298 results on '"Haskell-Dowland, Paul"'
Search Results
2. A Survey of Distributed Certificate Authorities in MANETs
3. Information Security and Privacy – Challenges and Outlook
4. Is Australia a sitting duck for ransomware attacks?: Yes, and the danger has been growing for 30 years
5. ECU-IoHT: A dataset for analyzing cyberattacks in Internet of Health Things
6. Next-Generation Enterprise Security and Governance
7. Examination of traditional botnet detection on Iot-based bots
8. Examination of Traditional Botnet Detection on IoT-Based Bots
9. Secure Edge Computing
10. Intelligent building systems: security and facility professionals’ understanding of system threats, vulnerabilities and mitigation practice
11. Correction to: Cooperative co‑evolution for feature selection in Big Data with random feature grouping
12. Cooperative co-evolution for feature selection in Big Data with random feature grouping
13. Big Tech is firing employees by the thousands. Why? And how worried should we be?
14. Energy-Efficient Covert Wireless Communication Through Probabilistic Jamming
15. Nonvisual Presentation and Navigation within the Structure of Digital Text-Documents on Mobile Devices
16. Establishment and mapping of heterogeneous anomalies in network intrusion datasets
17. Biometric Security: A Novel Ear Recognition Approach Using a 3D Morphable Ear Model
18. Anomaly detection in cybersecurity datasets via cooperative co-evolution-based feature selection
19. Is Russia really about to cut itself off from the internet? And what can we expect if it does?
20. The self-driving trolley problem: how will future AI systems make the most ethical choices for all of us?
21. Being bombarded with delivery and post office text scams? Here’s why — and what can be done
22. Facebook wants AI to find your keys and understand your conversations
23. As Russia wages cyber war against Ukraine, here’s how Australia (and the rest of the world) could suffer collateral damage
24. ‘What is my IP address?’ Explaining one of the world’s most Googled questions
25. This New Year, why not resolve to ditch your dodgy old passwords?
26. 500,000 or 20,000? How to estimate the size of a political rally properly
27. The hacker group Anonymous has waged a cyber war against Russia. How effective could they actually be?
28. Medibank won’t pay hackers ransom. Is it the right choice?
29. Establishment and mapping of heterogeneous anomalies in network intrusion datasets
30. Biometric security: A novel ear recognition approach using a 3D morphable ear model
31. iRobot’s Roomba will soon be owned by Amazon, which raises privacy questions
32. Goodbye Internet Explorer. You won’t be missed (but your legacy will be remembered)
33. Amazon just took over a primary healthcare company for a lot of money. Should we be worried?
34. Today’s Google outage was brief but disconcerting
35. Apple’s PassKeys update could make traditional passwords obsolete
36. 5 big trends in Australians getting scammed
37. The iPhone turns 15: a look at the past (and future) of one of the 21st century’s most influential devices
38. Budget 2022: $9.9 billion towards cyber security aims to make Australia a key ‘offensive’ cyber player
39. On Relaying Strategies in Multi-Hop Covert Wireless Communications
40. Anomaly Detection in Cybersecurity Datasets via Cooperative Co-evolution-based Feature Selection
41. Holding the world to ransom: the top 5 most dangerous criminal organisations online right now
42. Cyber Cold War? The US and Russia talk tough, but only diplomacy will ease the threat
43. Holding the news to ransom? What we know so far about the Channel 9 cyber attack
44. Fastly global internet outage: why did so many sites go down — and what is a CDN, anyway?
45. ‘We have filed a case under your name’: beware of tax scams — they’ll be everywhere this EOFY
46. Facebook data breach: what happened and why it’s hard to know if your data was leaked
47. What is ‘Other’ in my iPhone storage, why is it taking up so much space and how do I clear it?
48. How rain, wind, heat and other heavy weather can affect your internet connection
49. An energy-efficient and secure data inference framework for internet of health things: A pilot study
50. Is Australia a sitting duck for ransomware attacks? Yes, and the danger has been growing for 30 years
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.