We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 21-40 of 1,743 results
  1. PLC Availability Scheme

    Ensuring availability in Power Line Communication (PLC) networks is paramount to maintaining uninterrupted communication, especially given their...
    Javier Hernandez Fernandez, Aymen Omri, Roberto Di Pietro in Physical Layer Security in Power Line Communications
    Chapter 2024
  2. An Overview of Power Line Communication Networks

    This chapter provides a comprehensive survey of Power Line Communication (PLC) networks, reviewing the different technologies that shape this field....
    Javier Hernandez Fernandez, Aymen Omri, Roberto Di Pietro in Physical Layer Security in Power Line Communications
    Chapter 2024
  3. PLC Network Integrity Solution

    Assuring that the power line has not been altered or tampered with in an unauthorized manner is key for maintaining the integrity of Power Line...
    Javier Hernandez Fernandez, Aymen Omri, Roberto Di Pietro in Physical Layer Security in Power Line Communications
    Chapter 2024
  4. Telling Data Stories, the Way Averroes Wrote His Commentaries – A Three-Level Approach to Facilitate Data-Driven Decision Making

    Data stories are a narrative format that presents information and data in a way that is easy to understand and engage with. They contain various...
    Vincent de Vevey, Marielle Guirlet, ... René Schneider in Information Experience and Information Literacy
    Conference paper 2024
  5. Data Literacy in Public Libraries in Croatia: An Empirical Study

    The importance of data literacy in a data-driven world is ever-increasing. There are many definitions for the term data literacy, suggesting...
    Conference paper 2024
  6. Maturity Model as the Tool for Information/Data Literacy Assessment

    The aim of this article is to present the similarities between two assessment tools: data literacy (DL) rubrics and research data management services...
    Conference paper 2024
  7. Improving STEM Competences by Using Artificial Intelligence to Generate Video Games Based on Student Written Stories

    In this paper the results of conducted research as a prerequisite for a model developed in order to foster STEM competences of non-STEM students are...
    Ivana Ogrizek Biškupić, Mario Konecki, Mladen Konecki in Information Experience and Information Literacy
    Conference paper 2024
  8. Blockchain-Based Access Control for Electronic Health Records

    Blockchain-based access control mechanisms have the potential to significantly enhance the security and privacy of electronic health record systems....
    Khandoker Tahmid Sami, Mohsen Toorani in Secure and Resilient Digital Transformation of Healthcare
    Conference paper 2024
  9. Threat Modeling Towards Resilience in Smart ICUs

    Healthcare digitization has significantly enhanced patient care and alleviated the workload of hospital staff. This trend towards automation has also...
    Christian Baumhör, Thomas Henning, Matteo Große-Kampmann in Secure and Resilient Digital Transformation of Healthcare
    Conference paper 2024
  10. Methodology for Automating Attacking Agents in Cyber Range Training Platforms

    The world faces cyberattacks daily and the targets of these attacks are often critical infrastructure, including the healthcare sector. In addition,...
    Pablo Martínez Sánchez, Pantaleone Nespoli, ... Félix Gómez Mármol in Secure and Resilient Digital Transformation of Healthcare
    Conference paper 2024
  11. Blockchain Technology for E-Governance Applications

    Blockchain technology or distributed ledger technology since its inception as a cryptocurrency platform has captured the imagination of computer...
    Ras Dwivedi, Nilesh Vasita, ... Sandeep Shukla in Blockchains
    Chapter 2024
  12. Decentralized Identity Management and Blockchains: Design Patterns and Architectures

    Securely and efficiently managing digital identities is a pre-requisite to enabling prosperous digital service economy underpinned by trust. The...
    Hye-young Paik, Yue Liu, ... Salil S. Kanhere in Blockchains
    Chapter 2024
  13. The Future Ring Confidential Transaction Protocols for Privacy-Preserving Blockchain

    In this chapter, we are going to give some potential future enhancement on the privacy-preserving blockchain protocol, the Ring Confidential...
    Muhammed F. Esgin, Joseph K. Liu, ... Dimaz Ankaa Wijaya in Blockchains
    Chapter 2024
  14. Supply Chain Management Using Blockchain

    Among many domains being disrupted by blockchains, supply chains are at the top, as they naturally involve multi-party collaboration and regulatory...
    Christopher Klinkmueller, H. M. N. Dilum Bandara, ... Qinghua Lu in Blockchains
    Chapter 2024
  15. Blockchain Technology Accelerating Industry 4.0

    Competitive industrial environments impose significant requirements on data sharing as well as the accountability and verifiability of related...
    Jan Pennekamp, Lennart Bader, ... Klaus Wehrle in Blockchains
    Chapter 2024
  16. Cryptographic Primitives

    Blockchain is a promising and growing technology for providing reliable and secure decentralized solutions. Nevertheless, it encounters many research...
    Mayank Raikwar, Shuang Wu in Blockchains
    Chapter 2024
  17. Acoustic Compensation System Against Adversarial Voice Recognition

    Automatic speech recognition (ASR) provides diverse audio-to-text services for humans to communicate with machines. However, recent researches reveal...
    Chapter 2024
  18. Applied Cryptography

    This chapter illustrates how cryptography can be used to achieve aims other than confidentiality of data. In particular, it can be used to ensure:...
    Chapter 2024
  19. Epilogue

    This concluding chapter considers the question of whether in practice t is possible to achieve the aim of having true cybersecurity. It reviews in...
    Chapter 2024
  20. Incident Handling and System Availability

    This chapter 1 focuses on how to react if, despite all precautions, an attack or other incident leads to a security breach. This is largely a...
    Chapter 2024
Did you find what you were looking for? Share feedback.