Narrow your search

Library

KU Leuven (41)

ULiège (34)

ULB (33)

Thomas More Kempen (28)

Thomas More Mechelen (28)

UCLL (28)

VIVES (28)

Odisee (27)

AP (26)

KDG (26)

More...

Resource type

book (72)

digital (26)


Language

English (96)


Year
From To Submit

2025 (1)

2020 (2)

2019 (3)

2017 (3)

2016 (3)

More...
Listing 1 - 10 of 96 << page
of 10
>>
Sort by

Book
Moving target defense : creating asymmetric uncertainty for cyber threats
Author:
ISBN: 1461409764 9786613353504 1283353504 1461409772 Year: 2011 Publisher: New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats was developed by a group of leading researchers. It describes the fundamental challenges facing the research community and identifies new promising solution paths. Moving Target Defense which is motivated by the asymmetric costs borne by cyber defenders takes an advantage afforded to attackers and reverses it to advantage defenders. Moving Target Defense is enabled by technical trends in recent years, including virtualization and workload migration on commodity systems, widespread and redundant network connectivity, instruction set and address space layout randomization, just-in-time compilers, among other techniques. However, many challenging research problems remain to be solved, such as the security of virtualization infrastructures, secure and resilient techniques to move systems within a virtualized environment, automatic diversification techniques, automated ways to dynamically change and manage the configurations of systems and networks, quantification of security improvement, potential degradation and more. Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats is designed for advanced -level students and researchers focused on computer science, and as a secondary text book or reference. Professionals working in this field will also find this book valuable.

Keywords

Computer security --- Threats --- Engineering & Applied Sciences --- Computer Science --- Computer security. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Security measures --- Protection of computer systems --- Protection --- Computer science. --- Computer communication systems. --- Data encryption (Computer science). --- Computers. --- Computer Science. --- Systems and Data Security. --- Data Encryption. --- Information Systems Applications (incl. Internet). --- Computer Communication Networks. --- Information Systems and Communication Service. --- Data protection --- Security systems --- Hacking --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Distributed processing --- Information systems. --- Cryptology. --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software


Book
Cyber situational awareness : issues and research
Author:
ISBN: 1441901418 1441901396 144190140X 9786612835810 1461424755 1282835815 Year: 2010 Publisher: New York ; London : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Today, when a security accident occurs, the top three questions security administrators would ask are in essence: What has happened? Why did it happen? What should I do? Answers to the first two questions form the "core" of Cyber Situational Awareness. In addition, whether the last question can be well answered, is greatly dependent upon the cyber situational awareness capability of enterprises. Cyber Situational Awareness: Issues and Research is an edited volume contributed by worldwide cyber security experts. This book seeks to establish state of the art in cyber situational awareness area to set course for future research. A multidisciplinary group of leading researchers from cyber security, cognitive system, and decision science areas will elaborate on the fundamental challenges facing the research community and identify promising solutions paths. Case studies based on real world examples are provided throughout this book. Cyber Situational Awareness: Issues and Research is designed for a professional audience composed of government workers and practitioners working in the field of cyber security. Advanced-level students and researchers studying computer science will also find this book useful, as secondary text or a reference book.

Keywords

Computer security -- Management. --- Computer security. --- Data protection. --- Computer security --- Computer Science --- Engineering & Applied Sciences --- Risk perception. --- Awareness, Risk --- Risk awareness --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Security measures --- Protection of computer systems --- Protection --- Computer science. --- Information technology. --- Business --- Computer communication systems. --- Data structures (Computer science). --- Data encryption (Computer science). --- Computer Science. --- Systems and Data Security. --- Computer Communication Networks. --- IT in Business. --- Data Encryption. --- Information Systems Applications (incl. Internet). --- Data Structures, Cryptology and Information Theory. --- Data processing. --- Data protection --- Security systems --- Hacking --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- IT (Information technology) --- Technology --- Telematics --- Information superhighway --- Knowledge management --- Informatics --- Science --- Distributed processing --- Perception --- Data structures (Computer scienc. --- Cryptology. --- Data Structures and Information Theory. --- Business—Data processing. --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software


