Search

Showing total 1,575 results

Search Constraints

Start Over You searched for: Topic security Remove constraint Topic: security Database Springer Nature eBooks Remove constraint Database: Springer Nature eBooks Publisher springer international publishing Remove constraint Publisher: springer international publishing
1,575 results

Search Results

1. Spatial Data of Smart Cities: Trust

3. The Ticket Price Matters in Sharding Blockchain

4. Council of Europe Guidelines on the Use of ICT in Electoral Processes

5. Threat Sensitive Networking: On the Security of IEEE 802.1CB and (un)Effectiveness of Existing Security Solutions

6. SLIME: State Learning in the Middle of Everything for Tool-Assisted Vulnerability Detection

7. Influencing Factors for Users’ Privacy and Security Protection Behavior in Smart Speakers: Insights from a Swiss User Study

9. Not All Code are Create2 Equal

10. Microservices Security: Bad vs. Good Practices

13. The Effects of the Russo-Ukrainian War on Network Infrastructures Through the Lens of BGP

14. Product Incremental Security Risk Assessment Using DevSecOps Practices

15. Solutions for Protecting the Space Ground Segments: From Risk Assessment to Emergency Response

16. Adversarial Attacks and Mitigations on Scene Segmentation of Autonomous Vehicles

17. Towards Comprehensive Modeling of CPSs to Discover and Study Interdependencies

18. Metasploit for Cyber-Physical Security Testing with Real-Time Constraints

20. Application of IoT in 5G Wireless Communication: A Detailed Review

21. Coping with Changing Contexts: A Healthcare Security Perspective

22. Building Information Modelling Supporting Safety and Security Threats Management: A Literature Review

25. Design of End-To-End Security for MQTT 5.0

26. Secure and Transparent Supply Chain Management to Prevent Counterfeit Drugs

27. Enhancing Security Mechanism in Smart Phones Using Crowdsourcing

28. Medical Cyber-Physical Systems Enabled with Permissioned Blockchain

29. Sandbox Environment for Real Time Malware Analysis of IoT Devices

30. Energy, QoS and Security Aware Edge Services

31. Audit and Analysis of Docker Tools for Vulnerability Detection and Tasks Execution in Secure Environment

32. Policy Modeling and Anomaly Detection in ABAC Policies

33. Usable Privacy and Security from the Perspective of Cognitive Abilities

34. Usability Analysis for Blockchain-Based Applications

35. Generalized Net Model of Biometric Multifactor Authentication System

36. Data Breach in Social Networks Using Machine Learning

38. Security- and Privacy-Aware IoT Application Placement and User Assignment

39. Rethinking the Limits of Mobile Operating System Permissions

40. State Based IoT Security for Tamper Prevention

42. Secure Image Data Storage and Transmission Using ESP32-Cam and Raspberry Pi with Steganography

43. Secure Software Development: Infuse Cyber Security to Mitigate Attacks in an Organization

44. Suborn Channels: Incentives Against Timelock Bribes

45. A Secure User-Centred Healthcare System: Design and Verification

46. ADAM: Automatic Detection of Android Malware

48. Quantifying Nodes Trustworthiness Using Hybrid Approach for Secure Routing in Mobile Ad Hoc Networks

49. A Secure Communication Gateway with Parity Generator Implementation in QCA Platform

50. Novel Hybrid Technique Enhancing Data Privacy and Security