Pub Date : 1900-01-01DOI: 10.4018/978-1-7998-4381-8
{"title":"Sensor Network Methodologies for Smart Applications","authors":"","doi":"10.4018/978-1-7998-4381-8","DOIUrl":"https://doi.org/10.4018/978-1-7998-4381-8","url":null,"abstract":"","PeriodicalId":302907,"journal":{"name":"Advances in Information Security, Privacy, and Ethics","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116282800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/978-1-7998-3817-3
{"title":"Social, Legal, and Ethical Implications of IoT, Cloud, and Edge Computing Technologies","authors":"","doi":"10.4018/978-1-7998-3817-3","DOIUrl":"https://doi.org/10.4018/978-1-7998-3817-3","url":null,"abstract":"","PeriodicalId":302907,"journal":{"name":"Advances in Information Security, Privacy, and Ethics","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121615036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/978-1-7998-7756-1
{"title":"Privacy and Security Challenges in Location Aware Computing","authors":"","doi":"10.4018/978-1-7998-7756-1","DOIUrl":"https://doi.org/10.4018/978-1-7998-7756-1","url":null,"abstract":"","PeriodicalId":302907,"journal":{"name":"Advances in Information Security, Privacy, and Ethics","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122331826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/978-1-7998-1290-6
{"title":"Handbook of Research on Intelligent Data Processing and Information Security Systems","authors":"","doi":"10.4018/978-1-7998-1290-6","DOIUrl":"https://doi.org/10.4018/978-1-7998-1290-6","url":null,"abstract":"","PeriodicalId":302907,"journal":{"name":"Advances in Information Security, Privacy, and Ethics","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133808594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/978-1-5225-9611-0
{"title":"Handbook of Research on Machine and Deep Learning Applications for Cyber Security","authors":"","doi":"10.4018/978-1-5225-9611-0","DOIUrl":"https://doi.org/10.4018/978-1-5225-9611-0","url":null,"abstract":"","PeriodicalId":302907,"journal":{"name":"Advances in Information Security, Privacy, and Ethics","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132633888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/978-1-7998-7589-5
{"title":"Revolutionary Applications of Blockchain-Enabled Privacy and Access Control","authors":"","doi":"10.4018/978-1-7998-7589-5","DOIUrl":"https://doi.org/10.4018/978-1-7998-7589-5","url":null,"abstract":"","PeriodicalId":302907,"journal":{"name":"Advances in Information Security, Privacy, and Ethics","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124843753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/978-1-7998-6975-7
{"title":"Handbook of Research on Advancing Cybersecurity for Digital Transformation","authors":"","doi":"10.4018/978-1-7998-6975-7","DOIUrl":"https://doi.org/10.4018/978-1-7998-6975-7","url":null,"abstract":"","PeriodicalId":302907,"journal":{"name":"Advances in Information Security, Privacy, and Ethics","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127467037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/978-1-7998-9164-2
{"title":"Cybersecurity Crisis Management and Lessons Learned From the COVID-19 Pandemic","authors":"","doi":"10.4018/978-1-7998-9164-2","DOIUrl":"https://doi.org/10.4018/978-1-7998-9164-2","url":null,"abstract":"","PeriodicalId":302907,"journal":{"name":"Advances in Information Security, Privacy, and Ethics","volume":"333 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127604493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/978-1-5225-7492-7
M. Khosrow-Pour
{"title":"Advanced Methodologies and Technologies in System Security, Information Privacy, and Forensics","authors":"M. Khosrow-Pour","doi":"10.4018/978-1-5225-7492-7","DOIUrl":"https://doi.org/10.4018/978-1-5225-7492-7","url":null,"abstract":"","PeriodicalId":302907,"journal":{"name":"Advances in Information Security, Privacy, and Ethics","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126769323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/978-1-7998-3444-1
{"title":"Large-Scale Data Streaming, Processing, and Blockchain Security","authors":"","doi":"10.4018/978-1-7998-3444-1","DOIUrl":"https://doi.org/10.4018/978-1-7998-3444-1","url":null,"abstract":"","PeriodicalId":302907,"journal":{"name":"Advances in Information Security, Privacy, and Ethics","volume":"1 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131873443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}