Printer Friendly

Browse Data security topic

Analysis subtopic


1-300 out of 353 article(s) nextnext page
Title Author Type Date Words
Ukraine Takes 25th Place In International Ranking Of Cybersecurity - Digital Transformation Ministry. Dec 11, 2020 208
SOCMTD: Selecting Optimal Countermeasure for Moving Target Defense Using Dynamic Game. Hu, Hao; Liu, Jing; Tan, Jinglei; Liu, Jiang Report Oct 1, 2020 8205
The new Weakness of RSA and The Algorithm to Solve this Problem. Somsuk, Kritsanapong Sep 1, 2020 7668
Mutual Friendly Force Identification Protocol based on Hash-Chain for Personal Combat Systems. Lee, Jongkwan Sep 1, 2020 4911
Survivability Analysis of MANET Routing Protocols under DOS Attacks. Abbas, Sohail; Haqdad, Muhammad; Khan, Muhammad Zahid; Ur Rehman, Haseeb; Khan, Ajab; Khan, Atta ur Sep 1, 2020 10041
Analysis of Digital Image Watermarking Techniques through Hybrid Methods. Begum, Mahbuba; Uddin, Mohammad Shorif Aug 31, 2020 7341
Preserving Privacy in Multimedia Social Networks Using Machine Learning Anomaly Detection. Aljably, Randa; Tian, Yuan; Rodhaan, Mznah Al- Aug 31, 2020 8109
A Trust-Game-Based Access Control Model for Cloud Service. Jun, Sun Pan Report Aug 31, 2020 9308
Provenance Transmission through a Two-Dimensional Covert Timing Channel in WSNs. Xu, Qinbao; Liu, Li; Akhtar, Rizwan; Raja, Muhammad Asif Zahoor; Wang, Changda Report Aug 31, 2020 5847
Trajectory Clustering and k-NN for Robust Privacy Preserving k-NN Query Processing in GeoSpark. Dritsas, Elias; Kanavos, Andreas; Trigka, Maria; Vonitsanos, Gerasimos; Sioutas, Spyros; Tsakalidis, Report Aug 1, 2020 11470
Multiaccess Edge Computing Empowered Flying Ad Hoc Networks with Secure Deployment Using Identity-Based Generalized Signcryption. Khan, Muhammad Asghar; Ullah, Insaf; Nisar, Shibli; Noor, Fazal; Qureshi, Ijaz Mansoor; Khanzada, Fa Report Jul 31, 2020 9437
Philippine companies' approach to cybersecurity matures - Palo Alto Networks. Jul 10, 2020 676
Creating and Implementing an Effective and Deterrent National Cyber Security Strategy. Senol, Mustafa; Karacuha, Ertugrul Jun 30, 2020 12773
Efficient Protection Mechanism Based on Self-Adaptive Decision for Communication Networks of Autonomous Vehicles. Zhao, Min; Qin, Danyang; Guo, Ruolin; Xu, Guangchao Report Jun 30, 2020 5015
An Encrypted Speech Retrieval Scheme Based on Long Short-Term Memory Neural Network and Deep Hashing. Zhang, Qiu-yu; Li, Yu-zhou; Hu, Ying-jie Jun 1, 2020 9999
GOVERNING PRIVACY IN THE DATAFIED CITY. Rubinstein, Ira S.; Petkova, Bilyana Jun 1, 2020 30023
Multilevel Security Network Communication Model Based on Multidimensional Control. Cao, Lifeng; Lu, Xin; Gao, Zhensheng; Han, Mengda; Du, Xuehui May 31, 2020 14504
Complete Defense Framework to Protect Deep Neural Networks against Adversarial Examples. Sun, Guangling; Su, Yuying; Qin, Chuan; Xu, Wenbo; Lu, Xiaofeng; Ceglowski, Andrzej May 31, 2020 9901
Data Imperialism: The GDPR's Disastrous Impact on Africa's E-Commerce Markets. Mannion, Cara Mar 1, 2020 10088
Hybrid Botnet Detection Based on Host and Network Analysis. Almutairi, Suzan; Mahfoudh, Saoucene; Almutairi, Sultan; Alowibdi, Jalal S. Mar 1, 2020 12061
Privacy Regulation and Innovation Policy. Lev-Aretz, Yafit; Strandburg, Katherine J. Jan 1, 2020 24044
Optimal Decision-Making Approach for Cyber Security Defense Using Game Theory and Intelligent Learning. Zhang, Yuchen; Liu, Jing Jan 1, 2020 9575
A Cybersecurity Framework for Wireless-Controlled Smart Buildings I: Two-Position Control. Wu, Feng; Qu, Ming Jan 1, 2020 3817
Revocation Protocol for Group Signatures in VANETs: A Secure Construction. Shari, Nur Fadhilah Mohd; Malip, Amizah; Othman, Wan Ainun Mior Jan 1, 2020 10379
VPN Traffic Detection in SSL-Protected Channel. Abideen, Muhammad Zain ul; Saleem, Shahzad; Ejaz, Madiha Nov 30, 2019 6516
A Bitwise Design and Implementation for Privacy-Preserving Data Mining: From Atomic Operations to Advanced Algorithms. Song, Baek Kyung; Yoo, Joon Soo; Hong, Miyeon; Yoon, Ji Won Oct 31, 2019 9156
Two Secure Privacy-Preserving Data Aggregation Schemes for IoT. Pu, Yuwen; Luo, Jin; Hu, Chunqiang; Yu, Jiguo; Zhao, Ruifeng; Huang, Hongyu; Xiang, Tao Sep 30, 2019 8076
An Optimized Approach for Secure Data Transmission Using Spread Spectrum Audio Steganography, Chaos Theory, and Social Impact Theory Optimizer. Tanwar, Rohit; Singh, Kulvinder; Zamani, Mazdak; Verma, Amit; Kumar, Prashant Sep 30, 2019 5028
A Systematic Literature Review of Authentication in Internet of Things for Heterogeneous Devices. Kavianpour, Sanaz; Shanmugam, Bharanidharan; Azam, Sami; Zamani, Mazdak; Samy, Ganthan Narayana; De Sep 30, 2019 9803
A Secure and Efficient ECC-Based Anonymous Authentication Protocol. Wang, Feifei; Xu, Guoai; Gu, Lize Sep 30, 2019 10660