Book
Moving target defense II : application of game theory and adversarial modeling
Author:
ISSN: 15682633 ISBN: 1283909731 1461454166 1461454158 1489993169 Year: 2013 Publisher: New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Our cyber defenses are static and are governed by lengthy processes, e.g., for testing and security patch deployment.  Adversaries could plan their attacks carefully over time and launch attacks at cyber speeds at any given moment.  We need a new class of defensive strategies that would force adversaries to continually engage in reconnaissance and re-planning of their cyber operations.  One such strategy is to present adversaries with a moving target where the attack surface of a system keeps changing. Moving Target Defense II: Application of Game Theory and Adversarial Modeling includes contributions from world experts in the cyber security field.  In the first volume of MTD, we presented MTD approaches based on software transformations, and MTD approaches based on network and software stack configurations. In this second volume of MTD, a group of leading researchers describe game theoretic, cyber maneuver, and software transformation approaches for constructing and analyzing MTD systems. Designed as a professional book for practitioners and researchers working in the cyber security field, advanced -level students and researchers focused on computer science will also find this book valuable as a secondary text book or reference.

Keywords

Computer security. --- Threats. --- Game theory. --- Games, Theory of --- Theory of games --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Security measures --- Protection of computer systems --- Protection --- Computer science. --- Computer communication systems. --- Data structures (Computer science). --- Data encryption (Computer science). --- Electrical engineering. --- Computer Science. --- Systems and Data Security. --- Computer Communication Networks. --- Data Encryption. --- Communications Engineering, Networks. --- Data Structures, Cryptology and Information Theory. --- Data protection --- Security systems --- Hacking --- Electric engineering --- Engineering --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Informatics --- Science --- Distributed processing --- Social conflict --- Extortion --- Mathematical models --- Mathematics --- Telecommunication. --- Data structures (Computer scienc. --- Cryptology. --- Data Structures and Information Theory. --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Telecommunications --- Communication --- Information theory --- Telecommuting --- Data structures (Computer science)


Book
Secure data management in decentralized systems
Authors: ---
ISBN: 1280865806 9786610865802 0387276963 Year: 2007 Publisher: New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The research scope of database security has expanded greatly, due to the rapid development of the global inter-networked infrastructure. Databases are no longer stand-alone systems that are only accessible to internal users of organizations. Instead, allowing selective access from different security domains has become a must for many business practices. New data services are emerging every day, which also brings new challenges to protect data security. The internet and the web offer means for collecting and sharing data with unprecedented flexibility and convenience. Secure Data Management in Decentralized Systems identifies and addresses these new challenges. This volume presents a wide range of active areas, closely related to database security by distinguished leaders within this field. Solutions are included. Secure Data Management in Decentralized Systems is designed for a professional audience composed of practitioners and researchers in industry. This book is suitable for graduate-level students in computer science as well.

Keywords

Computer networks --- Database security. --- Computer security. --- Security measures. --- Computer science. --- Computer communication systems. --- Data structures (Computer science). --- Data encryption (Computer science). --- Database management. --- Information storage and retrieval. --- Computer Science. --- Database Management. --- Data Structures, Cryptology and Information Theory. --- Data Encryption. --- Computer Communication Networks. --- Information Storage and Retrieval. --- Information Systems Applications (incl. Internet). --- Data base management --- Data services (Database management) --- Database management services --- DBMS (Computer science) --- Generalized data management systems --- Services, Database management --- Systems, Database management --- Systems, Generalized database management --- Electronic data processing --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- File organization (Computer science) --- Abstract data types (Computer science) --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Informatics --- Science --- Distributed processing --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Data base security --- Databases --- Computer network security --- Network security, Computer --- Security of computer networks --- Protection --- Security measures --- Data structures (Computer scienc. --- Information storage and retrieva. --- Data Structures and Information Theory. --- Cryptology. --- Information storage and retrieval systems. --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Computer-based information systems --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval --- Data structures (Computer science) --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software

