Zobrazeno 1 - 10
of 16
pro vyhledávání: '"Derek Mohammed"'
Cyberspace is quickly becoming overwhelmed with ever-evolving malware that breaches all security defenses and secretly leaks confidential business data. One of the most pressing challenges faced by business organizations when they experience a cyber-
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::7419ad0e5a42df706dd8985e54c89357
https://doi.org/10.4018/978-1-7998-8693-8.ch010
https://doi.org/10.4018/978-1-7998-8693-8.ch010
Android is a free, open source platform that allows any developer to submit apps to the Android Market with no restrictions. This enables hackers to pass their malicious apps to the Android Market as legitimate apps. The central issue lies at the hea
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::36111a5e7e40c5a7e65b48514d789157
https://doi.org/10.4018/978-1-7998-8545-0.ch034
https://doi.org/10.4018/978-1-7998-8545-0.ch034
In this paper, we present a novel framework that enhances user experience for their daily computing activities while being protected from cyber threats. The conceptual security framework also targets two additional goals: enabling end-users to experi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::e770d2dee07ec8028cfae087826a581c
https://doi.org/10.4018/978-1-7998-7705-9.ch029
https://doi.org/10.4018/978-1-7998-7705-9.ch029
Publikováno v:
ICICT
Net neutrality has been the topic of numerous debates in many countries. People are fighting for what they believe to be a basic right to use the Internet, in which bandwidth throttling and preferable treatments should not be exercised. There are man
Publikováno v:
International Journal of Hyperconnectivity and the Internet of Things. 2:21-29
The repeal of net neutrality has caused a great public outcry from academic down to the end-users. Net neutrality was an FCC order that specified the principles for Internet Service Providers. The most prevalent principles were related to bandwidth t
Publikováno v:
International Journal of Hyperconnectivity and the Internet of Things. 1:19-28
In this paper, we present a novel framework that enhances user experience for their daily computing activities while being protected from cyber threats. The conceptual security framework also targets two additional goals: enabling end-users to experi
Publikováno v:
International journal of simulation: systems, science & technology.
Publikováno v:
International journal of simulation: systems, science & technology.
Publikováno v:
UKSim
Many companies are making the move to a cloudbased environment for data storage and management. Having their data in the cloud has many benefits in that it may help the company move forward and innovate. The embracing of cloud-based services by corpo