Narrow your search

Library

AP (7)

KDG (7)

KU Leuven (6)

Odisee (5)

Thomas More Kempen (5)

Thomas More Mechelen (5)

UCLL (5)

ULB (5)

ULiège (5)

VIVES (5)

More...

Resource type

book (11)

digital (7)


Language

English (18)


Year
From To Submit

2021 (4)

2020 (2)

2018 (3)

2016 (2)

2014 (2)

More...
Listing 1 - 10 of 18 << page
of 2
>>
Sort by

Book
Decision and Game Theory for Security : 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014, Proceedings
Authors: ---
ISBN: 3319126008 3319126016 Year: 2014 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 5th International Conference on Decision and Game Theory for Security, GameSec 2014, held in Los Angeles, CA, USA, in November 2014. The 16 revised full papers presented together with 7 short papers were carefully reviewed and selected from numerous submissions. The covered topics cover multiple facets of cyber security that include: rationality of adversary, game-theoretic cryptographic techniques, vulnerability discovery and assessment, multi-goal security analysis, secure computation, economic-oriented security, and surveillance for security. Those aspects are covered in a multitude of domains that include networked systems, wireless communications, border patrol security, and control systems.

Keywords

Computer science. --- Computer communication systems. --- Computer security. --- Algorithms. --- Management information systems. --- Game theory. --- Computer Science. --- Information Systems Applications (incl. Internet). --- Computer Communication Networks. --- Systems and Data Security. --- Algorithm Analysis and Problem Complexity. --- Management of Computing and Information Systems. --- Game Theory, Economics, Social and Behav. Sciences. --- Computer software. --- Information Systems. --- Mathematics. --- Math --- Science --- Software, Computer --- Computer systems --- Computer privacy --- Computer system security --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Data protection. --- Application software. --- Games, Theory of --- Theory of games --- Mathematical models --- Mathematics --- Informatics --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Algorism --- Algebra --- Arithmetic --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Communication systems --- Foundations --- Distributed processing


Digital
Decision and Game Theory for Security : 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings
Authors: ---
ISBN: 9783319126012 Year: 2014 Publisher: Cham Springer International Publishing

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 5th International Conference on Decision and Game Theory for Security, GameSec 2014, held in Los Angeles, CA, USA, in November 2014. The 16 revised full papers presented together with 7 short papers were carefully reviewed and selected from numerous submissions. The covered topics cover multiple facets of cyber security that include: rationality of adversary, game-theoretic cryptographic techniques, vulnerability discovery and assessment, multi-goal security analysis, secure computation, economic-oriented security, and surveillance for security. Those aspects are covered in a multitude of domains that include networked systems, wireless communications, border patrol security, and control systems.

Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks
Authors: --- ---
ISBN: 0387327215 1441940960 9786611133351 1281133353 0387462767 Year: 2007 Publisher: New York, NY : Springer US : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks presents the latest research results in the area of secure localization and time synchronization for both wireless mobile ad hoc networks and wireless sensor networks. Recent advances in computing have exposed the potential security problems inherent in mobile ad hoc and wireless sensor networks. Subject to attacks and intrusions due to its open spectrum nature, wireless network localization and synchronization must be both robust and secure. Localization and time synchronization are critical processes for achieving sensor network security. Furthermore, issues such as energy constraints and mobility make the localization process even more challenging. This edited volume evolved from an ARO special workshop on Localization in Wireless Sensor Networks at the University of Washington, and includes contributions from the leading researchers in secure localization, time synchronization, and protocol verifications. This book presents the challenges posed, potential solutions, and directions for further research, while including implementation studies with mica2 mote sensors. Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks is designed for researchers, developers and practitioners in the area of secure wireless systems. Advanced-level students in computer science, especially in the area of wireless systems and security, will undoubtedly find this an invaluable reference tool. This book is also suitable for use as a textbook for courses in wireless systems and security.