Handbook of database security : applications and trends
Authors: ---
ISBN: 1281139769 9786611139766 0387485333 0387485325 1441943056 Year: 2008 Publisher: New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The Handbook of Database Security: Applications & Trends, an edited volume by renowned researchers within data security, provides an up-to-date overview of data security models, techniques, and architectures in a variety of data management applications and settings. This edited volume represents the most comprehensive work on numerous data security aspects published in the last ten years. The Handbook of Database Security: Applications & Trends places a particular focus on data-centric security aspects that reach beyond traditional and well-studied data security aspects in databases. It also covers security in advanced database systems, data privacy and trust management, and data outsourcing, and outlines directions for future research in these fields. The Handbook of Database Security: Applications & Trends is designed for a professional audience composed of practitioners and researchers in industry and academia as a reference book. This volume is also suitable for advanced-level students in computer science interested in the state-of-the-art in data security.

Keywords

Database security. --- Computer networks --- Security measures. --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Data base security --- Databases --- Security measures --- Data encryption (Computer science). --- Computer security. --- Database management. --- Information storage and retrieva. --- Computer Communication Networks. --- Data structures (Computer scienc. --- Cryptology. --- Systems and Data Security. --- Database Management. --- Information Storage and Retrieval. --- Data Structures and Information Theory. --- Information storage and retrieval. --- Data structures (Computer science) --- Data base management --- Data services (Database management) --- Database management services --- DBMS (Computer science) --- Generalized data management systems --- Services, Database management --- Systems, Database management --- Systems, Generalized database management --- Electronic data processing --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Protection --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- File organization (Computer science) --- Abstract data types (Computer science) --- Information storage and retrieval systems. --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Computer-based information systems --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval --- Computer communication systems. --- Data structures (Computer science). --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Distributed processing

International symposium on databases in parallel and distributed systems, December 5-7, 1988, Austin, Texas, USA. Proceedings
Authors: ---
ISBN: 0818608935 Year: 1988 Publisher: Washington (D.C.): IEEE computer society press

Loading...
Export citation

Choose an application

Bookmark

Abstract

Secure data management in decentralized systems
Authors: ---
ISBN: 9780387276946 0387276947 Year: 2007 Publisher: New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The research scope of database security has expanded greatly, due to the rapid development of the global inter-networked infrastructure. Databases are no longer stand-alone systems that are only accessible to internal users of organizations. Instead, allowing selective access from different security domains has become a must for many business practices. New data services are emerging everyday, which also brings new challenges to protect data security. The internet and the web offer means to collecting and sharing data with unprecedented flexibility and convenience. Secure Data Management in Decentralized Systems identifies and addresses these new challenges. This volume presents a wide range of active areas, closely related to database security by distinguished leaders within this field. Solutions are included. Secure Data Management in Decentralized Systems is designed for a professional audience composed of practitioners and researchers in industry. This book is suitable for graduate-level students in computer science as well.


Digital
Data and Applications Security XIX : 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005, Proceedings
Authors: ---
ISBN: 9783540319375 Year: 2005 Publisher: Berlin Heidelberg Springer-Verlag GmbH


Digital
Information Systems Security (vol. # 3803) : First International conference, ICISS 2005, Kolkata, India, December 19-21, 2005, Proceedings
Authors: ---
ISBN: 9783540324225 Year: 2005 Publisher: Berlin Heidelberg Springer-Verlag GmbH


Digital
Secure Data Management in Decentralized Systems
Authors: ---
ISBN: 9780387276960 Year: 2007 Publisher: Boston, MA Springer Science+Business Media, LLC

Listing 1 - 10 of 96 << page
of 10
>>
Sort by