We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 2,529 results
  1. Information Experience and Information Literacy 8th European Conference on Information Literacy, ECIL 2023, Kraków, Poland, October 9–12, 2023, Revised Selected Papers, Part I

    The two-volume set CCIS 2042 and 2043 constitutes the refereed proceedings of the 8th European Conference on Information Literacy, ECIL 2023, held in...
    Serap Kurbanoğlu, Sonja Špiranec, ... Loriene Roy in Communications in Computer and Information Science
    Conference proceedings 2024
  2. Decentralized Privacy Preservation in Smart Cities

    This book investigates decentralized trust-based privacy-preserving solutions in smart cities. The authors first present an overview of smart cities...

    Cheng Huang, Xuemin (Sherman) Shen in Wireless Networks
    Book 2024
  3. Decision Making and Security Risk Management for IoT Environments

    This book contains contemporary research that outlines and addresses security, privacy challenges and decision-making in IoT environments. The...
    Wadii Boulila, Jawad Ahmad, ... Imed Riadh Farah in Advances in Information Security
    Book 2024
  4. Scaling Up: How Data Curation Can Help Address Key Issues in Qualitative Data Reuse and Big Social Research

    This book explores the connections between qualitative data reuse, big social research, and data curation. A review of existing literature identifies...
    Book 2024
  5. Information Security Planning A Practical Approach

    This book demonstrates how information security requires a deep understanding of an organization's assets, threats and processes, combined with the...

    Susan Lincke
    Book 2024
  6. Introduction to Cybersecurity A Multidisciplinary Challenge

    This book provides an introduction to the basic ideas involved in cybersecurity, whose principal aim is protection of IT systems against unwanted...

    Textbook 2024
  7. Cognitive Computing – ICCC 2023 7th International Conference Held as Part of the Services Conference Federation, SCF 2023 Shenzhen, China, December 17-18, 2023 Proceedings

    This book constitutes the refereed proceedings of the 7th International Conference on Cognitive Computing, ICCC 2023, held in Shenzhen, China, during...

    **uqin Pan, Ting **, Liang-Jie Zhang in Lecture Notes in Computer Science
    Conference proceedings 2024
  8. Blockchains A Handbook on Fundamentals, Platforms and Applications

    This handbook is a selection of foundational aspects, security analysis, platforms, and applications of blockchains that consists of four parts. The...
    Sushmita Ruj, Salil S. Kanhere, Mauro Conti in Advances in Information Security
    Book 2024
  9. Cyber Crisis Management Das Praxishandbuch zu Krisenmanagement und Krisenkommunikation

    Cyber-Attacken und IT-Pannen bedrohen jede Organisation. Die Zwischenfälle häufen sich und bilden oft den Auftakt zu komplexen, existenzgefährdenden...
    Holger Kaschner
    Book 2024
  10. Android Malware Detection and Adversarial Methods

    The rise of Android malware poses a significant threat to users’ information security and privacy. Malicious software can inflict severe harm on...

    Weina Niu, **aosong Zhang, ... Jiacheng Gong
    Book 2024
  11. Privacy-Preserving Data Search in Cloud Storage

    This chapter introduces a secure and efficient multi-user data search scheme for cloud storage. The scheme relies on garbled bloom and cuckoo filters...
    Cheng Huang, Xuemin (Sherman) Shen in Decentralized Privacy Preservation in Smart Cities
    Chapter 2024
  12. Privacy-Preserving Cross-Domain Authentication in Internet of Things

    This chapter introduces a unified blockchain-assisted framework for secure cross-domain authorization and authentication in smart city IoT...
    Cheng Huang, Xuemin (Sherman) Shen in Decentralized Privacy Preservation in Smart Cities
    Chapter 2024
  13. Introduction to Usable Privacy

    This introductory chapter first discusses the significance of privacy and informational self-determination as a basic human right for individuals and...
    Simone Fischer-Hübner, Farzaneh Karegar in The Curious Case of Usable Privacy
    Chapter 2024
  14. Overview of Usable Privacy Research: Major Themes and Research Directions

    A wide variety of literature exists on privacy across different communities and disciplines, including Human-Computer Interaction (HCI). Privacy...
    Simone Fischer-Hübner, Farzaneh Karegar in The Curious Case of Usable Privacy
    Chapter 2024
  15. Challenges of Usable Privacy

    A thorough understanding of usable privacy research challenges is essential for ensuring high-quality research, improving methods and avoiding...
    Simone Fischer-Hübner, Farzaneh Karegar in The Curious Case of Usable Privacy
    Chapter 2024
  16. Considerations and Challenges

    As with any new technology, continuous biometric authentication systems have a variety of considerations and challenges that must be addressed before...
    Chapter 2024
  17. Applied Cryptography

    This chapter illustrates how cryptography can be used to achieve aims other than confidentiality of data. In particular, it can be used to ensure:...
    Chapter 2024
  18. Network Security

    This chapter presents a number of common ways of protecting systems against various forms of attack via the network. These include:...
    Chapter 2024
  19. Incident Handling and System Availability

    This chapter 1 focuses on how to react if, despite all precautions, an attack or other incident leads to a security breach. This is largely a...
    Chapter 2024
  20. Epilogue

    This concluding chapter considers the question of whether in practice t is possible to achieve the aim of having true cybersecurity. It reviews in...
    Chapter 2024
Did you find what you were looking for? Share feedback.