Vendor Spotlight: The Unique Considerations for IAM in Healthcare: Healthcare's transition to digital has created exceptional information security challenges for patient care organizations across the industry. Malezis, Gus Sep 1, 2019 1139
An Efficient Anonymous Autithentication Scheme with Secure Communication in Intelligent Vehicular Ad-hoc Networks. Zhang, Xiaojun; Mu, Liming; Zhao, Jie; Xu, Chunxiang Jun 1, 2019 7014
Secure and Efficient Conjunctive Keyword Search Scheme without Secure Channel. Wang, Jianhua; Zhao, Zhiyuan; Sun, Lei; Zhu, Zhiqiang Report May 1, 2019 6583
MSFA: Multiple System Fingerprint Attack Scheme for IoT Anonymous Communication. Lu, Tianbo; Meng, Ting; Li, Chao; Dong, Guozhen; Li, Huiyang; Zhang, Jiao; Zhang, Xiaoyan Apr 30, 2019 7151
Evaluation of Authentication and User Identification on Simultaneous Session Limitation Mechanism. Shibahara, Ryo; Saisho, Keizo Apr 1, 2019 4538
Designing Rich-Secure Network Covert Timing Channels Based on Nested Lattices. Liu, Weiwei; Liu, Guangjie; Ji, Xiaopeng; Zhai, Jiangtao; Dai, Yuewei Report Apr 1, 2019 7906
Improving efficiency of remote data audit for cloud storage. Fan, Kuan; Liu, Mingxi; Shi, Wenbo Report Apr 1, 2019 7674
Medical Big Data, Intelligent Healthcare Delivery Systems, and Clinical Information Security. Schraw, Richard Report Apr 1, 2019 1813
Smart Healthcare Systems, Wearable Sensor Devices, and Patient Data Security. Lachman, Katherine Report Apr 1, 2019 1704
Artificial Intelligence and Game Theory Models for Defending Critical Networks with Cyber Deception. Fugate, Sunny; Ferguson-Walter, Kimberly Report Mar 22, 2019 9661
Ranking Worldwide Cybersecurity. Brief article Mar 1, 2019 113
Interpretive Structural Modeling in the Adoption of IoT Services. Kim, Yonghee; Park, Youngju; Song, Gwangsuk Case study Mar 1, 2019 6647
Identifying SDC-Causing Instructions Based on Random Forests Algorithm. Liu, LiPing; Ci, LinLin; Liu, Wei; Yang, Hui Report Mar 1, 2019 6941
A Study on Analysis of Malicious Code Behavior Information for Predicting Security Threats in New Environments. Choi, Seul-Ki; Lee, Taejin; Kwak, Jin Case study Mar 1, 2019 4178
Internet of things in the vanguard but vulnerable to hacks. Fanelli, Gino Feb 12, 2019 1187
A Decentralized and Non-reversible Traceability System for Storing Commodity Data. He, Xiaojian; Chen, Ximeng; Li, Kangzi Report Feb 1, 2019 6047
Businesses View Cyber, Business Interruption as Bigger Risks Than Catastrophes. Jan 24, 2019 1109
An Upper Bound of the Longest Impossible Differentials of Several Block Ciphers. Han, Guoyong; Zhang, Wenying; Zhao, Hongluan Report Jan 1, 2019 5823
Improvement of Mitigation Techniques against SYN Flood Attack for Free and Open Source Firewalls. Kapis, Kosmas; Nico Kyando, Davis Jan 1, 2019 7359
Private Blockchain-Based Secure Access Control for Smart Home Systems. Xue, Jingting; Xu, Chunxiang; Zhang, Yuan Report Dec 1, 2018 9431
Data privacy is not a right Limits on collecting information would stifle the ongoing transformation of how we do business. Bean, Jordan Nov 23, 2018 662
Because of the harm it can do, cybersecurity should always be top of mind. Nov 6, 2018 1235
Human error is to blame for poor cloud security, not the infrastructure itself, warns Claranet. Nov 1, 2018 403
Forum focus on cyber security. Oct 7, 2018 154
A Study of the Effects of Heartbleed Vulnerability in Bangladesh. Zaman, Moniruz; Alam, Delwar; Bhuiyan, Touhid; Farah, Tanjila Case study Sep 1, 2018 3215
Feasibility of Societal Model for Securing Internet of Things. Tsunoda, Hiroshi; Roman, Rodrigo; Lopez, Javier; Keeni, Glenn Mansfield Technical report Aug 1, 2018 9901
Dynamic Trust Model Based on Extended Subjective Logic. Junfeng, Tian; Jiayao, Zhang; Peipei, Zhang; Xiaoxue, Ma Technical report Aug 1, 2018 8072
Functional Safety Engineers Responsible for Plant Security Need Help to Understand Cyber Security Regulations. Method Cyber Security Provides Specific Training.. Jul 31, 2018 242
Information Protection - A Comparative Analysis of Popular Models. Naseem, Shahid; Khan, Zeashan Hameed; Abid, Muhammad Irfan Report Jul 1, 2018 2969
Strategic Approach to Privacy Calculus of Wearable Device User Regarding Information Disclosure and Continuance Intention. Cho, Ji Yeon; Ko, Daesun; Lee, Bong Gyou Case study Jul 1, 2018 9564
Virtual Neighbors: Russia and the EU in Cyberspace. Barrinha, Andre Essay Jun 22, 2018 5280
Minimizing Insider Threat Risk with Behavioral Monitoring. Elifoglu, I. Hilmi; Abel, Ivan; Tasseven, Ozlem Report Jun 22, 2018 4893
Cyberattacks directed at manufacturing could shut your operation down and ruin your brand. May 25, 2018 197
Data Security vs. Overall Performance in 6VPE. Salih, Sami; Abdalrahman, AlAmeen; Elsharif, Kamal Report May 1, 2018 3099
Q: How secure is a blockchain, really? A: It turns out "secure" is a funny word to pin down. Orcutt, Mike May 1, 2018 1202
