Narrow your search

Library

FARO (2)

KU Leuven (2)

LUCA School of Arts (2)

Odisee (2)

Thomas More Kempen (2)

Thomas More Mechelen (2)

UCLL (2)

ULB (2)

ULiège (2)

VIVES (2)

More...

Resource type

book (4)


Language

English (4)


Year
From To Submit

2021 (3)

2019 (1)

Listing 1 - 4 of 4
Sort by

Book
Radiation Tolerant Electronics
Author:
ISBN: 303921280X 3039212796 Year: 2019 Publisher: MDPI - Multidisciplinary Digital Publishing Institute

Loading...
Export citation

Choose an application

Bookmark

Abstract

Research on radiation-tolerant electronics has increased rapidly over the past few years, resulting in many interesting approaches to modeling radiation effects and designing radiation-hardened integrated circuits and embedded systems. This research is strongly driven by the growing need for radiation-hardened electronics for space applications, high-energy physics experiments such as those on the Large Hadron Collider at CERN, and many terrestrial nuclear applications including nuclear energy and nuclear safety. With the progressive scaling of integrated circuit technologies and the growing complexity of electronic systems, their susceptibility to ionizing radiation has raised many exciting challenges, which are expected to drive research in the coming decade. In this book we highlight recent breakthroughs in the study of radiation effects in advanced semiconductor devices, as well as in high-performance analog, mixed signal, RF, and digital integrated circuits. We also focus on advances in embedded radiation hardening in both FPGA and microcontroller systems and apply radiation-hardened embedded systems for cryptography and image processing, targeting space applications.

Keywords

single event effects --- n/a --- radiation-hardening-by-design (RHBD) --- frequency divider by two --- single event upset --- Image processing --- CMOS analog integrated circuits --- FPGA --- total ionizing dose (TID) --- Impulse Sensitive Function --- soft error --- hardening by design --- radiation hardening by design --- X-rays --- Single-Event Upsets (SEUs) --- line buffer --- heavy ions --- VHDL --- FPGA-based digital controller --- radiation hardening by design (RHBD) --- radiation hardening --- SRAM-based FPGA --- proton irradiation --- ring oscillator --- sensor readout IC --- fault tolerance --- space application --- physical unclonable function --- voltage controlled oscillator (VCO) --- Ring Oscillators --- analog single-event transient (ASET) --- single event opset (SEU) --- SEB --- single event upsets --- bipolar transistor --- total ionizing dose --- protons --- triple modular redundancy (TMR) --- gain degradation --- space electronics --- saturation effect --- configuration memory --- Co-60 gamma radiation --- total ionization dose (TID) --- frequency synthesizers --- CMOS --- PLL --- TDC --- single-event upsets (SEUs) --- bandgap voltage reference (BGR) --- 4MR --- single-shot --- error rates --- Radiation Hardening by Design --- soft errors --- heavy-ions --- single-event effects (SEE) --- single event transient (SET) --- SEE testing --- proton irradiation effects --- RFIC --- single event upset (SEU) --- FMR --- ionization --- radiation tolerant --- triplex–duplex --- neutron irradiation effects --- digital integrated circuits --- single event gate rupture (SEGR) --- power MOSFETs --- ring-oscillator --- selective hardening --- voltage reference --- nuclear fusion --- TMR --- gamma-rays --- gamma ray --- instrumentation amplifier --- radiation effects --- reference circuits --- radiation-hardened --- triplex-duplex


Book
Cyber Security of Critical Infrastructures
Authors: --- ---
Year: 2021 Publisher: Basel, Switzerland MDPI - Multidisciplinary Digital Publishing Institute

