1
2
Brooks, Tyson T.
2024
Table of Contents:
“... technology -- Edge computing and cyber warfare: strategies for future operations in a wireless grid SDN-enabled world -- Developing a cyberassurance multiple adversary risk model for wireless grids edgeware -- An internet control device embedded sensor agent...”2024
Full text
3
Table of Contents:
“...Chapter. 1. Challenges and Opportunities of Teaching Cybersecurity in UK University Computing Programmes -- Chapter. 2. Using the Delphi Method to Elicit Requirements for an International Master's Program in Information Security Management -- Chapter. 3...”
Full text
Full text
4
5
Papadaki, Maria
2022
Table of Contents:
“... Technology and Applications -- Computation of Blockchain Readiness Under Partial Information -- Blockchain Application in Luxury Brand Strategy: What Does Blockchain Technology Mean to Luxury Brands? -- Exploring the Need for Blockchain-based National Population...”2022
Full text
6
Idoudi, Hanen
2021
Table of Contents:
“...Introduction -- Part I: Physical Design of Medical Devices, Signal Processing and Emergent Wireless Technologies for E-health -- Design and Control of Multifunctional, Multiarticulate Prosthetic Hand -- A Mobile Computing Solution for Enhanced Living...”2021
Full text
7
8
Skopik, Florian
2021
Table of Contents:
“... -- 8.3.4 Compute indicators -- 8.3.5 Select tokens -- 8.3.6 Compute indicator weights -- 8.3.7 Report anomalies -- 8.4 Try it out -- 8.4.1 Apache Access log -- 9. Final remarks....”2021
Full text
9
10
Gao, Longxiang
2021
Table of Contents:
“...Chapter 1 An Introduction to Edge Computing -- Chapter 2 Privacy Issues in Edge Computing.-Chapter 3 Context-Aware Privacy-Preserving in Edge Computing -- Chapter 4 Location-Aware Privacy Preserving in Edge Computing -- Chapter 5 Blockchain based...”2021
Full text
11
12
Alloum, Amira
2021
Table of Contents:
“... of operational faults in cloud applications by mining causal dependencies in logs using Golden Signals -- Pre-training Language Models for IT Operations -- Towards Runtime Verification via Event Stream Processing in Cloud Computing Infrastructures -- Decentralized...”2021
Full text
13
Jahankhani, Hamid
2021
Table of Contents:
“..., Profiling and Modelling and Privacy by Design -- 8. Artificial Intelligence-Enabled Authentication and Associated Security Implications -- 9. Attacking Artificial Intelligence: Security Vulnerability and Proposed Countermeasures -- 10. Intelligent Security...”2021
Full text
14
15
16
Chang, Wei
2021
Table of Contents:
“... for Fog/Edge Computing Resources" -- 10. "Algorithms for NFV-Enabled Multicasting in Mobile Edge Computing" -- 11. "Blockchain-based Security Services for Fog Computing". Part V: Applications of Fog/Edge Computing -- 12. "Industrial Internet of Things (IIoT...”2021
Full text
17
Badhwar, Raj
2021
Table of Contents:
“... -- Protect society, the commonwealth, and the infrastructure - post COVID-19 -- Self-Service Recovery Options for Bricked Windows Devices -- Certification and Accreditation -- Hack back or not -- CISOs need Liability Protection -- Enable Secure work-from-home....”2021
Full text
18
Dunkelman, Orr
2021
Table of Contents:
“...Public-key Cryptography -- Efficient Lattice-Based Polynomial Evaluation and Batch ZK Arguments -- FROST: Flexible Round-Optimized Schnorr Threshold Signatures -- Algorithmic Acceleration of B/FV-like Somewhat Homomorphic Encryption for Compute-Enabled...”2021
Full text
19
Badhwar, Raj
2021
Table of Contents:
“...Are you ready for Quantum computing? -- The need for post-quantum cryptography -- Quantum Encryption is not a Paradox -- AI Code of Ethics for Cybersecurity -- The Case of AI/ML in Cybersecurity -- Security for Work-From-Home Technologies -- Secure video...”2021
Full text
20
Garay, Juan A.
2021
Table of Contents:
“... for Non-Interactive Statistical Zero-Knowledge -- On the CCA Compatibility of Public-Key Infrastructure -- Round-optimal Verifiable Oblivious Pseudorandom Functions from Ideal Lattices -- BETA: Biometric-Enabled Threshold Authentication -- Masked Triples...”2021
Full text