Narrow your search
Listing 1 - 10 of 24 << page
of 3
>>
Sort by

Book
Nonhuman Witnessing : War, Data, and Ecology after the End of the World.
Author:
ISBN: 9781478027782 1478093935 1478027789 Year: 2024 Publisher: Durham : Duke University Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Michael Richardson argues that a radical rethinking of what counts as witnessing is central to building a framework for justice, suggesting that nonhuman witnessing is central to combat contemporary global crises.


Book
Privacy-preserving computing : for big data analytics and AI
Authors: ---
ISBN: 1009299530 1009299514 Year: 2024 Publisher: Cambridge : Cambridge University Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Privacy-preserving computing aims to protect the personal information of users while capitalizing on the possibilities unlocked by big data. This practical introduction for students, researchers, and industry practitioners is the first cohesive and systematic presentation of the field's advances over four decades. The book shows how to use privacy-preserving computing in real-world problems in data analytics and AI, and includes applications in statistics, database queries, and machine learning. The book begins by introducing cryptographic techniques such as secret sharing, homomorphic encryption, and oblivious transfer, and then broadens its focus to more widely applicable techniques such as differential privacy, trusted execution environment, and federated learning. The book ends with privacy-preserving computing in practice in areas like finance, online advertising, and healthcare, and finally offers a vision for the future of the field.


Book
Secure Voice Processing Systems against Malicious Voice Attacks
Authors: ---
ISBN: 3031447484 Year: 2024 Publisher: Cham : Springer Nature Switzerland : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book provides readers with the basic understanding regarding the threats to the voice processing systems, the state-of-the-art defense methods as well as the current research results on securing voice processing systems. It also introduces three mechanisms to secure the voice processing systems against malicious voice attacks under different scenarios, by utilizing time-domain signal waves, frequency-domain spectrum features and acoustic physical attributes. First, the authors uncover the modulated replay attack, which uses an inverse filter to compensate for the spectrum distortion caused by the replay attacks to bypass the existing spectrum-based defenses. The authors also provide an effective defense method that utilizes both the time-domain artifacts and frequency-domain distortion to detect the modulated replay attacks. Second, the book introduces a secure automatic speech recognition system for driverless car to defeat adversarial voice command attacks launched from car loudspeakers, smartphones and passengers. Third, it provides an acoustic compensation system design to reduce the effects from the spectrum reduction attacks, by the audio spectrum compensation and acoustic propagation principle. Finally, the authors conclude with their research effort on defeating the malicious voice attacks and provide insights into more secure voice processing systems. This book is intended for security researchers, computer scientists and electrical engineers who are interested in the research areas of biometrics, speech signal processing, IoT security and audio security. Advanced-level students who are studying these topics will benefit from this book as well.


Book
Dit wil je écht niet weten : over de onvoorstelbare wereld achter je scherm
Author:
ISBN: 9789463812160 Year: 2024 Publisher: Amsterdam Podium

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Secure and Resilient Digital Transformation of Healthcare : First Workshop, SUNRISE 2023, Stavanger, Norway, November 30, 2023, Proceedings
Authors: --- --- ---
ISBN: 3031558294 Year: 2024 Publisher: Cham : Springer Nature Switzerland : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This CCIS post conference volume constitutes the proceedings of First Workshop, SUNRISE 2023, in Stavanger, Norway, in November 2023. The 4 full papers together in this volume were carefully reviewed and selected from 9 submissions. The workshop offers a wide range of techniques addressing cybersecurity skills, access control, privacy risks, and resilience in healthcare systems.


Digital
Handboek gegevensbescherming in de diepte & in de praktijk
Authors: --- ---
ISBN: 9789464662252 Year: 2024 Publisher: Leuven LeA Uitgevers

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
The privacy fallacy : harm and power in the information economy
Author:
ISBN: 9781108995825 1108995829 9781316518113 9781108995443 Year: 2024 Publisher: Cambridge, United Kingdom ; New York, NY : Cambridge University Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Our privacy is besieged by tech companies. Companies can do this because our laws are built on outdated ideas that trap lawmakers, regulators, and courts into wrong assumptions about privacy, resulting in ineffective legal remedies to one of the most pressing concerns of our generation. Drawing on behavioral science, sociology, and economics, Ignacio Cofone challenges existing laws and reform proposals and dispels enduring misconceptions about data-driven interactions. This exploration offers readers a holistic view of why current laws and regulations fail to protect us against corporate digital harms, particularly those created by AI. Cofone then proposes a better response: meaningful accountability for the consequences of corporate data practices, which ultimately entails creating a new type of liability that recognizes the value of privacy.


