Narrow your search

Library

AP (6)

KDG (6)

VUB (6)

KU Leuven (5)

Odisee (5)

Thomas More Kempen (5)

Thomas More Mechelen (5)

UCLL (5)

UGent (5)

ULB (5)

More...

Resource type

book (11)

digital (6)


Language

English (15)


Year
From To Submit

2022 (2)

2021 (2)

2020 (6)

2018 (2)

2017 (1)

More...
Listing 1 - 10 of 15 << page
of 2
>>
Sort by

Book
Game theory for security and risk management : from theory to practice
Authors: ---
ISBN: 3319752677 3319752685 9783319752679 3030091864 9783030091866 Year: 2018 Publisher: Cham : Springer International Publishing : Imprint: Birkhäuser,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The chapters in this volume explore how various methods from game theory can be utilized to optimize security and risk-management strategies. Emphasizing the importance of connecting theory and practice, they detail the steps involved in selecting, adapting, and analyzing game-theoretic models in security engineering and provide case studies of successful implementations in different application domains. Practitioners who are not experts in game theory and are uncertain about incorporating it into their work will benefit from this resource, as well as researchers in applied mathematics and computer science interested in current developments and future directions. The first part of the book presents the theoretical basics, covering various different game-theoretic models related to and suitable for security engineering. The second part then shows how these models are adopted, implemented, and analyzed. Surveillance systems, interconnected networks, and power grids are among the different application areas discussed. Finally, in the third part, case studies from business and industry of successful applications of game-theoretic models are presented, and the range of applications discussed is expanded to include such areas as cloud computing, Internet of Things, and water utility networks.


Digital
Game Theory for Security and Risk Management : From Theory to Practice
Authors: ---
ISBN: 9783319752686 Year: 2018 Publisher: Cham Springer International Publishing, Imprint: Birkhäuser

Loading...
Export citation

Choose an application

Bookmark

Abstract

The chapters in this volume explore how various methods from game theory can be utilized to optimize security and risk-management strategies.  Emphasizing the importance of connecting theory and practice, they detail the steps involved in selecting, adapting, and analyzing game-theoretic models in security engineering and provide case studies of successful implementations in different application domains.  Practitioners who are not experts in game theory and are uncertain about incorporating it into their work will benefit from this resource, as well as researchers in applied mathematics and computer science interested in current developments and future directions. The first part of the book presents the theoretical basics, covering various different game-theoretic models related to and suitable for security engineering.  The second part then shows how these models are adopted, implemented, and analyzed.  Surveillance systems, interconnected networks, and power grids are among the different application areas discussed.  Finally, in the third part, case studies from business and industry of successful applications of game-theoretic models are presented, and the range of applications discussed is expanded to include such areas as cloud computing, Internet of Things, and water utility networks.


Book
S-BPM Illustrated : A Storybook about Business Process Modeling and Execution
Authors: --- ---
ISBN: 3642369030 3642369049 Year: 2013 Publisher: Springer Nature

Loading...
Export citation

Choose an application

Bookmark

Abstract

S-BPM stands for “subject-oriented business process management” and focuses on subjects that represent the entities (people, programs etc.) that are actively engaged in processes. S-BPM has become one of the most widely discussed approaches for process professionals. Its potential particularly lies in the integration of advanced information technology with organizational and managerial methods to foster and leverage business innovation, operational excellence and intra- and inter-organizational collaboration. Thus S-BPM can also be understood as a stakeholder-oriented and social business process management methodology. In this book, the authors show how S-BPM and its tools can be used in order to solve communication and synchronization problems involving humans and/or machines in an organization. All the activities needed in order to implement a business process are shown step by step; it starts by analyzing the problem, continues with modeling and validating the corresponding process, and finishes off by embedding the process into the organization. The final result is a workflow that executes the process without the need for any programming. To this end, in the first step a very simple process is implemented, which is subsequently extended and improved in “adaption projects,” because additional problems have to be solved. This approach reflects the organizational reality, in which processes must always be changed and adapted to new requirements. This is a hands-on book, written by professionals for professionals, with a clear and concise style, a wealth of illustrations (as the title suggests), and focusing on an ongoing example with a real industrial background. Readers who want to execute all the steps by themselves can simply download the S-BPM tool suite from the www.i2pm.net website.


