Search
Search Results
-
PLC Availability Scheme
Ensuring availability in Power Line Communication (PLC) networks is paramount to maintaining uninterrupted communication, especially given their... -
An Overview of Power Line Communication Networks
This chapter provides a comprehensive survey of Power Line Communication (PLC) networks, reviewing the different technologies that shape this field.... -
PLC Network Integrity Solution
Assuring that the power line has not been altered or tampered with in an unauthorized manner is key for maintaining the integrity of Power Line... -
Telling Data Stories, the Way Averroes Wrote His Commentaries – A Three-Level Approach to Facilitate Data-Driven Decision Making
Data stories are a narrative format that presents information and data in a way that is easy to understand and engage with. They contain various... -
Data Literacy in Public Libraries in Croatia: An Empirical Study
The importance of data literacy in a data-driven world is ever-increasing. There are many definitions for the term data literacy, suggesting... -
Maturity Model as the Tool for Information/Data Literacy Assessment
The aim of this article is to present the similarities between two assessment tools: data literacy (DL) rubrics and research data management services... -
Improving STEM Competences by Using Artificial Intelligence to Generate Video Games Based on Student Written Stories
In this paper the results of conducted research as a prerequisite for a model developed in order to foster STEM competences of non-STEM students are... -
Blockchain-Based Access Control for Electronic Health Records
Blockchain-based access control mechanisms have the potential to significantly enhance the security and privacy of electronic health record systems.... -
Threat Modeling Towards Resilience in Smart ICUs
Healthcare digitization has significantly enhanced patient care and alleviated the workload of hospital staff. This trend towards automation has also... -
Methodology for Automating Attacking Agents in Cyber Range Training Platforms
The world faces cyberattacks daily and the targets of these attacks are often critical infrastructure, including the healthcare sector. In addition,... -
Blockchain Technology for E-Governance Applications
Blockchain technology or distributed ledger technology since its inception as a cryptocurrency platform has captured the imagination of computer... -
Decentralized Identity Management and Blockchains: Design Patterns and Architectures
Securely and efficiently managing digital identities is a pre-requisite to enabling prosperous digital service economy underpinned by trust. The... -
The Future Ring Confidential Transaction Protocols for Privacy-Preserving Blockchain
In this chapter, we are going to give some potential future enhancement on the privacy-preserving blockchain protocol, the Ring Confidential... -
Supply Chain Management Using Blockchain
Among many domains being disrupted by blockchains, supply chains are at the top, as they naturally involve multi-party collaboration and regulatory... -
Blockchain Technology Accelerating Industry 4.0
Competitive industrial environments impose significant requirements on data sharing as well as the accountability and verifiability of related... -
Cryptographic Primitives
Blockchain is a promising and growing technology for providing reliable and secure decentralized solutions. Nevertheless, it encounters many research... -
Acoustic Compensation System Against Adversarial Voice Recognition
Automatic speech recognition (ASR) provides diverse audio-to-text services for humans to communicate with machines. However, recent researches reveal... -
Applied Cryptography
This chapter illustrates how cryptography can be used to achieve aims other than confidentiality of data. In particular, it can be used to ensure:... -
Epilogue
This concluding chapter considers the question of whether in practice t is possible to achieve the aim of having true cybersecurity. It reviews in... -
Incident Handling and System Availability
This chapter 1 focuses on how to react if, despite all precautions, an attack or other incident leads to a security breach. This is largely a...