Keywords

Sensor networks. --- Wireless communication systems --- Networks, Sensor --- Security measures. --- Engineering. --- Computer organization. --- Computer communication systems. --- Data structures (Computer science). --- Data encryption (Computer science). --- Coding theory. --- Electrical engineering. --- Communications Engineering, Networks. --- Data Encryption. --- Data Structures, Cryptology and Information Theory. --- Computer Communication Networks. --- Computer Systems Organization and Communication Networks. --- Coding and Information Theory. --- Detectors --- Context-aware computing --- Multisensor data fusion --- Telecommunication. --- Data structures (Computer scienc. --- Computer network architectures. --- Cryptology. --- Data Structures and Information Theory. --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Architectures, Computer network --- Network architectures, Computer --- Computer architecture --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Telecommunications --- Communication --- Telecommuting --- Data structures (Computer science) --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Information theory. --- Communication theory --- Cybernetics --- Organization, Computer --- Electronic digital computers --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Electric engineering --- Engineering --- Distributed processing


Book
Versatile Cybersecurity
Authors: --- ---
ISBN: 3319976435 3319976427 Year: 2018 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Cyber security research is one of the important areas in the computer science domain which also plays a major role in the life of almost every individual, enterprise, society and country, which this book illustrates. A large number of advanced security books focus on either cryptography or system security which covers both information and network security. However, there is hardly any books available for advanced-level students and research scholars in security research to systematically study how the major attacks are studied, modeled, planned and combated by the community. This book aims to fill this gap. This book provides focused content related to specific attacks or attack families. These dedicated discussions in the form of individual chapters covers the application or area specific aspects, while discussing the placement of defense solutions to combat the attacks. It includes eight high quality chapters from established security research groups worldwide, which address important attacks from theoretical (modeling) as well as practical aspects. Each chapter brings together comprehensive and structured information on an attack or an attack family. The authors present crisp detailing on the state of the art with quality illustration of defense mechanisms and open research problems. This book also covers various important attacks families such as insider threats, semantics social engineering attacks, distributed denial of service attacks, botnet based attacks, cyber physical malware based attacks, cross-vm attacks, and IoT covert channel attacks. This book will serve the interests of cyber security enthusiasts, undergraduates, post-graduates, researchers and professionals working in this field. .


Book
Decision and Game Theory for Security : 9th International Conference, GameSec 2018, Seattle, WA, USA, October 29–31, 2018, Proceedings
Authors: --- ---
ISBN: 3030015548 303001553X Year: 2018 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The 28 revised full papers presented together with 8 short papers were carefully reviewed and selected from 44 submissions. Among the topical areas covered were: use of game theory; control theory; and mechanism design for security and privacy; decision making for cybersecurity and security requirements engineering; security and privacy for the Internet-of-Things; cyber-physical systems; cloud computing; resilient control systems, and critical infrastructure; pricing; economic incentives; security investments, and cyber insurance for dependable and secure systems; risk assessment and security risk management; security and privacy of wireless and mobile communications, including user location privacy; sociotechnological and behavioral approaches to security; deceptive technologies in cybersecurity and privacy; empirical and experimental studies with game, control, or optimization theory-based analysis for security and privacy; and adversarial machine learning and crowdsourcing, and the role of artificial intelligence in system security.

Keywords

Computer security. --- Artificial intelligence. --- Computer Communication Networks. --- Systems and Data Security. --- Artificial Intelligence. --- Information Systems Applications (incl. Internet). --- e-Commerce/e-business. --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Computer security --- Computer communication systems. --- Application software. --- E-commerce. --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Commerce --- Information superhighway --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Distributed processing


Digital
Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks
Authors: --- ---
ISBN: 9780387462769 Year: 2007 Publisher: Boston, MA Springer Science+Business Media, LLC


Digital
Versatile Cybersecurity
Authors: --- ---
ISBN: 9783319976433 Year: 2018 Publisher: Cham Springer International Publishing

