Now showing items 11-20 of 55
On Data Leakage from Non-production Systems
This study is an exploration of areas pertaining to the use of production data in non-production environments. During the software development lifecycle, non-production environments are used to serve various purposes to ...
A Framework for Minimising Data Leakage from Non-Production Systems
(Chapman and Hall, 2017-03-03)
There is much research and advice around de-identification techniques and data governance. This brings together the practical aspects to propose a simplified business model and framework for informed decision making for ...
Vulnerability Analysis of Network Scanning on SCADA Systems
Supervisory Control and Data Acquisition (SCADA) systems and Industrial Control Systems (ICSs) have controlled the regulation and management of Critical National Infrastructure environments for decades. With the demand for ...
MIMO Techniques for Jamming Threat Suppression in Vehicular Networks
Personalized Students' Profile Based on Ontology and Rule-based Reasoning
(ICST Transactions, 2016)
Nowadays, most of the existing e-learning architecture provides the same content to all learners due to "one size fits for all" concept. E-learning refers to the utilization of electronic innovations to convey and encourage ...
A Robust Eco-Routing Protocol Against Malicious Data in Vehicular Networks
Vehicular networks have a diverse range of applications that vary from safety, to trafﬁc management and comfort. Vehicular communications (VC) can assist in the ecorouting of vehicles in order to reduce the overall mileage ...
Social internet of vehicles for smart cities
(Multidisciplinary Digital Publishing Institute, 2016-01)
Developing Cyber Peacekeeping: Observation, Monitoring and Reporting
Cyberphysical societies are becoming reliant upon the cyber domain for everyday life. With cyber warfare increasingly becoming part of future conflicts, new and novel solutions are needed to assist governments in securing ...
Human Behaviour as an aspect of Cyber Security Assurance
There continue to be numerous breaches publicised pertaining to cyber security despite security practices being applied within industry for many years. This article is intended to be the first in a number of articles as ...
Convergence of Detection Probability, Computational Gains and Asymptotic Analysis of an Algorithm for Physical-Layer Intrusion Detection System
Asymptotic analysis of an algorithm is crucial for practical engineering design. It provides important information about the performance of an algorithm in terms of time complexity, space complexity, and input scale. Based ...