Narrow your search

Library

VUB (9)

KU Leuven (8)

Odisee (8)

Thomas More Kempen (8)

Thomas More Mechelen (8)

UCLL (8)

ULB (8)

ULiège (8)

VIVES (8)

AP (7)

More...

Resource type

book (17)

digital (7)


Language

English (22)


Year
From To Submit

2021 (2)

2020 (6)

2019 (4)

2015 (2)

2014 (2)

More...
Listing 1 - 10 of 22 << page
of 3
>>
Sort by
Embedded Java security : security for mobile devices
Author:
ISBN: 1846287111 1846285909 1849966230 Year: 2007 Publisher: London : Springer-Verlag London Limited,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Whereas Java brings functionality and versatility to the world of mobile devices, at the same time it also introduces new security threats. The rapid growth of the number of mobile devices that support Java makes this a pressing issue. Embedded Java Security carefully examines the security aspects of Java and offers a security evaluation for the Java platform. After explaining background material on the architecture of embedded platforms and relating to its role in security, the book deconstructs the security model into its main components: It explains each component and relates it to the aim of securing the applications and the device. Toward this end, several implementations of the Java platform are examined and tested to relate the model to its actual implementation on devices. The security holes found are further used to clarify security issues and point out common errors. Finally, the book provides an evaluation of embedded Java security that includes security models and security tests performed on real-life implementations. Topics and features: • Presents the security model underlying Java ME • Provides a vulnerability analysis of Java CLDL and a risk analysis study of Java ME vulnerabilities • Supplies an example of a protection profile for Java ME - illustrated using the common criteria framework • Discusses the most prominent standards that are relevant for Java ME security • Reports on areas of common vulnerabilities, and considers specifications and programming mistakes • Hints and suggestions are provided as ways for hardening security This invaluable volume provides researchers and practitioners with a broader and deeper understanding of the issues involved in embedded Java security, and, as a larger view, mobile-devices security. It can also serve as an ancillary course text or helpful guide for self study in the field.

Keywords

Computer networks --- Java (Computer program language) --- Mobile computing. --- Portable computers. --- Security measures. --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Electronic data processing --- Context-aware computing --- Portable computers --- Object-oriented programming languages --- JavaSpaces technology --- Computers, Portable --- Microcomputers --- Mobile computing --- Computer science. --- Computer security. --- Computer network architectures. --- Software engineering. --- Data encryption (Computer science). --- Programming Techniques. --- Computer Engineering. --- Systems and Data Security. --- Computer Systems Organization and Communication Networks. --- Software Engineering/Programming and Operating Systems. --- Cryptology. --- Computer software engineering --- Engineering --- Architectures, Computer network --- Network architectures, Computer --- Computer architecture --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Informatics --- Science --- Protection --- Security measures --- Computer programming. --- Computer engineering. --- Computer organization. --- Organization, Computer --- Electronic computer programming --- Programming (Electronic computers) --- Coding theory --- Design and construction --- Programming


Book
Verification and validation in systems engineering : assessing UML/SysML design models
Author:
ISBN: 3642423167 3642152279 3642152287 Year: 2010 Publisher: Berlin ; Heidelberg : Springer-Verlag,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Verification and validation represents an important process used for the quality assessment of engineered systems and their compliance with the requirements established at the beginning of or during the development cycle. Debbabi and his coauthors investigate methodologies and techniques that can be employed for the automatic verification and validation of systems engineering design models expressed in standardized modeling languages. Their presentation includes a bird’s eye view of the most prominent modeling languages for software and systems engineering, namely the Unified Modeling Language (UML) and the more recent Systems Modeling Language (SysML). Moreover, it elaborates on a number of quantitative and qualitative techniques that synergistically combine automatic verification techniques, program analysis, and software engineering quantitative methods applicable to design models described in these modeling languages. Each of these techniques is additionally explained using a case study highlighting the process, its results, and resulting changes in the system design. Researchers in academia and industry as well as students specializing in software and systems engineering will find here an overview of state-of-the-art validation and verification techniques. Due to their close association with the UML standard, the presented approaches are also applicable to industrial software development.

