Zobrazeno 1 - 10
of 57
pro vyhledávání: '"Simon Tjoa"'
Publikováno v:
Future Internet, Vol 12, Iss 12, p 222 (2020)
Since the introduction of Bitcoin, the term “blockchain” has attracted many start-ups and companies over the years, especially in the financial sector. However, technology is evolving faster than standardization frameworks. This left the industry
Externí odkaz:
https://doaj.org/article/2f7e5cd50c68495883157fec9f543a24
Publikováno v:
2022 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE).
Publikováno v:
2022 IEEE Global Engineering Education Conference (EDUCON).
Autor:
Simon Tjoa, Lukas König
Publikováno v:
Advanced Information Networking and Applications ISBN: 9783030995867
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::13e85769d528ad0d334ec5f29e8f6e9a
https://doi.org/10.1007/978-3-030-99587-4_42
https://doi.org/10.1007/978-3-030-99587-4_42
Publikováno v:
Jusletter-IT.
Publikováno v:
Proceedings of the 8th International Conference on Information Systems Security and Privacy.
Publikováno v:
Lecture Notes in Networks and Systems ISBN: 9783030959173
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::9301d4ce1541fe8e1943c37e220cacd7
https://doi.org/10.1007/978-3-030-95918-0_11
https://doi.org/10.1007/978-3-030-95918-0_11
Autor:
Martin Pirker, Peter Kieseberg, Lukas Daniel Klausner, Sebastian Eresheim, Francesco Mercaldo, Torsten Priebe, Fiammetta Marulli, Oliver Eigner, Simon Tjoa
Publikováno v:
2021 IEEE International Conference on Cyber Security and Resilience (CSR).
Artificial intelligence (AI) systems are becoming critical components of today's IT landscapes. Their resilience against attacks and other environmental influences needs to be ensured just like for other IT assets. Considering the particular nature o
Publikováno v:
Journal of Computer Virology and Hacking Techniques. 16:19-61
Attacks on IT systems are a rising threat against the confidentiality, integrity, and availability of critical information and infrastructures. At the same time, the complex interplay of attack techniques and possible countermeasures makes it difficu
This book provides readers with the necessary capabilities to meet the challenge of building and testing resilient IT services. Upon introducing the fundamentals of cyber resilience with important international standards and best practices, and the r