Zobrazeno 1 - 10
of 67
pro vyhledávání: '"BILL BUCHANAN"'
Autor:
Bill Buchanan, Naseem Naqvi
Publikováno v:
The Journal of The British Blockchain Association, Vol 1, Iss 1 (2018)
A blockchain enabled ‘Digital Single Economy” can act as a catalyst for growth and could provide a platform where borderless innovative practices will thrive and create a true collaborative global economy, with shared goals and objectives for the
Externí odkaz:
https://doaj.org/article/e7fc6a0018344007b8dd93d98038783b
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
IEEE Transactions on Computational Social Systems. 6:1369-1372
The Internet of Things (IoT) is expected to connect a massive number of smart devices to the Internet. The existing centralized architecture for handling the huge volume of data created in the IoT is facing many research challenges, including securit
Publikováno v:
2021 14th International Conference on Security of Information and Networks (SIN).
Publikováno v:
2021 5th Cyber Security in Networking Conference (CSNet).
Publikováno v:
COINS
Recent years have seen an increase in medical big data, which can be attributed to a paradigm shift experienced in medical data sharing induced by the growth of medical technology and the Internet of Things. The evidence of this potential has been pr
Publikováno v:
ICVISP
The original consensus algorithm - Proof of Work (PoW) has been widely utilized in the blockchain systems and is been adopted by many cryptocurrencies, such as Bitcoin and Ethereum, among many others. Nevertheless, the concept has received criticisms
Publikováno v:
2017 Computing Conference.
A phishing email is a legitimate-looking email which is designed to fool the recipient into believing that it is a genuine email, and either reveals sensitive information or downloads malicious software through clicking on malicious links contained i
Publikováno v:
2017 Computing Conference.
Detecting botnets and advanced persistent threats is a major challenge for network administrators. An important component of such malware is the command and control channel, which enables the malware to respond to controller commands. The detection o
Autor:
ROBERT R. SHERMAN, GERALD L. GUTEK, DON T. MARTIN, HARVEY NEUFELDT, BILL BUCHANAN, WILLIAM F. PINAR, HERBERT G. REID
Publikováno v:
Educational Studies. 23:281-319