Book
Continuous Biometric Authentication Systems : An Overview
Author:
ISBN: 3031490711 Year: 2024 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book offers an overview of the field of continuous biometric authentication systems, which capture and continuously authenticate biometrics from user devices. This book first covers the traditional methods of user authentication and discusses how such techniques have become cumbersome in the world of mobile devices and short usage sessions. The concept of continuous biometric authentication systems is introduced and their construction is discussed. The different biometrics that these systems may utilise (e.g.: touchscreen-gesture interactions) are described and relevant studies surveyed. It also surveys important considerations and challenges. This book brings together a wide variety of key motivations, components and advantages of continuous biometric authentication systems. The overview is kept high level, so as not to limit the scope to any single device, biometric trait, use-case, or scenario. Therefore, the contents of this book are applicable to devices ranging from smartphones to desktop computers, utilising biometrics ranging from face recognition to keystroke dynamics. It also provides metrics from a variety of existing systems such that users can identify the advantages and disadvantages of different approaches. This book targets researchers and lecturers working in authentication, as well as advanced-level students in computer science interested in this field. The book will also be of interest to technical professionals working in cyber security.


Book
Notions of Privacy at Early Modern European Courts : Reassessing the Public and Private Divide, 1400-1800.
Authors: --- ---
ISBN: 9789048555154 9048555159 Year: 2024 Publisher: Amsterdam : Amsterdam University Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Grand, extravagant, magnificent, scandalous, corrupt, political, personal, fractious; these are terms often associated with the medieval and early modern courts. Moreover, the court constituted a forceful nexus in the social world, which was central to the legitimacy and authority of rulership. As such, courts shaped European politics and culture: architecture, art, fashion, patronage, and cultural exchanges were integral to the spectacle of European courts. Researchers have convincingly emphasised the public nature of courtly events, procedures, and ceremonies. Nevertheless, court life also involved pockets of privacy, which have yet to be systematically addressed. This edited collection addresses this lacuna and offers interpretations that urge us to reassesses the public nature of European courts. Thus, the proposed publication will fertilise the grounds for a discussion of the past and future of court studies. Indeed, the contributions make us reconsider present-day understandings of privacy as a stable and uncontestable notion.


Book
Introduction to cybersecurity : a multidisciplinary challenge
Author:
ISBN: 9783031414633 9783031414626 Year: 2024 Publisher: Cham Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract

Cybersecurity is a necessity in the modern world, where computers and other electronic devices communicate via networks, and breakdowns in cybersecurity cost society many resources. The aims of cybersecurity are quite simple: data must not be read, modified, deleted or made unavailable by persons who are not allowed to. To meet this major challenge successfully in the digitally interconnected world, one needs to master numerous disciplines because modern IT systems contain software, cryptographic modules, computing units, networks, and human users—all of which can influence the success or failure in the effort. Topics and features: Introduces readers to the main components of a modern IT system: basic hardware, networks, operating system, and network-based applications Contains numerous theoretical and practical exercises to illustrate important topics Discusses protective mechanisms commonly used to ensure cybersecurity and how effective they are Discusses the use of cryptography for achieving security in IT systems Explains how to plan for protecting IT systems based on analysing the risk of various forms of failure Illustrates how human users may affect system security and ways of improving their behaviour Discusses what to do if a security failure takes place Presents important legal concepts relevant for cybersecurity, including the concept of cybercrime This accessible, clear textbook is intended especially for students starting a relevant course in computer science or engineering, as well as for professionals looking for a general introduction to the topic. Dr. Robin Sharp is an emeritus professor in the Cybersecurity Section at DTU Compute, the Dept. of Applied Mathematics and Computer Science at the Technical University of Denmark (DTU).

Listing 1 - 10 of 24 << page
of 3
>>
Sort by