Keywords

Quality assurance. --- Quality control. --- System failures (Engineering) -- Prevention. --- Systems engineering. --- Testing. --- Systems engineering --- Expert systems (Computer science) --- UML (Computer science) --- SysML (Computer science) --- Engineering & Applied Sciences --- Computer Science --- Verification --- Validation --- Information Technology --- Software Engineering --- Unified Modeling Language (Computer science) --- OMG SysML (Computer science) --- Systems Modeling Language (Computer science) --- Engineering systems --- System engineering --- Design and construction --- Computer science. --- Computer system failures. --- Software engineering. --- Management information systems. --- Computer Science. --- Software Engineering/Programming and Operating Systems. --- Software Engineering. --- System Performance and Evaluation. --- Management of Computing and Information Systems. --- Computer software --- Modeling languages (Computer science) --- Object-oriented methods (Computer science) --- Engineering --- Industrial engineering --- System analysis --- Development --- Computer system performance. --- Information Systems. --- Computer software engineering --- Informatics --- Science --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Computer failures --- Computer malfunctions --- Computer systems --- Failure of computer systems --- System failures (Engineering) --- Fault-tolerant computing --- Communication systems --- Failures


Book
Foundations and Practice of Security : 11th International Symposium, FPS 2018, Montreal, QC, Canada, November 13–15, 2018, Revised Selected Papers
Authors: --- --- ---
ISBN: 3030184196 3030184188 Year: 2019 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the revised selected papers of the 11th International Symposium on Foundations and Practice of Security, FPS 2018, held in Montreal, QC, Canada, in March 2018. The 16 full papers, 1 short paper, 1 position paper and 2 invited papers presented in this book, were carefully reviewed and selected from 51 submissions. They cover a range of topics including mobile security; cloud security and big data; IoT security; software security, malware analysis, and vulnerability detection; cryptography; cyber physical security and hardware security; and access control.

Keywords

Data protection. --- Information systems. --- Software engineering. --- Artificial intelligence. --- Computer science. --- Security. --- Information Systems and Communication Service. --- Software Engineering. --- Artificial Intelligence. --- Programming Techniques. --- Programming Languages, Compilers, Interpreters. --- Informatics --- Science --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Computer software engineering --- Engineering --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Data encryption (Computer science) --- Computers. --- Computer programming. --- Programming languages (Electronic computers). --- Computer languages --- Computer program languages --- Computer programming languages --- Machine language --- Languages, Artificial --- Computers --- Electronic computer programming --- Electronic digital computers --- Programming (Electronic computers) --- Coding theory --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Calculators --- Cyberspace --- Programming


Book
Machine learning for authorship attribution and cyber forensics
Authors: --- ---
ISBN: 3030616754 3030616746 Year: 2020 Publisher: Cham, Switzerland : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The book first explores the cybersecurity’s landscape and the inherent susceptibility of online communication system such as e-mail, chat conversation and social media in cybercrimes. Common sources and resources of digital crimes, their causes and effects together with the emerging threats for society are illustrated in this book. This book not only explores the growing needs of cybersecurity and digital forensics but also investigates relevant technologies and methods to meet the said needs. Knowledge discovery, machine learning and data analytics are explored for collecting cyber-intelligence and forensics evidence on cybercrimes. Online communication documents, which are the main source of cybercrimes are investigated from two perspectives: the crime and the criminal. AI and machine learning methods are applied to detect illegal and criminal activities such as bot distribution, drug trafficking and child pornography. Authorship analysis is applied to identify the potential suspects and their social linguistics characteristics. Deep learning together with frequent pattern mining and link mining techniques are applied to trace the potential collaborators of the identified criminals. Finally, the aim of the book is not only to investigate the crimes and identify the potential suspects but, as well, to collect solid and precise forensics evidence to prosecute the suspects in the court of law. .