A Cresting Wave: State cybersecurity requirements for insurers and producers will follow the lead of the NAIC and the N.Y. Department of Financial Services. Augustinos, Theodore P. May 1, 2018 479
Network Security Situation Assessment Method Based on Markov Game Model. Li, Xi; Lu, Yu; Liu, Sen; Nie, Wei Report May 1, 2018 4654
A Coordinated Ciphertext Policy Attribute-based PHR Access Control with User Accountability. Lin, Guofeng; You, Lirong; Hu, Bing; Hong, Hanshu; Sun, Zhixin Report Apr 1, 2018 10313
A study on Classification of Insider threat using Markov Chain Model. Kim, Dong-Wook; Hong, Sung-Sam; Han, Myung-Mook Report Apr 1, 2018 4139
Trust Model for Group Leader Selection in VANET. Hasrouny, Hamssa; Samhat, Abed Ellatif; Bassil, Carole; Laouiti, Anis Report Apr 1, 2018 4162
Cyber Capability Planning and the Need for an Expanded Cybersecurity Workforce. Coulson, Tony; Mason, Megan; Nestler, Vincent Apr 1, 2018 3941
Searching for Privacy in the Internet of Bodies. Pauwels, Eleonore; Denton, Sarah W. Mar 22, 2018 2737
Internet of Things Security Issues, Threats, Attacks and Counter Measures. Bashir, Adil; Mir, Ajaz Hussain Report Mar 1, 2018 7418
A trust evaluation method for improving nodes utilization for wireless sensor networks. Haibo, Shen; Kechen, Zhuang; Hong, Zhang Report Mar 1, 2018 9063
Development of Protective Scheme against Collaborative Black Hole Attacks in Mobile Ad hoc Networks. Farooq, Muhammad Umar; Wang, Xingfu; Sajjad, Moizza; Qaisar, Sara Report Mar 1, 2018 6227
Security Via the Edge. Feb 1, 2018 502
Cyber Sickness in Virtual Reality--Literature Review. Martirosov, Sergo; Kopecek, Pavel Report Jan 1, 2018 6815
Adaptive Secure Cross-Cloud Data Collaboration with Identity-Based Cryptography and Conditional Proxy Re-Encryption. Huang, Qinlong; He, Yue; Yue, Wei; Yang, Yixian Jan 1, 2018 7208
A Secure Multimedia Data Sharing Scheme for Wireless Network. Fang, Liming; Liu, Liang; Xia, Jinyue; Sun, Maosheng Jan 1, 2018 8298
Cloud Based Data Protection in Anonymously Controlled SDN. Shen, Jian; Shen, Jun; Lai, Chin-Feng; Liu, Qi; Zhou, Tianqi Jan 1, 2018 5532
Big Data Analytics for Information Security. Szczypiorski, Krzysztof; Wang, Liqiang; Luo, Xiangyang; Ye, Dengpan Jan 1, 2018 762
A New Unified Intrusion Anomaly Detection in Identifying Unseen Web Attacks. Kamarudin, Muhammad Hilmi; Maple, Carsten; Watson, Tim; Safa, Nader Sohrabi Jan 1, 2018 12446
An Effective Classification Approach for Big Data Security Based on GMPLS/MPLS Networks. Alouneh, Sahel; Al-Hawari, Feras; Hababeh, Ismail; Ghinea, Gheorghita Jan 1, 2018 5534
Analysis on Matrix GSW-FHE and Optimizing Bootstrapping. Zhao, Xiufeng; Mao, Hefeng; Liu, Shuai; Song, Weitao; Zhang, Bo Jan 1, 2018 5606
Side-Channel Attacks and Countermeasures for Identity-Based Cryptographic Algorithm SM9. Zhang, Qi; Wang, An; Niu, Yongchuan; Shang, Ning; Xu, Rixin; Zhang, Guoshuang; Zhu, Liehuang Jan 1, 2018 8207
Secure Deduplication Based on Rabin Fingerprinting over Wireless Sensing Data in Cloud Computing. Zhang, Yinghui; Su, Haonan; Yang, Menglei; Zheng, Dong; Ren, Fang; Zhao, Qinglan Jan 1, 2018 8465
Energy Efficiency Design for Secure MISO Cognitive Radio Network Based on a Nonlinear EH Model. Ni, Lei; Da, Xinyu; Hu, Hang; Zhang, Miao Jan 1, 2018 4120
Delay Induced Hopf Bifurcation of an Epidemic Model with Graded Infection Rates for Internet Worms. Zhao, Tao; Bi, Dianjie Jan 1, 2018 3962
Blockchain Technology: Is It a Good Candidate for Securing IoT Sensitive Medical Data? Rifi, Nabil; Agoulmine, Nazim; Taher, Nada Chendeb; Rachkidi, Elie Jan 1, 2018 8011
Flexible, Secure, and Reliable Data Sharing Service Based on Collaboration in Multicloud Environment. Wei, Qiang; Shao, Huaibin; Zhang, Gongxuan Report Jan 1, 2018 11814
Achieving Incentive, Security, and Scalable Privacy Protection in Mobile Crowdsensing Services. Xiong, Jinbo; Ma, Rong; Chen, Lei; Tian, Youliang; Lin, Li; Jin, Biao Jan 1, 2018 8161
Mathematical Performance Evaluation Model for Mobile Network Firewall Based on Queuing. Xuan, Shichang; Man, Dapeng; Zhang, Jiangchuan; Yang, Wu; Yu, Miao Jan 1, 2018 9198
Dynamic Outsourced Proofs of Retrievability Enabling Auditing Migration for Remote Storage Security. Rao, Lu; Tu, Tengfei; Zhang, Hua; Wen, Qiaoyan; Xiao, Jia Jan 1, 2018 15540
Implication of Cyber Warfare on the Financial Sector. An Exploratory Study. Khan, Sohail Razi Case study Jan 1, 2018 3863
WHERE DO WE START WITH CYBERSECURITY? Enterprise cybersecurity requires public buy-in, collaboration across sectors, and a much broader and earlier education and training effort. Rohrer, Karter K.; Hom, Nate Dec 1, 2017 1014
Cybersecurity and Insight into Attacker's Methods. Dec 1, 2017 175
Interdependence Between E-Governance and Knowledge-Based Economy Specific Factors. Botezatu, Mihai Alexandru; Pirnau, Claudiu; Ciocardia, Radu Mircea Carp Report Nov 1, 2017 4654
THE WAR FOR CYBERSPACE. Castelluccio, Michael Nov 1, 2017 750
