Zobrazeno 1 - 10
of 31
pro vyhledávání: '"Victor A Clincy"'
CONTENTS: SESSION: BIG DATA: DATA MANAGEMENT AND STORAGE + SIMULATION + APPLICATIONS SESSION: SEARCH + INTELLIGENT DATABASES + TEXT INFORMATION MANAGEMENT SESSION: CLOUD COMPUTING + WEB SERVICES + INTERNET COMPUTING AND APPLICATIONS SESSION: SECURITY
Publikováno v:
TrustCom
Mobile Health (mhealth) applications are widely used applications to monitor our health, well being and daily activities. The privacy and security of personal information while using mHealth apps are of great concerns. In this paper, we propose a met
Publikováno v:
COMPSAC
In recent years, security has been a major concern to everyone. Some devices like energy meters, health appliances have been a life changing technology for smart city. These devices have assisted in connecting several different services and in turn h
Autor:
Hossain Shahriar, Victor A. Clincy
Publikováno v:
COMPSAC (1)
One of the current challenges that faces individual organizations that are attempting to utilize blockchain in making more secure and transparent transaction between organizations are standards. Not all platforms, however, are suitable. In this paper
Autor:
Hossain Shahriar, Victor A. Clincy
Publikováno v:
COMPSAC (1)
IoT devices can be used to fulfil many of our daily tasks. IoT could be wearable devices, home appliances, or even light bulbs. With the introduction of this new technology, however, vulnerabilities are being introduced and can be leveraged or exploi
Autor:
Hossain Shahriar, Victor A. Clincy
Publikováno v:
Advances in Intelligent Systems and Computing ISBN: 9783319987750
Firewall is generally the first layer of defense in network security, where rules are specified to allow or reject incoming and outgoing network traffic. However, firewall rules may be prone to ‘erratic’ operations because of human errors involve
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::752e466f63f8186ba52b7d0a68f1a238
https://doi.org/10.1007/978-3-319-98776-7_46
https://doi.org/10.1007/978-3-319-98776-7_46
Autor:
Hossain Shahriar, Victor A. Clincy
Publikováno v:
COMPSAC (1)
Web Application Firewalls (WAFs) are deployed to protect web applications and they offer in depth security as long as they are configured correctly. A problem arises when there is over-reliance on these tools. A false sense of security can be obtaine
Web services are being widely used for business integration. Understanding what these web services are and how they work is important. Attacks on these web services are a major concern and can expose an organizations' valuable resources. This chapter
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::03cd60933f4395bc68229bdec75ab4e1
https://doi.org/10.4018/978-1-5225-5583-4.ch015
https://doi.org/10.4018/978-1-5225-5583-4.ch015
Publikováno v:
Journal of Information Security. :111-117
Over the last decades, email has been the major carrier for transporting spam and malicious contents over the network. Email is also the primary source of numerous criminal activities on the Internet. Computer Forensics is a systematic process to ret
Publikováno v:
Journal of Information Security. :206-212
Mobile devices have taken an essential role in the portable computer world. Portability, small screen size, and lower cost of production make these devices popular replacements for desktop and laptop computers for many daily tasks, such as surfing on