Narrow your search

Library

KBC (4)

AP (3)

KDG (3)

VUB (3)

KU Leuven (2)

Odisee (2)

Thomas More Kempen (2)

Thomas More Mechelen (2)

ULB (2)

ULiège (2)

More...

Resource type

book (8)

digital (3)


Language

English (11)


Year
From To Submit

2024 (1)

2023 (1)

2022 (4)

2021 (2)

2020 (3)

Listing 1 - 10 of 11 << page
of 2
>>
Sort by

Book
Secure searchable encryption and data management
Author:
ISBN: 9780367619671 Year: 2021 Publisher: Boca Raton Florida ; London, England ; New York : CRC Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

With the advent of the IT revolution, the volume of data produced has increased exponentially and is still showing an upward trend. This data may be abundant and enormous, but it's a precious resource and should be managed properly. Cloud technology plays an important role in data management. Storing data in the cloud rather than on local storage has many benefits, but apart from these benefits, there are privacy concerns in storing sensitive data over third-party servers. These concerns can be addressed by storing data in an encrypted form; however, while encryption solves the problem of privacy, it engenders other serious issues, including the infeasibility of the fundamental search operation and a reduction in flexibility when sharing data with other users, amongst others. The concept of searchable encryption addresses these issues. This book provides every necessary detail required to develop a secure, searchable encryption scheme using both symmetric and asymmetric cryptographic primitives along with the appropriate security models to ensure the minimum security requirements for real-world applications.


Book
Distributed denial of service (DDoS) attacks : classification, attacks, challenges, and countermeasures
Authors: ---
ISBN: 1003107354 1003107354 1000347079 Year: 2021 Publisher: Boca Raton, FL ; London ; New York : CRC Press, Taylor & Francis Group,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book is designed for readers who have an interest in the cyber security domain, including students and researchers who are exploring different dimensions associated with the DDoS attack, developers and security professionals focusing on defensive schemes and applications for detecting or mitigating DDoS attacks.


Book
Handbook of Computer Networks and Cyber Security : Principles and Paradigms
Authors: --- --- ---
ISBN: 3030222772 3030222764 Year: 2020 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This handbook introduces the basic principles and fundamentals of cyber security towards establishing an understanding of how to protect computers from hackers and adversaries. The highly informative subject matter of this handbook, includes various concepts, models, and terminologies along with examples and illustrations to demonstrate substantial technical details of the field. It motivates the readers to exercise better protection and defense mechanisms to deal with attackers and mitigate the situation. This handbook also outlines some of the exciting areas of future research where the existing approaches can be implemented. Exponential increase in the use of computers as a means of storing and retrieving security-intensive information, requires placement of adequate security measures to safeguard the entire computing and communication scenario. With the advent of Internet and its underlying technologies, information security aspects are becoming a prime concern towards protecting the networks and the cyber ecosystem from variety of threats, which is illustrated in this handbook. This handbook primarily targets professionals in security, privacy and trust to use and improve the reliability of businesses in a distributed manner, as well as computer scientists and software developers, who are seeking to carry out research and develop software in information and cyber security. Researchers and advanced-level students in computer science will also benefit from this reference.


Book
Robotics and AI for Cybersecurity and Critical Infrastructure in Smart Cities
Authors: --- --- --- ---
ISBN: 9783030967376 Year: 2022 Publisher: Cham Springer International Publishing :Imprint: Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Handbook of Computer Networks and Cyber Security
Authors: --- --- --- ---
ISBN: 9783030222772 Year: 2020 Publisher: Cham Springer International Publishing :Imprint: Springer


Digital
Handbook of Computer Networks and Cyber Security : Principles and Paradigms
Authors: --- --- ---
ISBN: 9783030222772 Year: 2020 Publisher: Cham Springer International Publishing

