![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
305 Result(s)
-
Chapter and Conference Paper
Bookending ARFIS: The Development, Final Results, and Current State of the Academic Reading Format International Study
The Academic Reading Format International Study (ARFIS) is the largest study conducted to date on tertiary students’ reading format preferences and behaviors
-
Chapter and Conference Paper
Voice-Assisted Food Recall Using Voice Assistants
In this paper, we design a voice-assisted food recall tool that can be implemented on voice assistants of smart speakers and smartphones, enabling frequent, quick, and real-time self-administered food recall. ...
-
Chapter and Conference Paper
Don’t Tamper with Dual System Encryption
In related-key attacks (RKA), an attacker modifies a secret key stored in a device by tampering or fault injection and observes the evaluation output of the cryptographic algorithm based on this related key. I...
-
Chapter and Conference Paper
The Use of Structuration Theory in Empirical Information Systems Research: A Systematic Literature Review
Structuration Theory (ST) is increasingly used in the field of Information Systems (IS) and has been widely cited by IS researchers
-
Chapter and Conference Paper
Exploiting Redundancy in Network Flow Information for Efficient Security Attack Detection
Securing communication networks has become increasingly important due to the growth in cybersecurity attacks, such as ransomware and denial of service attacks. In order to better observe, detect and track atta...
-
Chapter and Conference Paper
Reducing Intrusion Alert Trees to Aid Visualization
Cyber defense tools, such as intrusion detection systems, often produce huge amounts of alerts which must be parsed for defensive purposes, particularly cyber triage. In this paper, we utilize the notion of alert...
-
Chapter and Conference Paper
Deep Learning for Accurate Corner Detection in Computer Vision-Based Inspection
This paper describes application of deep learning for accurate detection of corner points in images and its application for an inspection system developed for the worker training and assessment. In our local b...
-
Chapter and Conference Paper
Access Control Encryption from Group Encryption
Access control encryption (ACE) enforces both read and write permissions. It kills off any unpermitted subliminal message channel via the help of a sanitizer who knows neither of the plaintext, its sender and ...
-
Chapter and Conference Paper
Usability Assessment of the **aoAi Touch Screen Speaker
With the development of modern economy and technology, people's living standards are constantly improving, and more intelligent products have come into people's vision. People's requirements for product availa...
-
Chapter and Conference Paper
A Review on Visualization of Educational Data in Online Learning
Higher educational institutions capture huge amounts of educational data, especially in online learning. Data mining techniques have shown promises to interpret these data using different patterns . However, u...
-
Chapter and Conference Paper
Simple Storage-Saving Structure for Volume-Hiding Encrypted Multi-maps
Severe consequences in volume leakage (subject to the conditions required by specific attacks) stimulate a new research direction (Eurocrypt 2019) of volume-hiding structured encryption (
-
Chapter and Conference Paper
Education 4.0: Gaps Research Between School Formation and Technological Development
Industry constantly changes following technological developments and innovation, resulting in changes in productivity, the labor market and education. As a result of this new industrial revolution, developed t...
-
Chapter and Conference Paper
Multi-client Oblivious RAM with Poly-logarithmic Communication
Oblivious RAM enables oblivious access to memory in the single-client setting, which may not be the best fit in the network setting. Multi-client oblivious RAM (MCORAM) considers a collaborative but untrusted ...
-
Chapter and Conference Paper
VisDrone-MOT2020: The Vision Meets Drone Multiple Object Tracking Challenge Results
The Vision Meets Drone (VisDrone2020) Multiple Object Tracking (MOT) is the third annual UAV MOT tracking evaluation activity organized by the VisDrone team, in conjunction with European Conference on Computer...
-
Chapter and Conference Paper
Stargazing in the Dark: Secure Skyline Queries with SGX
Skylining for multi-criteria decision making is widely applicable and often involves sensitive data that should be encrypted, especially when the database and query engine are outsourced to an untrusted cloud ...
-
Chapter and Conference Paper
Estimating Quantum Speedups for Lattice Sieves
Quantum variants of lattice sieve algorithms are routinely used to assess the security of lattice based cryptographic constructions. In this work we provide a heuristic, non-asymptotic, analysis of the cost of...
-
Chapter and Conference Paper
Follow the Blue Bird: A Study on Threat Data Published on Twitter
Open Source Intelligence (OSINT) has taken the interest of cybersecurity practitioners due to its completeness and timeliness. In particular, Twitter has proven to be a discussion hub regarding the latest vuln...
-
Chapter and Conference Paper
Bot Log Mining: Using Logs from Robotic Process Automation for Process Mining
Robotic Process Automation (RPA) is an emerging technology for automating tasks using bots that can mimic human actions on computer systems. Most existing research focuses on the earlier phases of RPA implemen...
-
Chapter and Conference Paper
Increasing the Efficiency of GPU Bitmap Index Query Processing
Once exotic, computational accelerators are now commonly available in many computing systems. Graphics processing units (GPUs) are perhaps the most frequently encountered computational accelerators. Recent wor...
-
Chapter and Conference Paper
Position: GDPR Compliance by Construction
New laws such as the European Union’s General Data Protection Regulation (GDPR) grant users unprecedented control over personal data stored and processed by businesses. Compliance can require expensive manual...