Zobrazeno 1 - 10
of 130
pro vyhledávání: '"Simon Parkin"'
Autor:
Monika Roopak, Simon Parkinson, Gui Yun Tian, Yachao Ran, Saad Khan, Balasubramaniyan Chandrasekaran
Publikováno v:
IET Networks, Vol 13, Iss 5-6, Pp 513-527 (2024)
Abstract The authors introduce an unsupervised Intrusion Detection System designed to detect zero‐day distributed denial of service (DDoS) attacks in Internet of Things (IoT) networks. This system can identify anomalies without needing prior knowle
Externí odkaz:
https://doaj.org/article/341e97f1e01c40b3ac9c7c698141b51d
Publikováno v:
ACM Proceedings on Human-Computer Interaction, 6(CSCW2)
Proceedings of the ACM Human-Computer Interaction
25th ACM Conference on Computer-Supported Cooperative Work and Social Computing
Proceedings of the ACM Human-Computer Interaction
25th ACM Conference on Computer-Supported Cooperative Work and Social Computing
The ongoing global COVID-19 pandemic made working from home -- wherever working remotely is possible -- the norm for what had previously been office-based jobs across the world. This change in how we work created a challenging situation for system ad
Autor:
Simon Parkin, Yi Ting Chua
Publikováno v:
Journal of Computer Security. 30:327-356
Cybersecurity controls are deployed to manage risks posed by malicious behaviours or systems. What is not often considered or articulated is how cybersecurity controls may impact legitimate users (often those whose use of a managed system needs to be
Publikováno v:
Journal of Computer Security. 30:435-464
Security policy-makers (influencers) in an organization set security policies that embody intended behaviours for employees (as decision-makers) to follow. Decision-makers then face choices, where this is not simply a binary decision of whether to co
Publikováno v:
Journal of Cybersecurity, 8(1)
The decisions involved in choosing technology components for systems are poorly understood. This is especially so where the choices pertain to system security and countering the threat of cybersecurity attack. Although common in some commercial produ
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::ccb9bc4ded703e04dd96657e1099ec2f
https://eprints.worc.ac.uk/12414/1/tyac009.pdf
https://eprints.worc.ac.uk/12414/1/tyac009.pdf
Publikováno v:
New Security Paradigms Workshop, NSPW 2021
Leaders of organisations must make investment decisions relating to the security of their organisation. This often happens through consultation with a security specialist. Consultations may be regarded as conversations taking place in a trading zone
Autor:
Simon Parkin
From the award-winning author of The Island of Extraordinary Captives, the riveting, untold true story of the botanists at the world's first seed bank who faced an impossible choice during the Siege of Leningrad: eat the collection to prevent starvat
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030559571
STAST
STAST
Security policy-makers (influencers) in an organization set security policies that embody intended behaviours for employees (as decision-makers) to follow. Decision-makers then face choices, where this is not simply a binary decision of whether to co
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::9ace55bb45cbbdecc245ac401929628d
https://doi.org/10.1007/978-3-030-55958-8_4
https://doi.org/10.1007/978-3-030-55958-8_4
Publikováno v:
SSRN Electronic Journal.
Technology-facilitated abuse or ‘tech abuse’ in intimate partner violence (IPV) contexts describes the breadth of harms that can be enacted using digital systems and online tools. While the misappropriation of technologies in the context of IPV h
Autor:
Yi Ting Chua, Simon Parkin
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030793173
STAST
STAST
Background. Cybersecurity controls are deployed to manage risks posed by malicious behaviours or systems. What is not often considered or articulated is how cybersecurity controls may impact legitimate users (often those whose use of a managed system
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::3cdb18c8c89c2f02a34016d7b99a0852
https://doi.org/10.1007/978-3-030-79318-0_2
https://doi.org/10.1007/978-3-030-79318-0_2