Wake up to security threats: Protecting your organization, its reputation and its confidential data is of imperative importance. Barton, Ryan Guest commentary Oct 27, 2017 697
A Survey on Big Data Privacy and Security Issues in Healthcare Information System. Pragash, K.; J.Jayabharathy Report Oct 1, 2017 3122
Learning Maliciousness in Cybersecurity Graphs. Walsh, Connor; Gottlieb, Sam; Rangamani, Akshay; Maida, Liz Report Sep 1, 2017 2634
A Study on the Impact Analysis of Security Flaws between Security Controls: An Empirical Analysis of K-ISMS using Case-Control Study. Kim, Hwankuk; Lee, Kyungho; Lim, Jongin Case study Sep 1, 2017 11242
NASAA Mulls Model Cybersecurity Rule for Investment Advisors. Jun 23, 2017 639
Cyber and the C-suite: new cyberrisk responsibilities for chief risk officers. Doherty, John; Watson, Mark Jun 1, 2017 1440
Put your money where your risk is. Tuttle, Hilary Brief article Jun 1, 2017 183
Cyberspace and the New World Order. Ciot, Melania-Gabriela Report Jun 1, 2017 2790
Analysis of human factors in cyber security: A case study of anonymous attack on HBGary. Gyunka, Benjamin Aruwa; Christiana, Abikoye Oluwakemi Case study May 1, 2017 5038
Automating the data quality checks in health and demographic surveillance systems: Lessons from the Cross River HDSS, Nigeria. Arikpo, Iwara; Mboto, Ideba; Okoro, Anthony; Meremikwu, Martin Report May 1, 2017 3777
Three factor authenticated key agreement scheme for telecare medicine information system using chebyshev chaotic maps. Janani, T.; Gokulakrishnan, P. May 1, 2017 4093
Information security and resource sharing using AWS public cloud. Joyce, A.; Deepthi, S.S.; Priya, V. May 1, 2017 2587
An Overview of Corporate Cybercrime in India and US. Syngle, Tanya Report Apr 1, 2017 4269
An Analysis of Inadvertent Data Disclosure Incidents, 2005-2017. Coffey, John W. Report Apr 1, 2017 3645
How to respond to a subpoena for SAP records. Cagney, Tamara Apr 1, 2017 1320
Defending against cyberattacks. Lecklider, Tom Report Mar 1, 2017 2711
Learning which risks to take and how to minimize the rest. Wiler, Vicki Editorial Mar 1, 2017 535
Fuzzy STRIDE Model based on Werners Aggregation Operator for Computer Network Threat Modelling. Khan, Salman A. Mar 1, 2017 4369
Measures for automaker's legal risks from security threats in connected car development lifecycle. Kim, Dong Hee; Baek, Seung Jo; Lim, Jongin Report Feb 1, 2017 6706
How do your cybersecurity efforts stack up? being prepared will make you less likely to become a soft target. Houlding, David Feb 1, 2017 1521
Robust and Reversible Audio Watermarking by Modifying Statistical Features in Time Domain. Xiang, Shijun; Yang, Le; Wang, Yi Report Jan 1, 2017 4884
Trust Mechanisms to Secure Routing in Wireless Sensor Networks: Current State of the Research and Open Research Issues. Ishmanov, Farruh; Zikria, Yousaf Bin Jan 1, 2017 13623
Data Transmission and Access Protection of Community Medical Internet of Things. Wang, Xunbao; Chen, Fulong; Ye, Heping; Yang, Jie; Zhu, Junru; Zhang, Ziyang; Huang, Yakun Jan 1, 2017 8971
Cloud Model-Based Artificial Immune Network for Complex Optimization Problem. Wang, Mingan; Feng, Shuo; Li, Jianming; Li, Zhonghua; Xue, Yu; Guo, Dongliang Report Jan 1, 2017 7914
Covering the Monitoring Network: A Unified Framework to Protect E-Commerce Security. Qiu, Lirong; Li, Jie Report Jan 1, 2017 7392
Vague Sets Security Measure for Steganographic System Based on High-Order Markov Model. Ouyang, Chun-Juan; Leng, Ming; Xia, Jie-Wu; Liu, Huan Report Jan 1, 2017 6745
Data Placement for Privacy-Aware Applications over Big Data in Hybrid Clouds. Xu, Xiaolong; Zhao, Xuan; Ruan, Feng; Zhang, Jie; Tian, Wei; Dou, Wanchun; Liu, Alex X. Report Jan 1, 2017 9283
Relay Selections for Security and Reliability in Mobile Communication Networks over Nakagami-m Fading Channels. Huang, Hongji; Sun, Wanyou; Yang, Jie; Gui, Guan Report Jan 1, 2017 3762
A Security and Efficient Routing Scheme with Misbehavior Detection in Delay-Tolerant Networks. Li, Feng; Si, Yali; Lu, Ning; Chen, Zhen; Shen, Limin Report Jan 1, 2017 11222
Co-Check: Collaborative Outsourced Data Auditing in Multicloud Environment. Mao, Jian; Tian, Wenqian; Zhang, Yan; Cui, Jian; Ma, Hanjun; Bian, Jingdong; Liu, Jianwei; Zhang, Ji Report Jan 1, 2017 7906
CHAOS: An SDN-Based Moving Target Defense System. Shi, Yuan; Zhang, Huanguo; Wang, Juan; Xiao, Feng; Huang, Jianwei; Zha, Daochen; Hu, Hongxin; Yan, F Report Jan 1, 2017 7469
Fault Attack on the Authenticated Cipher ACORN v2. Zhang, Xiaojuan; Feng, Xiutao; Lin, Dongdai Report Jan 1, 2017 11484
Privacy-Preserving k-Means Clustering under Multiowner Setting in Distributed Cloud Environments. Rong, Hong; Wang, Huimei; Liu, Jian; Hao, Jialu; Xian, Ming Report Jan 1, 2017 13479