Digital
Embedded Java Security : Security for Mobile Devices
Authors: --- --- ---
ISBN: 9781846287114 Year: 2007 Publisher: London Springer-Verlag London Limited


Book
Foundations and Practice of Security : 6th International Symposium, FPS 2013, La Rochelle, France, October 21-22, 2013, Revised Selected Papers
Authors: --- --- --- ---
ISBN: 3319053019 3319053027 Year: 2014 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the carefully refereed post-proceedings of the 6th Symposium on Foundations and Practice of Security, FPS 2013, held in La Rochelle, France, in October 2013. The 25 revised full papers presented together with a keynote address were carefully reviewed and selected from 65 submissions. The papers are organized in topical sections on security protocols, formal methods, physical security, attack classification and assessment, access control, cipher attacks, ad-hoc and sensor networks, resilience and intrusion detection.


Book
Embedded Java Security
Authors: --- --- --- ---
ISBN: 9781846287114 Year: 2007 Publisher: London Springer-Verlag London Limited

Loading...
Export citation

Choose an application

Bookmark

Abstract

Whereas Java brings functionality and versatility to the world of mobile devices, at the same time it also introduces new security threats. The rapid growth of the number of mobile devices that support Java makes this a pressing issue. Embedded Java Security carefully examines the security aspects of Java and offers a security evaluation for the Java platform. After explaining background material on the architecture of embedded platforms and relating to its role in security, the book deconstructs the security model into its main components: It explains each component and relates it to the aim of securing the applications and the device. Toward this end, several implementations of the Java platform are examined and tested to relate the model to its actual implementation on devices. The security holes found are further used to clarify security issues and point out common errors. Finally, the book provides an evaluation of embedded Java security that includes security models and security tests performed on real-life implementations. Topics and features: ¢ Presents the security model underlying Java ME ¢ Provides a vulnerability analysis of Java CLDL and a risk analysis study of Java ME vulnerabilities ¢ Supplies an example of a protection profile for Java ME - illustrated using the common criteria framework ¢ Discusses the most prominent standards that are relevant for Java ME security ¢ Reports on areas of common vulnerabilities, and considers specifications and programming mistakes ¢ Hints and suggestions are provided as ways for hardening security This invaluable volume provides researchers and practitioners with a broader and deeper understanding of the issues involved in embedded Java security, and, as a larger view, mobile-devices security. It can also serve as an ancillary course text or helpful guide for self study in the field.


Book
Verification and Validation in Systems Engineering
Authors: --- --- --- --- --- et al.
ISBN: 9783642152283 9783642152276 9783642423161 9783642152290 Year: 2010 Publisher: Berlin, Heidelberg Springer Berlin Heidelberg

Loading...
Export citation

Choose an application

Bookmark

Abstract

Verification and validation represents an important process used for the quality assessment of engineered systems and their compliance with the requirements established at the beginning of or during the development cycle. Debbabi and his coauthors investigate methodologies and techniques that can be employed for the automatic verification and validation of systems engineering design models expressed in standardized modeling languages. Their presentation includes a bird's eye view of the most prominent modeling languages for software and systems engineering, namely the Unified Modeling Language (UML) and the more recent Systems Modeling Language (SysML). Moreover, it elaborates on a number of quantitative and qualitative techniques that synergistically combine automatic verification techniques, program analysis, and software engineering quantitative methods applicable to design models described in these modeling languages. Each of these techniques is additionally explained using a case study highlighting the process, its results, and resulting changes in the system design. Researchers in academia and industry as well as students specializing in software and systems engineering will find here an overview of state-of-the-art validation and verification techniques. Due to their close association with the UML standard, the presented approaches are also applicable to industrial software development.


Book
Machine Learning for Authorship Attribution and Cyber Forensics
Authors: --- --- ---
ISBN: 9783030616755 Year: 2020 Publisher: Cham Springer International Publishing :Imprint: Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Android Malware Detection using Machine Learning
Authors: --- --- --- ---
ISBN: 9783030746643 9783030746650 9783030746667 9783030746636 Year: 2021 Publisher: Cham Springer International Publishing :Imprint: Springer

Listing 1 - 10 of 22 << page
of 3
>>
Sort by