Search

Your search keyword '"Gary Wills"' showing total 121 results

Search Constraints

Start Over You searched for: Author "Gary Wills" Remove constraint Author: "Gary Wills" Topic computer Remove constraint Topic: computer
121 results on '"Gary Wills"'

Search Results

1. Building rating system: an instrument for building accessibility measurement for better indoor navigation by blind people

2. Zlto: Increase and Track Positive Behavior using Secure Blockchain Technology

3. Analysis of a PBX Toll Fraud Honeypot

4. Fuzzy Logic with Expert Judgment to Implement an Adaptive Risk-Based Access Control Model for IoT

5. The VoIP PBX Honeypot Advance Persistent Threat Analysis

6. A Review of Blockchain in Internet of Things and AI

7. A survey on machine learning for stock price prediction: algorithms and techniques

8. How to Analyze Data from Unlisted but Rich Firms: From the Perspective of Data and Analysis

9. Exploring avatar roles for motivational effects in gameful environments

11. Security, Cybercrime and Digital Forensics for IoT

12. IoT Security, Privacy, Safety and Ethics

13. A Security Framework to Protect Data in Cloud Storage

14. Intersections between IoT and distributed ledger

15. Technical aspects of blockchain and IoT

16. Linux Patch Management: With Security Assessment Features

17. The design of a hybrid cultural model for Arabic gamified systems

18. Formal Modelling of Data Integration Systems Security Policies

19. Internet of Things Forensics: A Review

20. Internet of Nano Things

21. Blockchain with Internet of Things: benefits, challenges, and future directions

22. Fog Computing and the Internet of Things: A Review

24. Validation of an adaptive risk-based access control model for the Internet of Things

25. Towards Mapping the security Challenges of the Internet of Things (IoT) supply Chain

26. XACML for Building Access Control Policies in Internet of Things

27. Keynote speaker 3: Looking after our IP in supply chain

28. A Framework for Cloud Forensic Readiness in Organizations

29. Integration of Cloud Computing with Internet of Things: Challenges and Open Issues

30. Developing an Adaptive Risk-Based Access Control Model for the Internet of Things

31. Toward confirming a framework for securing the virtual machine image in cloud computing

32. An event-based access control for IoT

33. IoT Forensic: Bridging the Challenges in Digital Forensic and the Internet of Things

34. Clustering Goal-Driven Security Factors for Protecting Data in Cloud Storage using Exploratory Factor Analysis (EFA): An Empirical Study

35. An Overview of Risk Estimation Techniques in Risk-based Access Control for the Internet of Things

36. A Proposed Best-practice Framework for Information Security Governance

37. Security in Organisations: Governance, Risks and Vulnerabilities in Moving to the Cloud

38. A conceptualization of intended learning outcomes supporting self-regulated learners in indicating learning paths

39. Automated penetration testing based on a threat model

40. A Framework to Secure the Virtual Machine Image in Cloud Computing

41. Web 2.0 – The past and the future

42. Identifying factors that affect the acceptance and use of E-assessment by academics in Saudi Universities

43. Matching learning material to people with disabilities based on competence and functional capability

44. Security risk factors that influence cloud computing adoption in Saudi Arabia government agencies

45. Investigating the Security Factors in Cloud Computing Adoption: Towards Developing an Integrated Framework

46. Goal-based security components for cloud storage security framework: a preliminary study

47. A Model to Compare Cloud and non-Cloud Storage of Big Data

48. Data security in cloud computing

49. Synote: development of a Web-based tool for synchronized annotations

50. A User-Centric Approach for Secured eDocument Transmission: Digital Signing Practical Issues and the eCert Solution

Catalog

Books, media, physical & digital resources