Multiplayer Online Game, and the Hadoop distributed file system environment are also forensically studied and their findings reported in this book. A forensic IoT source camera identification algorithm is introduced, which uses the camera's sensor pattern noise from the captured image. In addition to the IoT access control and forensic frameworks, this handbook covers a cyber defense triage process for nine advanced persistent threat (APT) groups targeting IoT infrastructure, namely: APT1, Molerats, Silent Chollima, Shell Crew, NetTraveler, ProjectSauron, CopyKittens, Volatile Cedar and Transparent Tribe. The characteristics of remote-controlled real-world Trojans using the Cyber Kill Chain are also examined. It introduces a method to leverage different crashes discovered from two fuzzing approaches, which can be used to enhance the effectiveness of fuzzers. Cloud computing is also often associated with IoT and big data (e.g., cloud-enabled IoT systems), and hence a survey of the cloud security literature and a survey of botnet detection approaches are presented in the book. Finally, game security solutions are studied and explained how one may circumvent such solutions. This handbook targets the security, privacy and forensics research community, and big data research community, including policy makers and government agencies, public and private organizations policy makers. Undergraduate and postgraduate students enrolled in cyber security and forensic programs will also find this handbook useful as a reference.


Book
Digital Forensic Education : An Experiential Learning Approach
Authors: ---
ISBN: 3030235467 3030235475 Year: 2020 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

In this book, the editors explain how students enrolled in two digital forensic courses at their institution are exposed to experiential learning opportunities, where the students acquire the knowledge and skills of the subject-matter while also learning how to adapt to the ever-changing digital forensic landscape. Their findings (e.g., forensic examination of different IoT devices) are also presented in the book. Digital forensics is a topic of increasing importance as our society becomes “smarter” with more of the “things” around us been internet- and inter-connected (e.g., Internet of Things (IoT) and smart home devices); thus, the increasing likelihood that we will need to acquire data from these things in a forensically sound manner. This book is of interest to both digital forensic educators and digital forensic practitioners, as well as students seeking to learn about digital forensics.


Book
Handbook of Big Data Privacy
Authors: ---
ISBN: 3030385574 3030385566 Year: 2020 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This handbook provides comprehensive knowledge and includes an overview of the current state-of-the-art of Big Data Privacy, with chapters written by international world leaders from academia and industry working in this field. The first part of this book offers a review of security challenges in critical infrastructure and offers methods that utilize acritical intelligence (AI) techniques to overcome those issues. It then focuses on big data security and privacy issues in relation to developments in the Industry 4.0. Internet of Things (IoT) devices are becoming a major source of security and privacy concern in big data platforms. Multiple solutions that leverage machine learning for addressing security and privacy issues in IoT environments are also discussed this handbook. The second part of this handbook is focused on privacy and security issues in different layers of big data systems. It discusses about methods for evaluating security and privacy of big data systems on network, application and physical layers. This handbook elaborates on existing methods to use data analytic and AI techniques at different layers of big data platforms to identify privacy and security attacks. The final part of this handbook is focused on analyzing cyber threats applicable to the big data environments. It offers an in-depth review of attacks applicable to big data platforms in smart grids, smart farming, FinTech, and health sectors. Multiple solutions are presented to detect, prevent and analyze cyber-attacks and assess the impact of malicious payloads to those environments. This handbook provides information for security and privacy experts in most areas of big data including; FinTech, Industry 4.0, Internet of Things, Smart Grids, Smart Farming and more. Experts working in big data, privacy, security, forensics, malware analysis, machine learning and data analysts will find this handbook useful as a reference. Researchers and advanced-level computer science students focused on computer systems, Internet of Things, Smart Grid, Smart Farming, Industry 4.0 and network analysts will also find this handbook useful as a reference.

Keywords

Data protection. --- Computer organization. --- Artificial intelligence. --- Computers. --- Security. --- Computer Systems Organization and Communication Networks. --- Artificial Intelligence. --- Information Systems and Communication Service. --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- AI (Artificial intelligence) --- Artificial thinking --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Organization, Computer --- Electronic digital computers --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Big data --- Security measures. --- Data sets, Large --- Large data sets --- Data sets --- Seguretat informàtica --- Dades massives --- Protecció de dades --- Intel·ligència artificial --- Ciència cognitiva --- Mètodes de simulació --- Processament de dades --- Sistemes autoorganitzatius --- Aprenentatge automàtic --- Demostració automàtica de teoremes --- Intel·ligència artificial distribuïda --- Intel·ligència computacional --- Sistemes adaptatius --- Tractament del llenguatge natural (Informàtica) --- Raonament qualitatiu --- Representació del coneixement (Teoria de la informació) --- Sistemes de pregunta i resposta --- Traducció automàtica --- Visió per ordinador --- Xarxes neuronals (Informàtica) --- Xarxes semàntiques (Teoria de la informació) --- Agents intel·ligents (Programes d'ordinador) --- Programació per restriccions --- Vida artificial --- Protecció de dades personals --- Protecció de la informació (Informàtica) --- Regulació de dades --- Xifratge (Informàtica) --- Delegats de protecció de dades --- Dret a l'oblit --- Identitat digital --- Macrodades --- Bases de dades --- Informàtica (Seguretat) --- Mesures de seguretat (Informàtica) --- Seguretat (Informàtica) --- Seguretat dels sistemes informàtics --- Sistemes de seguretat --- Control d'accés als ordinadors --- Seguretat de les xarxes d'ordinadors --- Pirates informàtics


Book
Data Science in Cybersecurity and Cyberthreat Intelligence
Authors: ---
ISBN: 3030387887 3030387879 Year: 2020 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book presents a collection of state-of-the-art approaches to utilizing machine learning, formal knowledge bases and rule sets, and semantic reasoning to detect attacks on communication networks, including IoT infrastructures, to automate malicious code detection, to efficiently predict cyberattacks in enterprises, to identify malicious URLs and DGA-generated domain names, and to improve the security of mHealth wearables. This book details how analyzing the likelihood of vulnerability exploitation using machine learning classifiers can offer an alternative to traditional penetration testing solutions. In addition, the book describes a range of techniques that support data aggregation and data fusion to automate data-driven analytics in cyberthreat intelligence, allowing complex and previously unknown cyberthreats to be identified and classified, and countermeasures to be incorporated in novel incident response and intrusion detection mechanisms.


Book
Handbook of big data analytics and forensics
Authors: ---
ISBN: 3030747530 3030747522 Year: 2021 Publisher: Cham, Switzerland : Springer,

Listing 1 - 10 of 92 << page
of 10
>>
Sort by