Efficient Anonymous Authenticated Key Agreement Scheme for Wireless Body Area Networks. Li, Tong; Zheng, Yuhui; Zhou, Ti Report Jan 1, 2017 6066
Authenticated Location-Aware Publish/Subscribe Services in Untrusted Outsourced Environments. Yan, Han; Cheng, Xiang; Su, Sen; Zhang, Siyao Report Jan 1, 2017 11237
Differential Privacy for Edge Weights in Social Networks. Li, Xiaoye; Yang, Jing; Sun, Zhenlong; Zhang, Jianpei Report Jan 1, 2017 6027
LEPA: A Lightweight and Efficient Public Auditing Scheme for Cloud-Assisted Wireless Body Sensor Networks. Li, Song; Cui, Jie; Zhong, Hong; Zhang, Yiwen; He, Qiang Report Jan 1, 2017 11543
A Consensus Framework for Reliability and Mitigation of Zero-Day Attacks in IoT. Sharma, Vishal; Lee, Kyungroul; Kwon, Soonhyun; Kim, Jiyoon; Park, Hyungjoon; Yim, Kangbin; Lee, Sun Report Jan 1, 2017 14512
NFC Secure Payment and Verification Scheme with CS E-Ticket. Fan, Kai; Song, Panfei; Du, Zhao; Zhu, Haojin; Li, Hui; Yang, Yintang; Li, Xinghua; Yang, Chao Report Jan 1, 2017 5742
An Efficient Context-Aware Privacy Preserving Approach for Smartphones. Zhang, Lichen; Li, Yingshu; Wang, Liang; Lu, Junling; Li, Peng; Wang, Xiaoming Report Jan 1, 2017 8719
The Concept Drift Problem in Android Malware Detection and Its Solution. Hu, Donghui; Ma, Zhongjin; Zhang, Xiaotian; Li, Peipei; Ye, Dengpan; Ling, Baohong Report Jan 1, 2017 8603
A Privacy Model for RFID Tag Ownership Transfer. Yang, Xingchun; Xu, Chunxiang; Li, Chaorong Report Jan 1, 2017 8526
Efficient Solutions to Two-Party and Multiparty Millionaires' Problem. Liu, Xin; Li, Shundong; Chen, XiuBo; Xu, Gang; Zhang, Xiaolin; Zhou, Yong Report Jan 1, 2017 8985
Secure and Privacy-Preserving Data Sharing and Collaboration in Mobile Healthcare Social Networks of Smart Cities. Huang, Qinlong; Wang, Licheng; Yang, Yixian Report Jan 1, 2017 8302
Improved Instance Selection Methods for Support Vector Machine Speed Optimization. Akinyelu, Andronicus A.; Adewumi, Aderemi O. Report Jan 1, 2017 7147
A STRIDE Model based Threat Modelling using Unified and-Or Fuzzy Operator for Computer Network Security. Khan, Salman A. Jan 1, 2017 5055
Layer-wise Security Schemes with Secure Routing Protocol for Integrated UMTS and WLAN Ad Hoc Networks. Tripathi, Shashank; Jain, A.K. Jan 1, 2017 8968
An Advanced Private Social Activity Invitation Framework with Friendship Protection. Tong, Weitian; Chen, Lei; Buglass, Scott; Gao, Weinan; Li, Jeffrey Report Jan 1, 2017 6817
Privacy-Preserving Meter Report Protocol of Isolated Smart Grid Devices. Wang, Zhiwei; Xie, Hao Report Jan 1, 2017 5774
Why You Go Reveals Who You Know: Disclosing Social Relationship by Cooccurrence. Yi, Feng; Li, Hong; Wang, Hongtao; Sun, Limin Report Jan 1, 2017 6869
An ARM-Compliant Architecture for User Privacy in Smart Cities: SMARTIE--Quality by Design in the IoT. Beltran, V.; Skarmeta, A.F.; Ruiz, P.M. Report Jan 1, 2017 7367
Performance of p-Norm Detector in Cognitive Radio Networks with Cooperative Spectrum Sensing in Presence of Malicious Users. Lavanis, Nandita; Jalihal, Devendra Report Jan 1, 2017 5647
PBF: A New Privacy-Aware Billing Framework for Online Electric Vehicles with Bidirectional Auditability. Hussain, Rasheed; Son, Junggab; Kim, Donghyun; Nogueira, Michele; Oh, Heekuck; Tokuta, Alade O.; Seo Report Jan 1, 2017 12448
Trust on the Ratee: A Trust Management System for Social Internet of Vehicles. Gai, Fangyu; Zhang, Jiexin; Zhu, Peidong; Jiang, Xinwen Report Jan 1, 2017 7971
5G-VRSec: Secure Video Reporting Service in 5G Enabled Vehicular Networks. Yoo, Sang Guun Report Jan 1, 2017 15591
Unchained Cellular Obfuscation Areas for Location Privacy in Continuous Location-Based Service Queries. Luo, Jia-Ning; Yang, Ming-Hour Report Jan 1, 2017 11161
A Replica Detection Scheme Based on the Deviation in Distance Traveled Sliding Window for Wireless Sensor Networks. Mishra, Alekha Kumar; Tripathy, Asis Kumar; Kumar, Arun; Turuk, Ashok Kumar Report Jan 1, 2017 5572
Secrecy Analysis of Multiuser Untrusted Amplify-and-Forward Relay Networks. Deng, Dan; Li, Xutao; Fan, Lisheng; Zhou, Wen; Hu, Rose Qingyang; Zhou, Zhili Report Jan 1, 2017 6415
Trust Management for Public Key Infrastructures: Implementing the X.509 Trust Broker. Wazan, Ahmad Samer; Laborde, Romain; Chadwick, David W.; Barrere, Francois; Benzekri, Abdelmalek; Ka Report Jan 1, 2017 16951
A New Method to Analyze the Security of Protocol Implementations Based on Ideal Trace. Wu, Fusheng; Zhang, Huanguo; Wang, Wengqing; Jia, Jianwei; Yuan, Shi Report Jan 1, 2017 9727
Cybersecurity Vulnerability Analysis of the PLC PRIME Standard. Simo, Miguel Seijo; Lopez, Gregorio Lopez; Novella, Jose Ignacio Moreno Report Jan 1, 2017 12330
Location Privacy Leakage through Sensory Data. Liang, Yi; Cai, Zhipeng; Han, Qilong; Li, Yingshu Report Jan 1, 2017 9536
A Secured Load Mitigation and Distribution Scheme for Securing SIP Server. Ganesan, Vennila; Manikandan, MSK Report Jan 1, 2017 7302
