Narrow your search

Library

KU Leuven (3)

Odisee (3)

Thomas More Kempen (3)

Thomas More Mechelen (3)

UCLL (3)

ULB (3)

ULiège (3)

VIVES (3)

AP (2)

KDG (2)

More...

Resource type

book (4)

digital (2)


Language

English (6)


Year
From To Submit

2018 (1)

2014 (2)

2011 (3)

Listing 1 - 6 of 6
Sort by

Book
Trust and Trustworthy Computing : 7th International Conference, TRUST 2014, Heraklion, Crete, Greece, June 30 -- July 2, 2014, Proceedings
Authors: ---
ISBN: 3319085921 331908593X Year: 2014 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 7th International Conference on Trust and Trustworthy Computing, TRUST 2014, held in Heraklion, Crete, Greece in June/July 2014. The 10 full papers and three short papers presented together with 9 poster abstracts were carefully reviewed and selected from 40 submissions. They are organized in topical sections such as TPM 2.0, trust in embedded and mobile systems; physical unclonable functions; trust in the web; trust and trustworthiness.


Digital
Detection of Intrusions and Malware, and Vulnerability Assessment : 8th International Conference; DIMVA 2011, Amsterdam, The Netherlands, July 7-8, 2011. Proceedings
Authors: ---
ISBN: 9783642224249 Year: 2011 Publisher: Berlin, Heidelberg Springer Berlin Heidelberg


Digital
Trust and Trustworthy Computing : 7th International Conference, TRUST 2014, Heraklion, Crete, June 30 – July 2, 2014. Proceedings
Authors: ---
ISBN: 9783319085937 Year: 2014 Publisher: Cham Springer International Publishing

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 7th International Conference on Trust and Trustworthy Computing, TRUST 2014, held in Heraklion, Crete, Greece in June/July 2014. The 10 full papers and three short papers presented together with 9 poster abstracts were carefully reviewed and selected from 40 submissions. They are organized in topical sections such as TPM 2.0, trust in embedded and mobile systems; physical unclonable functions; trust in the web; trust and trustworthiness.


Book
Detection of intrusions and malware, and vulnerability assessment : 8th International Conference; DIMVA 2011, Amsterdam, The Netherlands, July 7-8, 2011 : proceedings
Authors: --- ---
ISBN: 3642224237 3642224245 Year: 2011 Publisher: New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 8th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2011, held in Amsterdam, the Netherlands, in July 2011. The 11 full papers presented together with two short papers were carefully reviewed and selected from 41 initial  submissions. The papers are organized in topical sections on network security, attacks, Web security, and host security.

Keywords

Electrical & Computer Engineering --- Engineering & Applied Sciences --- Computer Science --- Telecommunications --- Information Technology --- Computer Science (Hardware & Networks) --- Computers --- Computer networks --- Computer security --- Access control --- Evaluation --- Security measures --- Computer science. --- Computer communication systems. --- Data encryption (Computer science). --- Algorithms. --- Computers and civilization. --- Management information systems. --- Computer Science. --- Computer Communication Networks. --- Management of Computing and Information Systems. --- Data Encryption. --- Computers and Society. --- Information Systems Applications (incl. Internet). --- Algorithm Analysis and Problem Complexity. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Civilization and computers --- Civilization --- Algorism --- Algebra --- Arithmetic --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Communication systems --- Foundations --- Distributed processing --- Information Systems. --- Computer software. --- Cryptology. --- Software, Computer --- Computer systems --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software


Book
Detection of Intrusions and Malware, and Vulnerability Assessment : 8th International Conference; DIMVA 2011, Amsterdam, The Netherlands, July 7-8, 2011. Proceedings
Authors: --- ---
ISBN: 9783642224249 Year: 2011 Publisher: Berlin Heidelberg Springer Berlin Heidelberg

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 8th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2011, held in Amsterdam, the Netherlands, in July 2011. The 11 full papers presented together with two short papers were carefully reviewed and selected from 41intial  submissions. The papers are organized in topical sections on network security, attacks, Web security, and host security.


Book
Research in Attacks, Intrusions, and Defenses : 21st International Symposium, RAID 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedings
Authors: --- --- ---
ISBN: 3030004694 3030004708 Year: 2018 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 21st International Symposium on Research in Attacks, Intrusions, and Defenses, RAID 2018, held in Heraklion, Crete, Greece, in September 2018. The 32 revised full papers were carefully reviewed and selected from 145 submissions. They are organized in the following topical sections: attacks; intrusion detection and prevention; DDoS attacks; passwords, accounts, and users; machine learning for computer security; hardware-assisted security; software security; malware; IoT/CPS security; security measurements; and defenses.

Keywords

Computer security. --- Computer science. --- Computers --- Operating systems (Computers). --- Computer Communication Networks. --- Systems and Data Security. --- Computers and Society. --- Legal Aspects of Computing. --- Information Systems Applications (incl. Internet). --- Operating Systems. --- Law and legislation. --- Computer operating systems --- Disk operating systems --- Systems software --- Cyberspace --- Informatics --- Science --- Computer privacy --- Computer system security --- Computer systems --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Operating systems --- Law and legislation --- Protection --- Security measures --- Computer security --- Computers and civilization. --- Computers. --- Application software. --- Computer communication systems. --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Cybernetics --- Machine theory --- Calculators --- Civilization and computers --- Civilization --- Distributed processing

Listing 1 - 6 of 6
Sort by