Digital
S-BPM Illustrated : A Storybook about Business Process Modeling and Execution
Authors: --- ---
ISBN: 9783642369049 Year: 2013 Publisher: Berlin, Heidelberg Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract

S-BPM stands for “subject-oriented business process management” and focuses on subjects that represent the entities (people, programs etc.) that are actively engaged in processes. S-BPM has become one of the most widely discussed approaches for process professionals. Its potential particularly lies in the integration of advanced information technology with organizational and managerial methods to foster and leverage business innovation, operational excellence and intra- and inter-organizational collaboration. Thus S-BPM can also be understood as a stakeholder-oriented and social business process management methodology. In this book, the authors show how S-BPM and its tools can be used in order to solve communication and synchronization problems involving humans and/or machines in an organization. All the activities needed in order to implement a business process are shown step by step; it starts by analyzing the problem, continues with modeling and validating the corresponding process, and finishes off by embedding the process into the organization. The final result is a workflow that executes the process without the need for any programming. To this end, in the first step a very simple process is implemented, which is subsequently extended and improved in “adaption projects,” because additional problems have to be solved. This approach reflects the organizational reality, in which processes must always be changed and adapted to new requirements. This is a hands-on book, written by professionals for professionals, with a clear and concise style, a wealth of illustrations (as the title suggests), and focusing on an ongoing example with a real industrial background. Readers who want to execute all the steps by themselves can simply download the S-BPM tool suite from the www.i2pm.net website.


Book
Decision and Game Theory for Security : 8th International Conference, GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings
Authors: --- --- --- ---
ISBN: 3319687115 3319687107 Year: 2017 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 8th International Conference on Decision and Game Theory for Security, GameSec 2017, held in Vienna, Austria, in October 2017. The 24 revised full papers presented together with 4 short papers were carefully reviewed and selected from 71 submissions. The papers address topics such as Game theory and mechanism design for security and privacy; Pricing and economic incentives for building dependable and secure systems; Dynamic control, learning, and optimization and approximation techniques; Decision making and decision theory for cybersecurity and security requirements engineering; Socio-technological and behavioral approaches to security; Risk assessment and risk management; Security investment and cyber insurance; Security and privacy for the Internet-of-Things (IoT), cyber-physical systems, resilient control systems; New approaches for security and privacy in cloud computing and for critical infrastructure; Security and privacy of wireless and mobile communications, including user location privacy; Game theory for intrusion detection; and Empirical and experimental studies with game-theoretic or optimization analysis for security and privacy.

Keywords

Computer science. --- Computer communication systems. --- Computer security. --- Algorithms. --- Management information systems. --- Game theory. --- Computer Science. --- Systems and Data Security. --- Information Systems Applications (incl. Internet). --- Computer Communication Networks. --- Algorithm Analysis and Problem Complexity. --- Management of Computing and Information Systems. --- Game Theory, Economics, Social and Behav. Sciences. --- Games, Theory of --- Theory of games --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Algorism --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Informatics --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Protection --- Security measures --- Mathematical models --- Mathematics --- Sociotechnical systems --- Information resources management --- Management --- Algebra --- Arithmetic --- Data protection --- Security systems --- Hacking --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Science --- Communication systems --- Foundations --- Distributed processing --- Computer software. --- Information Systems. --- Mathematics. --- Math --- Software, Computer --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software


Book
Quantum Random Number Generation : Theory and Practice
Authors: --- --- ---
ISBN: 3319725963 3319725947 Year: 2020 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book provides an overview of state-of-the-art implementations of quantum random number generators (QRNGs), and especially examines their relation to classical statistical randomness models and numerical techniques for computing random numbers. The reader – who ideally has a background in classical statistics, computer science, or cryptography – is introduced to the world of quantum bits step by step, and explicit relations between QRNGs and their classical counterparts are identified along the way. Random number generation is a major pillar of cryptography. Capitalizing on the randomness inherent in quantum phenomena is a rapidly evolving branch of quantum cryptography with countless applications for the future. The value of quantum randomness for cryptographic purposes is empirically demonstrated in statistical evaluations of QRNGs’ performance compared to classical techniques for true and pseudorandom number generation. The book then provides an overview of technical implementations of QRNGs, before a concluding discussion of major achievements and remaining obstacles in the field rounds out the coverage, while also opening the door for future research directions.


