Narrow your search

Library

KU Leuven (4)

VUB (4)

ULB (3)

ULiège (3)

AP (2)

KDG (2)

Odisee (2)

Thomas More Kempen (2)

Thomas More Mechelen (2)

UCLL (2)

More...

Resource type

book (8)

digital (2)


Language

English (9)


Year
From To Submit

2022 (2)

2019 (2)

2006 (3)

2004 (1)

2001 (1)

Listing 1 - 9 of 9
Sort by
Studying physics.
Author:
ISBN: 140390328X Year: 2004 Publisher: New York (N.Y.) Palgrave Macmillan

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Understanding intrusion detection through visualization
Authors: ---
ISBN: 1280609311 9786610609314 038727636X 0387276343 1441939067 Year: 2006 Volume: v. 24 Publisher: New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

With the ever increasing use of computers for critical systems, computer security that protects data and computer systems from intentional, malicious intervention, continues to attract significant attention. Among the methods for defense, the application of a tool to help the operator identify ongoing or already perpetrated attacks (intrusion detection), has been the subject of considerable research in the past ten years. A key problem with current intrusion detection systems is the high number of false alarms they produce. Understanding Intrusion Detection through Visualization presents research on why false alarms are, and will remain a problem; then applies results from the field of information visualization to the problem of intrusion detection. This approach promises to enable the operator to identify false (and true) alarms, while aiding the operator to identify other operational characteristics of intrusion detection systems. This volume presents four different visualization approaches, mainly applied to data from web server access logs. Understanding Intrusion Detection through Visualization is structured for security professionals, researchers and practitioners. This book is also suitable for graduate students in computer science.

Keywords

Computer networks --- Information visualization. --- Computer security. --- Security measures. --- Computer science. --- Computer communication systems. --- Data structures (Computer science). --- Data encryption (Computer science). --- Computer graphics. --- Pattern recognition. --- Computer Science. --- Data Encryption. --- Computer Imaging, Vision, Pattern Recognition and Graphics. --- Pattern Recognition. --- Data Structures, Cryptology and Information Theory. --- Computer Communication Networks. --- Design perception --- Pattern recognition --- Form perception --- Perception --- Figure-ground perception --- Automatic drafting --- Graphic data processing --- Graphics, Computer --- Computer art --- Graphic arts --- Electronic data processing --- Engineering graphics --- Image processing --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- File organization (Computer science) --- Abstract data types (Computer science) --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Informatics --- Science --- Digital techniques --- Distributed processing --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Data visualization --- Visualization of information --- Information science --- Visual analytics --- Computer network security --- Network security, Computer --- Security of computer networks --- Protection --- Security measures --- Computer vision. --- Optical pattern recognition. --- Data structures (Computer scienc. --- Cryptology. --- Data Structures and Information Theory. --- Optical data processing --- Pattern perception --- Perceptrons --- Visual discrimination --- Machine vision --- Vision, Computer --- Artificial intelligence --- Pattern recognition systems --- Data structures (Computer science) --- Optical data processing. --- Optical computing --- Visual data processing --- Bionics --- Integrated optics --- Photonics --- Optical equipment


Digital
Understanding Intrusion Detection Through Visualization
Authors: ---
ISBN: 9780387276366 Year: 2006 Publisher: Boston, MA Springer Science+Business Media, Inc

Programming Languages and Systems : 10th European Symposium on Programming, ESOP 2001 Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2001 Genova, Italy, April 2-6, 2001 Proceedings
Authors: ---
ISSN: 03029743 ISBN: 3540418628 9783540418627 3540453091 Year: 2001 Volume: 2028 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

ETAPS 2001 was the fourth instance of the European Joint Conferences on Theory and Practice of Software. ETAPS is an annual federated conference that was established in 1998 by combining a number of existing and new conferences. This year it comprised ve conferences (FOSSACS, FASE, ESOP, CC, TACAS), ten satellite workshops (CMCS, ETI Day, JOSES, LDTA, MMAABS, PFM, RelMiS, UNIGRA, WADT, WTUML), seven invited lectures, a debate, and ten tutorials. The events that comprise ETAPS address various aspects of the system de- lopment process, including speci cation, design, implementation, analysis, and improvement. The languages, methodologies, and tools which support these - tivities are all well within its scope. Di erent blends of theory and practice are represented, with an inclination towards theory with a practical motivation on one hand and soundly-based practice on the other. Many of the issues involved in software design apply to systems in general, including hardware systems, and the emphasis on software is not intended to be exclusive.