Loading...
Export citation

Choose an application

Bookmark

Abstract

This handbook introduces the basic principles and fundamentals of cyber security towards establishing an understanding of how to protect computers from hackers and adversaries. The highly informative subject matter of this handbook, includes various concepts, models, and terminologies along with examples and illustrations to demonstrate substantial technical details of the field. It motivates the readers to exercise better protection and defense mechanisms to deal with attackers and mitigate the situation. This handbook also outlines some of the exciting areas of future research where the existing approaches can be implemented. Exponential increase in the use of computers as a means of storing and retrieving security-intensive information, requires placement of adequate security measures to safeguard the entire computing and communication scenario. With the advent of Internet and its underlying technologies, information security aspects are becoming a prime concern towards protecting the networks and the cyber ecosystem from variety of threats, which is illustrated in this handbook. This handbook primarily targets professionals in security, privacy and trust to use and improve the reliability of businesses in a distributed manner, as well as computer scientists and software developers, who are seeking to carry out research and develop software in information and cyber security. Researchers and advanced-level students in computer science will also benefit from this reference.


Digital
Robotics and AI for Cybersecurity and Critical Infrastructure in Smart Cities
Authors: --- --- ---
ISBN: 9783030967376 9783030967369 9783030967383 9783030967390 Year: 2022 Publisher: Cham Springer International Publishing

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book bridges principles and real-world applications, while also providing thorough theory and technology for the development of artificial intelligence and robots. A lack of cross-pollination between AI and robotics research has led to a lack of progress in both fields. Now that both technologies have made significant strides, there is increased interest in combining the two domains in order to create a new integrated AI and robotics trend. In order to achieve wiser urbanization and more sustainable development, AI in smart cities will play a significant part in equipping the cities with advanced features that will allow residents to safely move about, stroll, shop, and enjoy a more comfortable way of life. If you are a student, researcher, engineer, or professional working in this field, or if you are just curious in the newest advancements in robotics and artificial intelligence for cybersecurity, this book is for you!


Book
Artificial Intelligence for Biometrics and Cybersecurity : Technology and Applications.
Authors: --- --- --- ---
ISBN: 1839535482 Year: 2023 Publisher: Stevenage : Institution of Engineering & Technology,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book presents cutting-edge research on the use of AI for biometrics and cybersecurity including Machine and Deep Learning architectures, emerging applications and ethical and legal concerns.

Keywords


Book
Secure Edge and Fog Computing Enabled AI for IoT and Smart Cities : Includes selected Papers from International Conference on Advanced Computing & Next-Generation Communication (ICACNGC 2022)
Authors: --- --- ---
ISBN: 3031510976 Year: 2024 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book gathers recent research in security and privacy to discuss, evaluate, and improve the novel approaches of data protection in IoT and edge and fog computing. The primary focus of the book addresses security mechanisms in IoT and edge/ fog computing, advanced secure deployments for large scaled edge/ fog computing, and new efficient data security strategy of IoT and edge/ fog computing. The book lays a foundation of the core concepts and principles of IoT and 5G security, walking the reader through the fundamental ideas. This book is aimed at researchers, graduate students, and engineers in the fields of secure IoT and edge/ fog computing. The book also presents selected papers from International Conference on Advanced Computing & Next-Generation Communication (ICACNGC 2022). Discusses, evaluates, and improves approaches in data protections in IoT and edge/ fog computing; Lays a foundation of the core concepts and principles of IoT and 5G security for edge/ fog computing; Includes selected papers from ICACNGC 2022.


Digital
Security and Privacy Preserving for IoT and 5G Networks : Techniques, Challenges, and New Directions
Authors: --- --- --- ---
ISBN: 9783030854287 9783030854270 9783030854294 9783030854300 Year: 2022 Publisher: Cham Springer International Publishing

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book presents state-of-the-art research on security and privacy- preserving for IoT and 5G networks and applications. The accepted book chapters covered many themes, including traceability and tamper detection in IoT enabled waste management networks, secure Healthcare IoT Systems, data transfer accomplished by trustworthy nodes in cognitive radio, DDoS Attack Detection in Vehicular Ad-hoc Network (VANET) for 5G Networks, Mobile Edge-Cloud Computing, biometric authentication systems for IoT applications, and many other applications It aspires to provide a relevant reference for students, researchers, engineers, and professionals working in this particular area or those interested in grasping its diverse facets and exploring the latest advances on security and privacy- preserving for IoT and 5G networks. .

Listing 1 - 10 of 11 << page
of 2
>>
Sort by