|
|
|
|
| André Mariën has over 40 years of experience in information technology (IT) and information security. Over the last 25 years he has focused exclusively on security. His experience includes risk management, security policies, legal and contractual aspects, awareness programs, 360-degree reviews, security architecture, designs and implementation focusing on security, security in applications and infrastructure, public key infrastructure (PKI), forensics, and identity and access management (IAM).
André obtained a master-after-master in enterprise architecture and taught enterprise security architecture for a master’s program. His job brought him to places in Europe, the US, and Asia.
He is a long-time reviewer of articles and books for ACM Computing Reviews, covering a very broad spectrum of security publications. He has been a staff member of the KU Leuven Department of Computer Science since he graduated and is completing his final year as a professor.
|
|
|
|
Date Reviewed |
|
|
1 - 5 of 5
reviews
|
|
|
|
|
|
|
|
The art of immutable architecture Perry M., Apress, New York, NY, 2020. 444 pp. Type: Book (978-1-484259-54-2)
Here is a crazy idea: imagine an information technology (IT) solution where the only persistent memory is write-once, read-many (WORM), or a database without update and delete commands. This book claims such immutable data stores form ...
|
Aug 19 2021 |
|
|
|
|
|
|
An army of me: sockpuppets in online discussion communities Kumar S., Cheng J., Leskovec J., Subrahmanian V. WWW 2017 (Proceedings of the 26th International World Wide Web Conference, Perth, Australia, Apr 3-7, 2017) 857-866, 2017. Type: Proceedings
Online discussion platforms have become an important part of social life. However, they may be abused, for instance, to deceive and create an illusion of public consensus or save people from being banned, or to vandalize content on pla...
|
Jun 21 2021 |
|
|
|
|
|
|
Deception in the digital age: exploiting and defending human targets through computer-mediated communications Malin C., Gudaitis T., Holt T., Kilger M., ACADEMIC PRESS, Cambridge, MA, 2017. 284 pp. Type: Book (978-0-124116-30-6), Reviews: (2 of 4)
The book’s ten chapters provide background on deception techniques and then examples linked to cyber deception. The introduction, “Cyberanthropology of Deception,” shows that deception is an old tactic, wi...
|
Jul 12 2018 |
|
|
|
|
|
|
One-time cookies: preventing session hijacking attacks with stateless authentication tokens Dacosta I., Chakradeo S., Ahamad M., Traynor P. ACM Transactions on Internet Technology 12(1): 1-24, 2012. Type: Article
The Web generally uses protocols that are essentially stateless, but applications often depend on context and prior actions. Web 2.0 further complicates how we must deal with the gap between stateless protocols and some notion of sessi...
|
Oct 8 2012 |
|
|
|
|
|
|
Cent, five cent, ten cent, dollar: hitting botnets where it really hurts Ford R., Gordon S. New security paradigms (Proceedings of the 2006 Workshop on New Security Paradigms, Germany, Sep 19-22, 2006) 3-10, 2007. Type: Proceedings
Many sources have pointed out that malware has increasingly become an instrument for financial gain. This paper describes an approach to combat botnets from an economic, instead of a technical, angle. The authors look beyond basic malw...
|
Nov 14 2007 |
|
|
|
|
|
|
|
|
|
|
|