Loading...
Export citation

Choose an application

Bookmark

Abstract

Critical infrastructures are vital assets for public safety, economic welfare, and the national security of countries. The vulnerabilities of critical infrastructures have increased with the widespread use of information technologies. As Critical National Infrastructures are becoming more vulnerable to cyber-attacks, their protection becomes a significant issue for organizations as well as nations. The risks to continued operations, from failing to upgrade aging infrastructure or not meeting mandated regulatory regimes, are considered highly significant, given the demonstrable impact of such circumstances. Due to the rapid increase of sophisticated cyber threats targeting critical infrastructures with significant destructive effects, the cybersecurity of critical infrastructures has become an agenda item for academics, practitioners, and policy makers. A holistic view which covers technical, policy, human, and behavioural aspects is essential to handle cyber security of critical infrastructures effectively. Moreover, the ability to attribute crimes to criminals is a vital element of avoiding impunity in cyberspace. In this book, both research and practical aspects of cyber security considerations in critical infrastructures are presented. Aligned with the interdisciplinary nature of cyber security, authors from academia, government, and industry have contributed 13 chapters. The issues that are discussed and analysed include cybersecurity training, maturity assessment frameworks, malware analysis techniques, ransomware attacks, security solutions for industrial control systems, and privacy preservation methods.

Keywords

Technology: general issues --- crypto-ransomware --- locker-ransomware --- static analysis --- dynamic analysis --- machine learning --- assessment framework --- cybersecurity --- GDPR --- PCI-DSS --- DSPT --- NISD --- cyber-ranges --- security training --- security modelling --- serious games --- dynamic adaptation --- training programmes --- computers in education --- bloom --- STRIDE --- smart shipping --- military --- VMF --- hash chain --- T-OTP --- lightweight secure hash (LSH) --- CNR --- web application --- security vulnerability --- analysis security testing --- static analysis security testing --- dynamic analysis security testing --- interactive analysis security testing --- assessment methodology --- false positive --- false negative --- tools combination --- deep learning --- image classification --- transfer learning --- industrial control system --- fine-tuning --- testbeds --- cyber ranges --- cyber exercises --- education --- training --- research --- lattice cryptography --- code cryptography --- post quantum cryptography --- physical unclonable function --- public key infrastructure --- high performance computing --- malware analysis --- static malware analysis --- dynamic malware analysis --- malware classification --- random forest --- support vector machines --- smart grid --- risk assessment --- threat modeling --- formal verification --- probabilistic model checking --- cloud robotics --- image face recognition --- deep learning algorithms --- security --- encryption algorithms --- cybercrime --- Hasse diagram --- interval-valued complex intuitionistic fuzzy relations --- interval-valued complex intuitionistic fuzzy sets --- offensive cybersecurity --- cyber-attacks --- scoring model --- offensive cybersecurity framework --- n/a


Book
Cyber Security of Critical Infrastructures
Authors: --- ---
Year: 2021 Publisher: Basel, Switzerland MDPI - Multidisciplinary Digital Publishing Institute

Loading...
Export citation

Choose an application

Bookmark

Abstract

Critical infrastructures are vital assets for public safety, economic welfare, and the national security of countries. The vulnerabilities of critical infrastructures have increased with the widespread use of information technologies. As Critical National Infrastructures are becoming more vulnerable to cyber-attacks, their protection becomes a significant issue for organizations as well as nations. The risks to continued operations, from failing to upgrade aging infrastructure or not meeting mandated regulatory regimes, are considered highly significant, given the demonstrable impact of such circumstances. Due to the rapid increase of sophisticated cyber threats targeting critical infrastructures with significant destructive effects, the cybersecurity of critical infrastructures has become an agenda item for academics, practitioners, and policy makers. A holistic view which covers technical, policy, human, and behavioural aspects is essential to handle cyber security of critical infrastructures effectively. Moreover, the ability to attribute crimes to criminals is a vital element of avoiding impunity in cyberspace. In this book, both research and practical aspects of cyber security considerations in critical infrastructures are presented. Aligned with the interdisciplinary nature of cyber security, authors from academia, government, and industry have contributed 13 chapters. The issues that are discussed and analysed include cybersecurity training, maturity assessment frameworks, malware analysis techniques, ransomware attacks, security solutions for industrial control systems, and privacy preservation methods.

