 | Exploiting the Power of Group Differences Guozhu Dong This book presents pattern-based problem-solving methods for a variety of machine learning and data analysis problems. The methods are all based on techniques that exploit the power of group differences. They make use of group differences represented… Publication Date: February, 2019
Read More
|
 | Anomaly Detection as a Service Danfeng (Daphne) Yao, Xiaokui Shu, Long Cheng, Salvatore J. Stolfo Anomaly detection has been a long-standing security approach with versatile applications, ranging from securing server programs in critical environments, to detecting insider threats in enterprises, to anti-abuse detection for online social networks…. Publication Date: October, 2017
Read More
|
 | Cyber-Physical Security and Privacy in the Electric Smart Grid Bruce McMillin, Thomas Roth This book focuses on the combined cyber and physical security issues in advanced electric smart grids. Existing standards are compared with classical results and the security and privacy principles of current practice are illustrated. The book paints… Publication Date: August, 2017
Read More
|
 | Blocks and Chains Aljosha Judmayer, Nicholas Stifter, Katharina Krombholz, Edgar Weippl The new field of cryptographic currencies and consensus ledgers, commonly referred to as blockchains, is receiving increasing interest from various different communities. These communities are very diverse and amongst others include:… Publication Date: June, 2017
Read More
|
 | Digital Forensic Science Vassil Roussev Digital forensic science, or digital forensics, is the application of scientific tools and methods to identify, collect, and analyze digital (data) artifacts in support of legal proceedings. From a more technical perspective, it is the process of rec… Publication Date: December, 2016
Read More
|
 | Differential Privacy Ninghui Li, Min Lyu, Dong Su, Weining Yang Over the last decade, differential privacy (DP) has emerged as the de facto standard privacy notion for research in privacy-preserving data analysis and publishing. The DP notion offers strong privacy guarantee and has been applied to many data analy… Publication Date: October, 2016
Read More
|
 | Privacy Risk Analysis Sourya Joyee De, Daniel Le Metayer Privacy Risk Analysis fills a gap in the existing literature by providing an introduction to the basic notions, requirements, and main steps of conducting a privacy risk analysis.
The deployment of new information technologies can l… Publication Date: September, 2016
Read More
|
 | Introduction to Secure Outsourcing Computation Xiaofeng Chen With the rapid development of cloud computing, the enterprises and individuals can outsource their sensitive data into the cloud server where they can enjoy high quality data storage and computing services in a ubiquitous manner. This is known as th… Publication Date: February, 2016
Read More
|
 | Database Anonymization Josep Domingo-Ferrer, David Sanchez, Jordi Soria-Comas The current social and economic context increasingly demands open data to improve scientific research and decision making. However, when published data refer to individual respondents, disclosure risk limitation techniques must be implemented to anon… Publication Date: January 11, 2016
Read More
|
 | Automated Software Diversity Per Larsen, Stefan Brunthaler, Lucas Davi, Ahmad-Reza Sadeghi, Michael Franz Whereas user-facing applications are often written in modern languages, the firmware, operating system, support libraries, and virtual machines that underpin just about any modern computer system are still written in low-level languages that value f… Publication Date: December 23, 2015
Read More
|
 | Trust in Social Media Jiliang Tang, Huan Liu Social media greatly enables people to participate in online activities and shatters the barrier for online users to create and share information at any place at any time. However, the explosion of user-generated content poses novel challenges for on… Publication Date: September, 2015
Read More
|
 | Physically Unclonable Functions (PUFs) Christian Wachsmann, Ahmad-Reza Sadeghi Today, embedded systems are used in many security-critical applications, from access control, electronic tickets, sensors, and smart devices (e.g., wearables) to automotive applications and critical infrastructures. These systems are increasingly use… Publication Date: 12/01/2014
Read More
|
 | Usable Security Simson Garfinkel, Heather Richter Lipford There has been roughly 15 years of research into approaches for aligning research in Human Computer Interaction with computer Security, more colloquially known as “usable security.” Although usability and security were once thought to be inherently a… Publication Date: 09/01/2014
Read More
|
 | Reversible Digital Watermarking Ruchira Naskar, Rajat Subhra Chakraborty Digital Watermarking is the art and science of embedding information in existing digital content for Digital Rights Management (DRM) and authentication. Reversible watermarking is a class of (fragile) digital watermarking that not only authenticates … Publication Date: 02/01/2014
Read More
|
 | Mobile Platform Security N. Asokan, Lucas Davi, Alexandra Dmitrienko, Stephan Heuser Recently, mobile security has garnered considerable interest in both the research community and industry due to the popularity of smartphones. The current smartphone platforms are open systems that allow application development, also for malicious pa… Publication Date: 12/01/2013
Read More
|
 | Security and Trust in Online Social Networks Barbara Carminati, Elena Ferrari, Marco Viviani The enormous success and diffusion that online social networks (OSNs) are encountering nowadays is vastly apparent. Users’ social interactions now occur using online social media as communication channels; personal information and activities are easi… Publication Date: 12/01/2013
Read More
|
 | RFID Security and Privacy Yingjiu Li, Robert Deng, Elisa Bertino As a fast-evolving new area, RFID security and privacy has quickly grown from a hungry infant to an energetic teenager during recent years. Much of the exciting development in this area is summarized in this book with rigorous analyses and insightful… Publication Date: 12/01/2013
Read More
|
 | Hardware Malware Edgar Weippl, Christian Krieg, Adrian Dabrowski, Heidelinde Hobel, Katharina Krombholz In our digital world, integrated circuits are present in nearly every moment of our daily life. Even when using the coffee machine in the morning, or driving our car to work, we interact with integrated circuits. The increasing spread of information … Publication Date: 09/01/2013
Read More
|
 | Private Information Retrieval Xun Yi, Russell Paulet, Elisa Bertino This book deals with Private Information Retrieval (PIR), a technique allowing a user to retrieve an element from a server in possession of a database without revealing to the server which element is retrieved. PIR has been widely applied to protect … Publication Date: 09/01/2013
Read More
|
 | Privacy for Location-based Services Gabriel Ghinita Sharing of location data enables numerous exciting applications, such as location-based queries, location-based social recommendations, monitoring of traffic and air pollution levels, etc. Disclosing exact user locations raises serious privacy concer… Publication Date: 04/01/2013
Read More
|