An Edge Correlation Based Differentially Private Network Data Release Method. Lu, Junling; Cai, Zhipeng; Wang, Xiaoming; Zhang, Lichen; Duan, Zhuojun Report Jan 1, 2017 8529
Trusted Service Scheduling and Optimization Strategy Design of Service Recommendation. Xia, Xiaona; Yu, Jiguo; Zhang, Shanshan; Wu, Shu Report Jan 1, 2017 5173
Efficient Asymmetric Index Encapsulation Scheme for Anonymous Content Centric Networking. Ma, Rong; Cao, Zhenfu; Wang, Xingkai Report Jan 1, 2017 6310
Practical m-k-Anonymization for Collaborative Data Publishing without Trusted Third Party. Hua, Jingyu; Tang, An; Pan, Qingyun; Choo, Kim-Kwang Raymond; Ding, Hong; Ren, Yizhi Report Jan 1, 2017 7015
GA-DoSLD: Genetic Algorithm Based Denial-of-Sleep Attack Detection in WSN. Gunasekaran, Mahalakshmi; Periakaruppan, Subathra Report Jan 1, 2017 5079
Cloud-Based DDoS HTTP Attack Detection Using Covariance Matrix Approach. Aborujilah, Abdulaziz; Musa, Shahrulniza Report Jan 1, 2017 5322
Security and privacy issues in IoT. -ur-Rehman, Aqeel; Ur Rehman, Sadiq; Khan, Iqbal Uddin; Moiz, Muzaffar; Hasan, Sarmad Report Dec 1, 2016 8394
Recommendations based QoS trust Aggregation and Routing in Mobile Adhoc Networks. Sirisala, Nageswararao; Bindu, C.Shoba Report Dec 1, 2016 4493
EETCA: Energy Efficient Trustworthy Clustering Algorithm for WSN. Senthil, T.; Kannapiran, B. Report Nov 1, 2016 6469
Security: VPN use low for public Wi-Fi. Report Oct 1, 2016 271
Privacy-preserving public auditing for data storage security in cloud computing. Pavithra, B.; Anita, C.S. Report Sep 15, 2016 2135
How secure is your disaster recovery plan? Effective DR means being prepared for both tornados and ransomware. Alstin, Chad Michael Van Sep 1, 2016 2963
Backing up your backups: six operational tips for managing data at a secondary site. Matheson, Stephen Sep 1, 2016 965
It's more than a text: three ways secure messaging solutions improve care coordination in the healthcare industry. Brooks, Brad Sep 1, 2016 923
Secure messaging in healthcare: The revolution continues. Hagerman, Kurt Report Sep 1, 2016 559
Securing the Integrated UMTS and WLAN Ad Hoc Networks for CBR Streaming Traffic against Wormhole Attacks. Tripathi, Shashank; Jain, A.K. Sep 1, 2016 8394
Dataguise publishes eBook. Free resource provides five simple steps to conducting secure, compliant data analytics in Microsoft Azure HDInsight. Aug 1, 2016 458
Research on the network security based on PrefixSpan algorithm in data mining. Zhang, Hao; Ye, Zhanxiang Aug 1, 2016 4403
Unintentional and involuntary personal information leakage on Facebook from user interactions. Lin, Po-Ching; Lin, Pei-Ying Report Jul 1, 2016 8639
Outlier detection method use for the network flow anomaly detection/Isskirciu radimo metodu taikymas anomalijoms kompiuteriu tinklo paketu srautuose aptikti. Ciplinskas, Rimas; Paulauskas, Nerijus Report Jun 1, 2016 3781
Wild resources, harvest data and food security in Nunavut's Qikiqtaaluk Region: a diachronic analysis. Wenzel, George W.; Dolan, Jessica; Brown, Chloe Jun 1, 2016 11416
Integrating fraud into data breach prevention. Bruemmer, Michael Jun 1, 2016 931
Data sharing for dynamic groups using GDH and TGDH in public cloud. Vinupriya, R.; Caroline, Kayalvizhi M. May 15, 2016 2552
Universal 3D Format Export & Protect Vertex Element Data While Triangulating Mesh Using .NET. Apr 16, 2016 514
A survey on maintaining data privacy a different perspective. Selvi, R. Senthamil; Valarmathi, M.L. Report Apr 1, 2016 2951
Identifying the mechanisms of information security incidents through corporate culture variables and sampling. Almubark, Abdullah; Hatanaka, Nobutoshi; Uchida, Osamu; Ikeda, Yukiyo Report Apr 1, 2016 6115
Conducting a business and systems analysis to protect your ECM investment. Grysiuk, Mark Mar 1, 2016 2821
Seven things: records destruction vendors are afraid to tell you. Johnson, Robert "Bob" Mar 1, 2016 2028
Cybersecurity: Playing by the rules and defending your network. Finn, David Mar 1, 2016 1573
Encrypted USB keeps data protection simple. Cobb, Stephen Brief article Mar 1, 2016 284
Data breach notification laws. Sullivan, Richard J.; Maniff, Jesse Leigh Jan 1, 2016 6573
Campus Challenge, Part 2. Masica, Ken Jan 1, 2016 3786
Detecting and preventing cyberattacks in your network: new IT security models can protect university systems more effectively. Dec 1, 2015 1438
Managing privileged access hacking threats. Schorr, Joe Dec 1, 2015 1109
Drowning in the Social Gap of Jordan. Brief article Nov 10, 2015 291
Preparing for the cyber battleground of the future. Babcock, Chris Nov 1, 2015 5360
The un-territoriality of data. Daskal, Jennifer Nov 1, 2015 9635
The un-territoriality of data. Daskal, Jennifer Nov 1, 2015 24909