Keywords

Technology: general issues --- crypto-ransomware --- locker-ransomware --- static analysis --- dynamic analysis --- machine learning --- assessment framework --- cybersecurity --- GDPR --- PCI-DSS --- DSPT --- NISD --- cyber-ranges --- security training --- security modelling --- serious games --- dynamic adaptation --- training programmes --- computers in education --- bloom --- STRIDE --- smart shipping --- military --- VMF --- hash chain --- T-OTP --- lightweight secure hash (LSH) --- CNR --- web application --- security vulnerability --- analysis security testing --- static analysis security testing --- dynamic analysis security testing --- interactive analysis security testing --- assessment methodology --- false positive --- false negative --- tools combination --- deep learning --- image classification --- transfer learning --- industrial control system --- fine-tuning --- testbeds --- cyber ranges --- cyber exercises --- education --- training --- research --- lattice cryptography --- code cryptography --- post quantum cryptography --- physical unclonable function --- public key infrastructure --- high performance computing --- malware analysis --- static malware analysis --- dynamic malware analysis --- malware classification --- random forest --- support vector machines --- smart grid --- risk assessment --- threat modeling --- formal verification --- probabilistic model checking --- cloud robotics --- image face recognition --- deep learning algorithms --- security --- encryption algorithms --- cybercrime --- Hasse diagram --- interval-valued complex intuitionistic fuzzy relations --- interval-valued complex intuitionistic fuzzy sets --- offensive cybersecurity --- cyber-attacks --- scoring model --- offensive cybersecurity framework --- n/a


Book
Cyber Security of Critical Infrastructures
Authors: --- ---
Year: 2021 Publisher: Basel, Switzerland MDPI - Multidisciplinary Digital Publishing Institute

Loading...
Export citation

Choose an application

Bookmark

Abstract

Critical infrastructures are vital assets for public safety, economic welfare, and the national security of countries. The vulnerabilities of critical infrastructures have increased with the widespread use of information technologies. As Critical National Infrastructures are becoming more vulnerable to cyber-attacks, their protection becomes a significant issue for organizations as well as nations. The risks to continued operations, from failing to upgrade aging infrastructure or not meeting mandated regulatory regimes, are considered highly significant, given the demonstrable impact of such circumstances. Due to the rapid increase of sophisticated cyber threats targeting critical infrastructures with significant destructive effects, the cybersecurity of critical infrastructures has become an agenda item for academics, practitioners, and policy makers. A holistic view which covers technical, policy, human, and behavioural aspects is essential to handle cyber security of critical infrastructures effectively. Moreover, the ability to attribute crimes to criminals is a vital element of avoiding impunity in cyberspace. In this book, both research and practical aspects of cyber security considerations in critical infrastructures are presented. Aligned with the interdisciplinary nature of cyber security, authors from academia, government, and industry have contributed 13 chapters. The issues that are discussed and analysed include cybersecurity training, maturity assessment frameworks, malware analysis techniques, ransomware attacks, security solutions for industrial control systems, and privacy preservation methods.

Keywords

crypto-ransomware --- locker-ransomware --- static analysis --- dynamic analysis --- machine learning --- assessment framework --- cybersecurity --- GDPR --- PCI-DSS --- DSPT --- NISD --- cyber-ranges --- security training --- security modelling --- serious games --- dynamic adaptation --- training programmes --- computers in education --- bloom --- STRIDE --- smart shipping --- military --- VMF --- hash chain --- T-OTP --- lightweight secure hash (LSH) --- CNR --- web application --- security vulnerability --- analysis security testing --- static analysis security testing --- dynamic analysis security testing --- interactive analysis security testing --- assessment methodology --- false positive --- false negative --- tools combination --- deep learning --- image classification --- transfer learning --- industrial control system --- fine-tuning --- testbeds --- cyber ranges --- cyber exercises --- education --- training --- research --- lattice cryptography --- code cryptography --- post quantum cryptography --- physical unclonable function --- public key infrastructure --- high performance computing --- malware analysis --- static malware analysis --- dynamic malware analysis --- malware classification --- random forest --- support vector machines --- smart grid --- risk assessment --- threat modeling --- formal verification --- probabilistic model checking --- cloud robotics --- image face recognition --- deep learning algorithms --- security --- encryption algorithms --- cybercrime --- Hasse diagram --- interval-valued complex intuitionistic fuzzy relations --- interval-valued complex intuitionistic fuzzy sets --- offensive cybersecurity --- cyber-attacks --- scoring model --- offensive cybersecurity framework --- n/a

Listing 1 - 4 of 4
Sort by