Narrow your search

Library

KBC (12)

KU Leuven (5)

VUB (4)

AP (3)

KDG (3)

Odisee (3)

Thomas More Kempen (3)

Thomas More Mechelen (3)

ULiège (3)

VIVES (3)

More...

Resource type

book (19)

digital (3)


Language

English (22)


Year
From To Submit

2024 (1)

2023 (2)

2022 (4)

2021 (6)

2020 (4)

More...
Listing 1 - 10 of 22 << page
of 3
>>
Sort by

Book
Cloud security : concepts, applications and perspectives
Author:
ISBN: 0367821559 1000357309 Year: 2021 Publisher: Boca Raton, Florida ; London, England : CRC Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

"Cloud Computing has proven itself as an extraordinary computing paradigm by providing rapidly deployable and scalable Information Technology (IT) solutions with reduced infrastructure costs. However, there are numerous challenges associated with this technology that require a complete understanding in order to be prevented. Cloud Security: Concepts, Applications and Perspectives discusses the state-of-the-art techniques and methodologies, and covers wide range of examples and illustrations to effectively show the principles, algorithms, applications and practices of security in Cloud Computing. It also provides valuable insights into the security and privacy aspects in Cloud"--


Book
Internet of things security : principles, applications, attacks, and countermeasures.
Authors: ---
ISBN: 0429353529 1000048454 9781000048452 9781000048513 1000048519 9781000048483 1000048489 9780429353529 0367373963 9780367373962 Year: 2020 Publisher: Boca Raton : CRC Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The Internet of Things (IoT), with its technological advancements and massive innovations, is building the idea of inter-connectivity among everyday life objects. With an explosive growth in the number of Internet-connected devices, the implications of the idea of IoT on enterprises, individuals, and society are huge. IoT is getting attention from both academia and industry due to its powerful real-time applications that raise demands to understand the entire spectrum of the field. However, due to increasing security issues, safeguarding the IoT ecosystem has become an important concern. With devices and information becoming more exposed and leading to increased attack possibilities, adequate security measures are required to leverage the benefits of this emerging concept. Internet of Things Security: Principles, Applications, Attacks, and Countermeasures is an extensive source that aims at establishing an understanding of the core concepts of IoT among its readers and the challenges and corresponding countermeasures in the field. Key features: Containment of theoretical aspects, as well as recent empirical findings associated with the underlying technologies Exploration of various challenges and trade-offs associated with the field and approaches to ensure security, privacy, safety, and trust across its key elements Vision of exciting areas for future research in the field to enhance the overall productivity This book is suitable for industrial professionals and practitioners, researchers, faculty members, and students across universities who aim to carry out research and development in the field of IoT security.


Book
Secure searchable encryption and data management
Authors: ---
ISBN: 9780367619671 Year: 2021 Publisher: Boca Raton, FL : CRC Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

With the advent of the IT revolution, the volume of data produced has increased exponentially and is still showing an upward trend. This data may be abundant and enormous, but it's a precious resource and should be managed properly. Cloud technology plays an important role in data management. Storing data in the cloud rather than on local storage has many benefits, but apart from these benefits, there are privacy concerns in storing sensitive data over third-party servers. These concerns can be addressed by storing data in an encrypted form; however, while encryption solves the problem of privacy, it engenders other serious issues, including the infeasibility of the fundamental search operation and a reduction in flexibility when sharing data with other users, amongst others. The concept of searchable encryption addresses these issues. This book provides every necessary detail required to develop a secure, searchable encryption scheme using both symmetric and asymmetric cryptographic primitives along with the appropriate security models to ensure the minimum security requirements for real-world applications.


Book
Transport of ions and water in animals
Author:
Year: 1977 Publisher: London - New York - San Francisco Academic Press

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords


Book
Distributed denial of service (DDoS) attacks : classification, attacks, challenges, and countermeasures
Authors: ---
ISBN: 1003107354 1003107354 1000347079 Year: 2021 Publisher: Boca Raton, FL ; London ; New York : CRC Press, Taylor & Francis Group,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book is designed for readers who have an interest in the cyber security domain, including students and researchers who are exploring different dimensions associated with the DDoS attack, developers and security professionals focusing on defensive schemes and applications for detecting or mitigating DDoS attacks.