Loading...
Export citation

Choose an application

Bookmark

Abstract

Cyber security research is one of the important areas in the computer science domain which also plays a major role in the life of almost every individual, enterprise, society and country, which this book illustrates. A large number of advanced security books focus on either cryptography or system security which covers both information and network security. However, there is hardly any books available for advanced-level students and research scholars in security research to systematically study how the major attacks are studied, modeled, planned and combated by the community. This book aims to fill this gap. This book provides focused content related to specific attacks or attack families. These dedicated discussions in the form of individual chapters covers the application or area specific aspects, while discussing the placement of defense solutions to combat the attacks. It includes eight high quality chapters from established security research groups worldwide, which address important attacks from theoretical (modeling) as well as practical aspects. Each chapter brings together comprehensive and structured information on an attack or an attack family. The authors present crisp detailing on the state of the art with quality illustration of defense mechanisms and open research problems. This book also covers various important attacks families such as insider threats, semantics social engineering attacks, distributed denial of service attacks, botnet based attacks, cyber physical malware based attacks, cross-vm attacks, and IoT covert channel attacks. This book will serve the interests of cyber security enthusiasts, undergraduates, post-graduates, researchers and professionals working in this field. .


Book
Submodularity in dynamics and control of networked systems
Authors: --- --- ---
ISBN: 3319269755 3319269771 Year: 2016 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book presents a framework for the control of networked systems utilizing submodular optimization techniques. The main focus is on selecting input nodes for the control of networked systems, an inherently discrete optimization problem with applications in power system stability, social influence dynamics, and the control of vehicle formations. The first part of the book is devoted to background information on submodular functions, matroids, and submodular optimization, and presents algorithms for distributed submodular optimization that are scalable to large networked systems. In turn, the second part develops a unifying submodular optimization approach to controlling networked systems based on multiple performance and controllability criteria. Techniques are introduced for selecting input nodes to ensure smooth convergence, synchronization, and robustness to environmental and adversarial noise. Submodular optimization is the first unifying approach towards guaranteeing both performance and controllability with provable optimality bounds in static as well as time-varying networks. Throughout the text, the submodular framework is illustrated with the help of numerical examples and application-based case studies in biological, energy and vehicular systems. The book effectively combines two areas of growing interest, and will be especially useful for researchers in control theory, applied mathematics, networking or machine learning with experience in submodular optimization but who are less familiar with the problems and tools available for networked systems (or vice versa). It will also benefit graduate students, offering consistent terminology and notation that greatly reduces the initial effort associated with beginning a course of study in a new area.


Book
Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks
Authors: --- --- ---
ISBN: 9780387462769 Year: 2007 Publisher: Boston MA Springer US

Loading...
Export citation

Choose an application

Bookmark

Abstract

Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks presents the latest research results in the area of secure localization and time synchronization for both wireless mobile ad hoc networks and wireless sensor networks. Recent advances in computing have exposed the potential security problems inherent in mobile ad hoc and wireless sensor networks. Subject to attacks and intrusions due to its open spectrum nature, wireless network localization and synchronization must be both robust and secure. Localization and time synchronization are critical processes for achieving sensor network security. Furthermore, issues such as energy constraints and mobility make the localization process even more challenging. This edited volume evolved from an ARO special workshop on Localization in Wireless Sensor Networks at the University of Washington, and includes contributions from the leading researchers in secure localization, time synchronization, and protocol verifications. This book presents the challenges posed, potential solutions, and directions for further research, while including implementation studies with mica2 mote sensors. Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks is designed for researchers, developers and practitioners in the area of secure wireless systems. Advanced-level students in computer science, especially in the area of wireless systems and security, will undoubtedly find this an invaluable reference tool. This book is also suitable for use as a textbook for courses in wireless systems and security.


Book
Proceedings of the 5th ACM workshop on Wireless security
Authors: ---
ISBN: 1595935576 Year: 2006 Publisher: ACM

Loading...
Export citation

Choose an application

Bookmark

Abstract

Listing 1 - 10 of 18 << page
of 2
>>
Sort by