Pub Date : 2022-06-30DOI: 10.4018/978-1-6684-5250-9
{"title":"Handbook of Research on Technical, Privacy, and Security Challenges in a Modern World","authors":"","doi":"10.4018/978-1-6684-5250-9","DOIUrl":"https://doi.org/10.4018/978-1-6684-5250-9","url":null,"abstract":"","PeriodicalId":302907,"journal":{"name":"Advances in Information Security, Privacy, and Ethics","volume":"385 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131762548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-24DOI: 10.4018/978-1-6684-3448-2
{"title":"Cross-Industry Applications of Cyber Security Frameworks","authors":"","doi":"10.4018/978-1-6684-3448-2","DOIUrl":"https://doi.org/10.4018/978-1-6684-3448-2","url":null,"abstract":"","PeriodicalId":302907,"journal":{"name":"Advances in Information Security, Privacy, and Ethics","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115500504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-24DOI: 10.4018/978-1-7998-9430-8
{"title":"Applications of Machine Learning and Deep Learning for Privacy and Cybersecurity","authors":"","doi":"10.4018/978-1-7998-9430-8","DOIUrl":"https://doi.org/10.4018/978-1-7998-9430-8","url":null,"abstract":"","PeriodicalId":302907,"journal":{"name":"Advances in Information Security, Privacy, and Ethics","volume":"333 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121600252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-17DOI: 10.4018/978-1-6684-3991-3
{"title":"Methods, Implementation, and Application of Cyber Security Intelligence and Analytics","authors":"","doi":"10.4018/978-1-6684-3991-3","DOIUrl":"https://doi.org/10.4018/978-1-6684-3991-3","url":null,"abstract":"","PeriodicalId":302907,"journal":{"name":"Advances in Information Security, Privacy, and Ethics","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130042315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-05-27DOI: 10.4018/978-1-7998-8390-6
{"title":"Global Perspectives on Information Security Regulations","authors":"","doi":"10.4018/978-1-7998-8390-6","DOIUrl":"https://doi.org/10.4018/978-1-7998-8390-6","url":null,"abstract":"","PeriodicalId":302907,"journal":{"name":"Advances in Information Security, Privacy, and Ethics","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115123623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-02-22DOI: 10.4018/978-1-5225-7847-5
Ismini Vasileiou, S. Furnell
{"title":"Cybersecurity Education for Awareness and Compliance","authors":"Ismini Vasileiou, S. Furnell","doi":"10.4018/978-1-5225-7847-5","DOIUrl":"https://doi.org/10.4018/978-1-5225-7847-5","url":null,"abstract":"","PeriodicalId":302907,"journal":{"name":"Advances in Information Security, Privacy, and Ethics","volume":"18 70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131380057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/978-1-5225-8304-2
Muhammad Sarfraz
Developments in Information Security and Cybernetic Wars is an essential research publication that covers cyberwarfare and terrorism globally through a wide range of security-related areas. Featuring topics such as crisis management, information security, and governance, this book is geared toward practitioners, academicians, government officials, military professionals, and industry professionals.
{"title":"Developments in Information Security and Cybernetic Wars","authors":"Muhammad Sarfraz","doi":"10.4018/978-1-5225-8304-2","DOIUrl":"https://doi.org/10.4018/978-1-5225-8304-2","url":null,"abstract":"Developments in Information Security and Cybernetic Wars is an essential research publication that covers cyberwarfare and terrorism globally through a wide range of security-related areas. Featuring topics such as crisis management, information security, and governance, this book is geared toward practitioners, academicians, government officials, military professionals, and industry professionals.","PeriodicalId":302907,"journal":{"name":"Advances in Information Security, Privacy, and Ethics","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121104387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/978-1-7998-0373-7
{"title":"Security and Privacy Issues in Sensor Networks and IoT","authors":"","doi":"10.4018/978-1-7998-0373-7","DOIUrl":"https://doi.org/10.4018/978-1-7998-0373-7","url":null,"abstract":"","PeriodicalId":302907,"journal":{"name":"Advances in Information Security, Privacy, and Ethics","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127278839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/978-1-7998-3149-5
{"title":"Modern Theories and Practices for Cyber Ethics and Security Compliance","authors":"","doi":"10.4018/978-1-7998-3149-5","DOIUrl":"https://doi.org/10.4018/978-1-7998-3149-5","url":null,"abstract":"","PeriodicalId":302907,"journal":{"name":"Advances in Information Security, Privacy, and Ethics","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115441033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/978-1-5225-7516-0
Gandharba Swain
{"title":"Advanced Digital Image Steganography Using LSB, PVD, and EMD","authors":"Gandharba Swain","doi":"10.4018/978-1-5225-7516-0","DOIUrl":"https://doi.org/10.4018/978-1-5225-7516-0","url":null,"abstract":"","PeriodicalId":302907,"journal":{"name":"Advances in Information Security, Privacy, and Ethics","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115905581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}