Book
Cyber-Security in Critical Infrastructures : A Game-Theoretic Approach
Authors: --- --- ---
ISBN: 3030469085 3030469077 Year: 2020 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book presents a compendium of selected game- and decision-theoretic models to achieve and assess the security of critical infrastructures. Given contemporary reports on security incidents of various kinds, we can see a paradigm shift to attacks of an increasingly heterogeneous nature, combining different techniques into what we know as an advanced persistent threat. Security precautions must match these diverse threat patterns in an equally diverse manner; in response, this book provides a wealth of techniques for protection and mitigation. Much traditional security research has a narrow focus on specific attack scenarios or applications, and strives to make an attack “practically impossible.” A more recent approach to security views it as a scenario in which the cost of an attack exceeds the potential reward. This does not rule out the possibility of an attack but minimizes its likelihood to the least possible risk. The book follows this economic definition of security, offering a management scientific view that seeks a balance between security investments and their resulting benefits. It focuses on optimization of resources in light of threats such as terrorism and advanced persistent threats. Drawing on the authors’ experience and inspired by real case studies, the book provides a systematic approach to critical infrastructure security and resilience. Presenting a mixture of theoretical work and practical success stories, the book is chiefly intended for students and practitioners seeking an introduction to game- and decision-theoretic techniques for security. The required mathematical concepts are self-contained, rigorously introduced, and illustrated by case studies. The book also provides software tools that help guide readers in the practical use of the scientific models and computational frameworks.


Digital
Decision and Game Theory for Security : 12th International Conference, GameSec 2021, Virtual Event, October 25-27, 2021, Proceedings
Authors: --- --- ---
ISBN: 9783030903701 9783030903718 9783030903695 Year: 2021 Publisher: Cham Springer International Publishing

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 12th International Conference on Decision and Game Theory for Security, GameSec 2021,held in October 2021. Due to COVID-19 pandemic the conference was held virtually. The 20 full papers presented were carefully reviewed and selected from 37 submissions. The papers focus on Theoretical Foundations in Equilibrium Computation; Machine Learning and Game Theory; Ransomware; Cyber-Physical Systems Security; Innovations in Attacks and Defenses.


Digital
Quantum Key Distribution Networks : A Quality of Service Perspective
Authors: --- --- ---
ISBN: 9783031066085 9783031066078 9783031066092 9783031066108 Year: 2022 Publisher: Cham Springer International Publishing

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book focuses on practical implementation details, telecommunication techniques, security and technology challenges and approaches to implementing quantum technology in modern telecommunication systems. The authors use their extensive practical academic and industrial experience in network technologies and provide details from international projects in quantum cryptography in which they actively participate. Using a variety of examples, analogies, illustrations, tables, and features from practical quantum network realizations, the authors provide a unique view of quantum technology from an engineering telecommunication standpoint, allowing the reader to identify the advantages and challenges of quantum technology. This book also addresses challenges posed by quantum technology such as network organization, passive and active eavesdropping, and future trends in QKD such as Software Defined Networking (SDN) with QKD and application QKD in 5G networks. It is conceived through eight chapters by treating the following thematic units separately: Fundamentals of Quantum Key Distribution, QoS architecture/mode, QoS MAC layer, QoS signaling techniques for key management and session negotiation purpose and QoS routing protocols that minimize the consumption of key material through the equitable utilization of network resources when finding an optimal path. Through numerous information on practical solutions, simulation examples, illustrations, and analysis, readers can easily distinguish the specificity of quantum technology and understand the challenges and methods of practical implementation of quantum cryptography in common telecommunications standards. Researchers working in quantum technology and applied networking security as well as advanced-level students studying computer science and electrical engineering will benefit from this book. Professionals working within these related fields will also benefit from this book.


Book
Quantum Key Distribution Networks
Authors: --- --- --- ---
ISBN: 9783031066085 Year: 2022 Publisher: Cham Springer International Publishing :Imprint: Springer

Listing 1 - 10 of 15 << page
of 2
>>
Sort by