Output Choice of a Chaotic Jerk Circuit Used as Transmitter in Data Secure Communications. Datcu, Octaviana; Stanciu, Mihai; Tauleigne, Roger; Burileanu, Corneliu; Barbot, Jean-Pierre Nov 1, 2015 4275
Aspects of policies and strategies for cyber security in the European union. Armencheva, Ilna Oct 1, 2015 4113
The new reality of cybersecurity: managing risk in a hacker's world. Brief article Oct 1, 2015 161
The honorable virgin. Brief article Aug 22, 2015 279
Of humans & glitches: data breeches and viruses in a flash (drive). Luttrell, Dan; Shanklin, Ann Aug 1, 2015 1293
An anamoly based Intrusion Detection System for mobile ad-hoc networks using genetic algorithm based support vector machine. Mukesh, K.G.; Khanna, H. Priyanka; Velvizhi, R.V. Report Aug 1, 2015 2722
Measuring effective performance of secure labeling scheme for XML content distribution. Sankari, S.; Bose, S.; Varghese, Lino Abraham Jul 15, 2015 2309
The state of cryptocurrencies, their issues and policy interactions. Subramanian, Ramesh; Chino, Theo Report Jul 1, 2015 6816
Effects of exchange benefits, security concerns and situational privacy concerns on mobile commerce adoption. Dai, Hua; Chen, Yan Report Jul 1, 2015 7300
Secure your data: best practices for keeping sensitive business and personal information out of the hands of computer hackers. Lesonsky, Rieva Jul 1, 2015 1790
Insider threats and organizational root causes: the 2009 Fort Hood terrorist attack. Zegart, Amy Critical essay Jun 22, 2015 6442
Semantic context aware authorization for securing data in cloud. M., Auxilia; Raja, K. Report Jun 1, 2015 2754
Protecting organizations--and culture--through digital preservation. Wiler, Vicki May 1, 2015 518
Mining frequent patterns through microaggregation in differential privacy. Ni, Z.; Li, Q.M.; Liu, X.Q.; Li, T.; Hou, R. Report Apr 1, 2015 2891
Territorial implications of the "right to be forgotten". Cosabic, Jasna Report Apr 1, 2015 5103
Economic analysis and statistical disclosure limitation. Abowd, John M.; Schmutte, Ian M. Report Mar 22, 2015 13621
A comprehensive information governance resource. Bailey, Robert Column Mar 1, 2015 667
Seizing the real opportunity presented by data breaches. Free, Jason Report Mar 1, 2015 636
ICTS AGAINST SECURITY. Minhas, Badar Sultan Mar 1, 2015 783
There's No Such Thing As Anonymous Data. Brief article Feb 13, 2015 227
Data breach industry forecast. Industry overview Feb 1, 2015 151
Securing the hospital network. Dec 14, 2014 1413
Advanced manufacturing systems. Ulsoy, A. Galip Brief article Dec 1, 2014 300
Cloud control: managing the risks of engaging and terminating cloud services. Boyd, Brian Y. Nov 1, 2014 2873
Research says: focus on business technology agenda to ensure IG success. McKinnon, Cheryl Nov 1, 2014 2624
Retail spearheads anti-cybercrime efforts: regrettably, the banking industry frequently engages in finger-pointing and blame-shifting. Kyle, Nancy C. Oct 31, 2014 549
Principles for protecting information privacy. Gable, Julie Sep 1, 2014 2475
Survey: information governance not being embraced. Jul 1, 2014 512
Cut costs, risks with proactive litigation plan. Wylie, Michael C.; Layton, Kelli A. Jul 1, 2014 2464
How to develop and implement an effective RIM policy. Richardson, Blake E. Jul 1, 2014 1899
The significance of mandatory data breach warnings to identity crime. Holm, Eric; Mackenzie, Geraldine Report Jul 1, 2014 7263
Convergence of forensics, ediscovery, security, & law. Jorgensen, Serge Jun 22, 2014 9523
Controlling security risk and fraud in payment systems. Sullivan, Richard J. Jun 22, 2014 8784
Big Data becoming a mined-over matter: are breaches heading toward outbreak status? Barlow, Rick Dana May 1, 2014 3430
Proposing a charter of personal data rights. Kosciejew, Marc May 1, 2014 2801
Protect yourself in the event of a data breach. Ngo, Sheiresa Brief article Mar 1, 2014 144
Impacts of social media in society. Mashhadi, Syeda Qudsia Feb 23, 2014 1305
African Union tackles cyber security. Brief article Feb 1, 2014 236
Evaluation of security issues in social networks. Thompson, A.F.; Otasowie, Iyare; Famose, O.A. Feb 1, 2014 7959
Hybrid network defense model based on fuzzy evaluation. Ying-Chiang, Cho; Jen-Yi, Pan Report Jan 1, 2014 7897
An energy-efficient and scalable secure data aggregation for wireless sensor networks. Wang, Taochun; Qin, Xiaolin; Liu, Liang Report Jan 1, 2014 7071
TDAL: thoroughly data aggregation of low energy devices in secure heterogeneous wireless sensor networks. Engouang, Tristan Daladier; Liu, Yun; Zhang, Zhenjiang Jan 1, 2014 9119
NATO's emerging threat perception: cyber Security in the 21st century/Nato'nun gelisen tehdit algisi: 21. yuzyilda siber guvenlik. Bicakci, Salih Essay Jan 1, 2014 11689
Preparing for the internet of things: smart devices present new security challenges. Heires, Katherine Jan 1, 2014 1662
Users are cybersecurity's Achilles heel. Jan 1, 2014 326