Keywords

Computer programming --- Programming languages (Electronic computers) --- Programmation (Informatique) --- Langages de programmation --- Congresses. --- Congrès --- Computer science. --- Software engineering. --- Computer programming. --- Programming languages (Electronic computers). --- Computer logic. --- Mathematical logic. --- Computer Science. --- Software Engineering/Programming and Operating Systems. --- Programming Languages, Compilers, Interpreters. --- Programming Techniques. --- Software Engineering. --- Logics and Meanings of Programs. --- Mathematical Logic and Formal Languages. --- Logic design. --- Design, Logic --- Design of logic systems --- Digital electronics --- Electronic circuit design --- Logic circuits --- Machine theory --- Switching theory --- Informatics --- Science --- Computer software engineering --- Engineering --- Algebra of logic --- Logic, Universal --- Mathematical logic --- Symbolic and mathematical logic --- Symbolic logic --- Mathematics --- Algebra, Abstract --- Metamathematics --- Set theory --- Syllogism --- Computer science logic --- Logic, Symbolic and mathematical --- Computers --- Electronic computer programming --- Electronic data processing --- Electronic digital computers --- Programming (Electronic computers) --- Coding theory --- Computer languages --- Computer program languages --- Computer programming languages --- Machine language --- Languages, Artificial --- Programming --- Computer programming - Congresses --- Programming languages (Electronic computers) - Congresses


Book
Principles of Security and Trust : 8th International Conference, POST 2019, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019, Prague, Czech Republic, April 6–11, 2019, Proceedings
Authors: --- ---
ISBN: 3030171388 303017137X Year: 2019 Publisher: Springer Nature

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book is Open Access under a CC BY licence.

Keywords

Computer security. --- Software engineering. --- Artificial intelligence. --- Computer system performance. --- Computer science. --- Information theory. --- Systems and Data Security. --- Software Engineering/Programming and Operating Systems. --- Artificial Intelligence. --- System Performance and Evaluation. --- Computing Milieux. --- Theory of Computation. --- Communication theory --- Communication --- Cybernetics --- Informatics --- Science --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Computer software engineering --- Engineering --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Computer system failures. --- Computers. --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Calculators --- Cyberspace --- Computer failures --- Computer malfunctions --- Failure of computer systems --- System failures (Engineering) --- Fault-tolerant computing --- Failures --- Computer science --- Computer security --- Software engineering --- Artificial intelligence --- Computer system failures


Book
Understanding Intrusion Detection Through Visualization
Authors: --- ---
ISBN: 9780387276366 Year: 2006 Publisher: Boston, MA Springer Science+Business Media, Inc.

Loading...
Export citation

Choose an application

Bookmark

Abstract

With the ever increasing use of computers for critical systems, computer security that protects data and computer systems from intentional, malicious intervention, continues to attract significant attention. Among the methods for defense, the application of a tool to help the operator identify ongoing or already perpetrated attacks (intrusion detection), has been the subject of considerable research in the past ten years. A key problem with current intrusion detection systems is the high number of false alarms they produce. Understanding Intrusion Detection through Visualization presents research on why false alarms are, and will remain a problem; then applies results from the field of information visualization to the problem of intrusion detection. This approach promises to enable the operator to identify false (and true) alarms, while aiding the operator to identify other operational characteristics of intrusion detection systems. This volume presents four different visualization approaches, mainly applied to data from web server access logs. Understanding Intrusion Detection through Visualization is structured for security professionals, researchers and practitioners. This book is also suitable for graduate students in computer science.


Book
Principles of Security and Trust
Authors: --- ---
ISBN: 9783030171384 Year: 2019 Publisher: Cham Springer International Publishing :Imprint: Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords


Book
Physics Teacher Education
Authors: --- --- --- ---
ISBN: 9783031061936 Year: 2022 Publisher: Cham Springer International Publishing :Imprint: Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract


Multi
Physics Teacher Education
Authors: --- --- --- ---
ISBN: 9783031061936 9783031061929 9783031061943 9783031061950 Year: 2022 Publisher: Cham Springer International Publishing :Imprint: Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book presents the most up-to-date research contributions focusing on progress in the field of physics education. It provides researches and results that are based on the most relevant matters in physics teacher education and how these matters can be improved for the satisfaction of both teachers and learners. The work is the by-product of the collaboration between GIREP (the International Research Group on Physics Teaching) and the University of Malta. The contributing authors present close examinations of the following topics: ICT and multimedia in teacher education; experiments and laboratory work in teacher education; the role of quantum mechanics in teaching and learning physics; formal, non-formal and informal aspects of physics education at the primary level; strategies for pre-service physics teacher education at all levels; and in-service teacher professional learning strategies. The editors hope that many different stakeholders within scientific academia will find something of value in this compilation of the current most advanced ideas in physics education.

Listing 1 - 9 of 9
Sort by