Book
Online social networks security : principles, algorithm, applications, and perspectives
Authors: ---
ISBN: 9780367619794 1003107370 1003107370 1000347117 Year: 2021 Publisher: Boca Raton, Florida ; Abingdon, Oxon : CRC Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Machine learning for computer and cyber security : principles, algorithms, and practices
Authors: ---
ISBN: 0429995725 0429504047 0429995717 Year: 2019 Publisher: Boca Raton : CRC Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

While Computer Security is a broader term which incorporates technologies, protocols, standards and policies to ensure the security of the computing systems including the computer hardware, software and the information stored in it, Cyber Security is a specific, growing field to protect computer networks (offline and online) from unauthorized access, botnets, phishing scams, etc. Machine learning is a branch of Computer Science which enables computing machines to adopt new behaviors on the basis of observable and verifiable data and information. It can be applied to ensure the security of the computers and the information by detecting anomalies using data mining and other such techniques. This book will be an invaluable resource to understand the importance of machine learning and data mining in establishing computer and cyber security. It emphasizes important security aspects associated with computer and cyber security along with the analysis of machine learning and data mining based solutions. The book also highlights the future research domains in which these solutions can be applied. Furthermore, it caters to the needs of IT professionals, researchers, faculty members, scientists, graduate students, research scholars and software developers who seek to carry out research and develop combating solutions in the area of cyber security using machine learning based approaches. It is an extensive source of information for the readers belonging to the field of Computer Science and Engineering, and Cyber Security professionals. Key Features: This book contains examples and illustrations to demonstrate the principles, algorithms, challenges and applications of machine learning and data mining for computer and cyber security. It showcases important security aspects and current trends in the field. It provides an insight of the future research directions in the field. Contents of this book help to prepare the students for exercising better defense in terms of understanding the motivation of the attackers and how to deal with and mitigate the situation using machine learning based approaches in better manner.


Book
Computer and cyber security : principles, algorithm, applications, and perspectives
Authors: --- ---
ISBN: 0429756313 0429424876 0429756305 Year: 2019 Publisher: Boca Raton, FL : CRC Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This is a monumental reference for the theory and practice of computer security. Comprehensive in scope, this text covers applied and practical elements, theory, and the reasons for the design of applications and security techniques. It covers both the management and the engineering issues of computer security. It provides excellent examples of ideas and mechanisms that demonstrate how disparate techniques and principles are combined in widely-used systems. This book is acclaimed for its scope, clear and lucid writing, and its combination of formal and theoretical aspects with real systems, technologies, techniques, and policies.


Book
Recent advances in security, privacy and trust for Internet-of-Things (IoT) and cyber-physical systems (CPS)
Authors: --- ---
ISBN: 0429270569 1000326179 9780429270567 1000326136 9780367220655 9781000326178 9781000326154 1000326152 9781000326130 Year: 2021 Publisher: Boca Raton, FL : CRC Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Security, privacy, and trust in the Internet of Things (IoT) and CPS (Cyber-Physical Systems) are different from conventional security as concerns revolve around the collection and aggregation of data or transmission of data over the network. Analysis of cyber-attack vectors and the provision of appropriate mitigation techniques are essential research areas for these systems. Adoption of best practices and maintaining a balance between ease of use and security are, again, crucial for the effective performance of these systems. Recent Advances in Security, Privacy and Trust for Internet of Things (IoT) and Cyber-Physical Systems (CPS) discusses and presents techniques and methodologies, as well as a wide range of examples and illustrations, to effectively show the principles, algorithms, challenges, and applications of security, privacy, and trust for IoT and CPS. Book features: Introduces new directions for research, development, and engineering security, privacy, and trust of IoT and CPS Includes a wealth of examples and illustrations to effectively demonstrate the principles, algorithms, challenges, and applications Covers most of the important security aspects and current trends not present in other reference books This book will also serve as an excellent reference in security, privacy, and trust of IoT and CPS for professionals in this fast-evolving and critical field. The chapters present high-quality contributions from researchers, academics, and practitioners from various national and international organizations and universities.


Book
Intelligent edge computing for cyber physical applications
Authors: --- --- ---
ISBN: 0323994334 9780323994125 0323994121 9780323994330 Year: 2023 Publisher: San Diego : Elsevier Science & Technology,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Intelligent Edge Computing for Cyber Physical Applications introduces state-of-the-art research methodologies, tools and techniques, challenges, and solutions with further research opportunities in the area of edge-based cyber-physical systems. The book presents a comprehensive review of recent literature and analysis of different techniques for building edge-based CPS. In addition, it describes how edge-based CPS can be built to seamlessly interact with physical machines for optimal performance, covering various aspects of edge computing architectures for dynamic resource provisioning, mobile edge computing, energy saving scenarios, and different security issues. Sections feature practical use cases of edge-computing which will help readers understand the workings of edge-based systems in detail, taking into account the need to present intellectual challenges while appealing to a broad readership, including academic researchers, practicing engineers and managers, and graduate students.

Listing 1 - 10 of 22 << page
of 3
>>
Sort by