Online privacy: a global and ageless concern. Jan 1, 2014 414
Cybersecurity not ready for professionalization. Jan 1, 2014 338
BYOD brings security challenges. Jan 1, 2014 427
10 cybersecurity tips. Baker, C. Daniel Dec 1, 2013 697
The cyber effect. Discussion Dec 1, 2013 692
Helping small and midsized businesses succeed in a technology-driven world: four essential it risks and recommendations. Lanz, Joel Nov 1, 2013 2382
Cybersecurity: authoritative reports and resources. Tehan, Rita Report Oct 1, 2013 469
Taking cybersecurity seriously. Tuttle, Hilary Oct 1, 2013 972
Do you take credit cards? Security and compliance for the credit card payment industry. Willey, Lorrie; White, Barbara Jo Sep 22, 2013 5651
We know who you are and what you are made of: the illusion of Internet anonymity and its impact on protection from genetic discrimination. Davik, Christine Suzanne Sep 22, 2013 17975
Ten Security Concerns to be Kept in Mind While Accessing Cloud. Anisha, P R; Kishor, Kumar Reddy C; Prashanth, S K Report Sep 1, 2013 3765
Benefits of flow analysis using sFlow[R]: network visibility, security and integrity: Lancope Inc. Jerrim, John Aug 1, 2013 5144
Contact and Article Submission Information. Jul 1, 2013 588
Travel Technology News Alert - North America. Jun 10, 2013 1580
Network Attack Analysis and the Behaviour Engine. Benham, Anthony; Read, Huw; Sutherland, Iain Report May 1, 2013 6882
Task based Interdisciplinary E-Commerce Course with UML Sequence Diagrams, Algorithm Transformations and Spatial Circuits to Boost Learning Information Security Concepts. Herath, Ajantha; Al-Bastaki, Yousif; Herath, Suvineetha May 1, 2013 4866
Data protection and Facebook; an empirical analysis of the role of consent in social networks. Brief article Apr 1, 2013 179
Privacy and security in the cloud: a review of guidance and responses. Whitley, Edgar A.; Willcocks, Leslie P.; Venters, Will Report Mar 1, 2013 8007
A model for cost-benefit analysis of cloud computing. Nanath, Krishnadas; Pillai, Radhakrishna Report Mar 1, 2013 11000
Cybersecurity: Cyber Crime Protection Security Act (S. 2111, 112th Congress)--a legal analysis. Doyle, Charles Jan 1, 2013 8581
Analysis of Attacks in Authentication Protocol of IEEE 802.16e. Sameni, Kamran; Yazdani, Nasser; Payandeh, Ali Report Jan 1, 2013 5280
Cyber-risks facing state governments. Holbrook, Emily Brief article Dec 1, 2012 191
The efficiency and integrity of payment card systems: industry views on the risks posed by data breaches. Cheney, Julia S.; Hunt, Robert M.; Jacob, Katy R.; Porter, Richard D.; Summers, Bruce J. Column Nov 23, 2012 13073
The beyond the border action plan: a tool for enhanced Canada-U.S. cooperation on critical infrastructure and cyber security - or more window dressing? de Laat, William Sep 22, 2012 6668
A new security model in P2P network based on rough set and Bayesian learner. Hai-Sheng, Wang; Xiao-Lin, Gui Sep 1, 2012 8923
AC4E: an access control model for emergencies of mission-critical cyber-physical systems. Chen, Dong; Chang, Guiran; Jia, Jie Sep 1, 2012 8691
NCIA's Federal Criminal Sentencing Database Secures Major Reductions in Prison Time. May 24, 2012 313
Aberdeen Group Sees Classification as Key to Successful Data Loss Prevention. Feb 16, 2012 624
De-individuation, anonymity and unethical behavior in cyberspace--explorations in the valley of digital temptations. Longe, O.B.; Danquah, P.; Ebem, D.U. Feb 1, 2012 3104
Secure communication based on Qi hyper-chaos. Owuor, Dennis Luke; Qi, Guoyuan Jan 1, 2012 2883
It's an asp! It's a SaaS! It's a utility! No, it's a cloud. Lebowitz, Jeff Column Dec 1, 2011 1788
Unprepared for hackers: a response team with expertise across the company and a plan for managing risk need to be in place before an attack. Hintze, John Jul 1, 2011 402
More companies conduct screening of new employees. Bell, Robert Nov 15, 2010 1594
Friend of foe? Network security in the social media age. McClure, Ann Nov 1, 2010 2868
Data breaches a cause for concern. Brief article Oct 25, 2010 131
Exploring: data loss prevention systems for legal holds and e-discovery. Daley, M. James; Fey, Laura Clark; Fasching, Diana Sep 1, 2010 1909
Strategic modeling of information sharing among data privacy attackers. Duong, Quang; LeFevre, Kristen; Wellman, Michael P. Jun 1, 2010 6218
Forum Guide to Data Ethics. NFES 2010-801. Abstract Feb 1, 2010 279
Bio inspired secure routing in Wireless Mesh Networks. Mowjoon, Mohamed; M.; Agbinya, J. Jan 1, 2010 3819
An integrated framework for information security management. Ma, Qingxiong; Schmidt, Mark B.; Herberger, G.R.; Pearson, J. Michael Sep 22, 2009 5225
Cyber security and the pipeline control system. Byres, Eric J. Feb 1, 2009 1967
The risk intelligent CIO. Dittmar, Lee; Kobel, Bill Mar 1, 2008 673

Terms of use | Privacy policy | Copyright © 2021 Farlex, Inc. | Feedback | For webmasters |