Narrow your search

Library

KU Leuven (12)

Odisee (8)

Thomas More Kempen (8)

Thomas More Mechelen (8)

UCLL (8)

VIVES (8)

UGent (7)

ULiège (7)

ULB (6)

KBC (5)

More...

Resource type

book (18)

digital (4)


Language

English (22)


Year
From To Submit

2023 (3)

2022 (3)

2021 (3)

2019 (2)

2017 (1)

More...
Listing 1 - 10 of 22 << page
of 3
>>
Sort by

Book
Information Systems Security : 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014. Proceedings
Authors: ---
ISBN: 3319138405 3319138413 Year: 2014 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 10th International Conference on Information Systems Security, ICISS 2014, held in Hyderabad, India, in December 2014. The 20 revised full papers and 5 short papers presented together with 3 invited papers were carefully reviewed and selected from 129 submissions. The papers address the following topics: security inferences; security policies; security user interfaces; security attacks; malware detection; forensics; and location based security services.


Digital
Information Systems Security : 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014, Proceedings
Authors: ---
ISBN: 9783319138411 Year: 2014 Publisher: Cham Springer International Publishing

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 10th International Conference on Information Systems Security, ICISS 2014, held in Hyderabad, India, in December 2014. The 20 revised full papers and 5 short papers presented together with 3 invited papers were carefully reviewed and selected from 129 submissions. The papers address the following topics: security inferences; security policies; security user interfaces; security attacks; malware detection; forensics; and location based security services.


Book
Real time programming : languages, specification and verification
Authors: ---
ISBN: 1282760270 9786612760273 9812814027 9789812814029 9810225660 9789810225667 9781282760271 6612760273 Year: 2010 Publisher: Singapore ; Hackensack, NJ ; London : World Scientific,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The primary aim of this monograph is to present the current research efforts that have gone into/or going on in the systematic design of real-time programs. Such an effort would help researchers and users in the area to get a clear picture of the issues of specification, verification and design of real-time reactive programs. It will clearly enable us to identify languages that can be used for different kinds of applications. Obviously, in an upcoming area like this, this presentation is far from complete. The quintessence of the monograph can be captured by the following question: How can


Book
Foundations of software technology and theoretical computer science : fourth conference, Bangalore, India, Dec. 13-15, 1984, proceedings
Authors: ---
ISBN: 0387138838 Year: 1984 Publisher: Berlin New York Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Information Systems Security : 13th International Conference, ICISS 2017, Mumbai, India, December 16-20, 2017, Proceedings
Authors: --- ---
ISBN: 331972598X 3319725971 Year: 2017 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 13th International Conference on Information Systems Security, ICISS 2017, held in Mumbai, India, in December 2017. The 17 revised full papers and 7 short papers presented together with 2 invited papers were carefully reviewed and selected from 73 submissions. The papers address the following topics:  privacy/cryptography, systems security, security analysis, identity management and access control, security attacks and detection, network security.

Keywords

Computer science. --- Computer communication systems. --- Data structures (Computer science). --- Computers and civilization. --- Computers. --- Law and legislation. --- Computer Science. --- Security. --- Data Structures, Cryptology and Information Theory. --- Computers and Society. --- Computer Communication Networks. --- Legal Aspects of Computing. --- Information Systems Applications (incl. Internet). --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Civilization and computers --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Informatics --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Civilization --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Science --- Distributed processing --- Data protection. --- Data structures (Computer scienc. --- Computers --- Data Structures and Information Theory. --- Data structures (Computer science) --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Law and legislation --- Computer security --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software


Book
Compute 2013 : the 6th ACM India Computing Convention Next Generation Computing Paradigms and Technologies : 22-24, August 2013
Authors: ---
ISBN: 1450325459 Year: 2013 Publisher: [Place of publication not identified] ACM

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Information systems security : 17th international conference, ICISS 2021, Patna, India, December 16-20, 2021 : proceedings
Authors: --- ---
ISBN: 3030925714 3030925706 Year: 2021 Publisher: Cham, Switzerland : Springer International Publishing,


Digital
Information Systems Security : 17th International Conference, ICISS 2021, Patna, India, December 16-20, 2021, Proceedings
Authors: --- ---
ISBN: 9783030925710 9783030925727 9783030925703 Year: 2021 Publisher: Cham Springer International Publishing

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the proceedings of the 17th International Conference on Information Systems Security, ICISS 2021, held in Patna, India, during December 16-20, 2021. The 9 regular papers, 2 short papers and 4 work-in-progress papers included in this volume were carefully reviewed and selected from a total of 48 submissions. The papers were organized in topical sections named: attack detection, malware identification, data security in distributed systems, and applied cryptography.


Book
Information Systems Security : 15th International Conference, ICISS 2019, Hyderabad, India, December 16–20, 2019, Proceedings
Authors: --- ---
ISBN: 3030369455 3030369447 Year: 2019 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the proceedings of the 15th International Conference on Information Systems Security, ICISS 2019, held in Hyderabad, India, in December 2019. The 13 revised full papers and 4 short papers presented in this book together with 4 abstracts of invited talks were carefully reviewed and selected from 63 submissions. The papers cover topics such as: smart contracts; formal techniques; access control; machine learning; distributed systems; cryptography; online social networks; images and cryptography.

Keywords

Computer security --- Data protection. --- Optical data processing. --- Computer communication systems. --- Special purpose computers. --- Application software. --- Database management. --- Security. --- Image Processing and Computer Vision. --- Computer Communication Networks. --- Special Purpose and Application-Based Systems. --- Information Systems Applications (incl. Internet). --- Database Management. --- Optical computing --- Visual data processing --- Bionics --- Electronic data processing --- Integrated optics --- Photonics --- Computers --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Data base management --- Data services (Database management) --- Database management services --- DBMS (Computer science) --- Generalized data management systems --- Services, Database management --- Systems, Database management --- Systems, Generalized database management --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Special purpose computers --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Optical equipment --- Distributed processing


Book
Compute 2011 : proceedings of the fourth annual ACM Bangalore Conference : March 25-26, 2011, Bangalore, India
Authors: --- ---
ISBN: 1450307507 Year: 2011 Publisher: [Place of publication not identified] ACM

Loading...
Export citation

Choose an application

Bookmark

Abstract

Listing 1 - 10 of 22 << page
of 3
>>
Sort by