Pub Date : 1900-01-01DOI: 10.4018/978-1-7998-5068-7
{"title":"Deep Learning Strategies for Security Enhancement in Wireless Sensor Networks","authors":"","doi":"10.4018/978-1-7998-5068-7","DOIUrl":"https://doi.org/10.4018/978-1-7998-5068-7","url":null,"abstract":"","PeriodicalId":302907,"journal":{"name":"Advances in Information Security, Privacy, and Ethics","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130608821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/978-1-5225-7924-3
{"title":"Detection and Mitigation of Insider Attacks in a Cloud Infrastructure","authors":"","doi":"10.4018/978-1-5225-7924-3","DOIUrl":"https://doi.org/10.4018/978-1-5225-7924-3","url":null,"abstract":"","PeriodicalId":302907,"journal":{"name":"Advances in Information Security, Privacy, and Ethics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130965360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/978-1-7998-4201-9
{"title":"Digital Transformation and Challenges to Data Security and Privacy","authors":"","doi":"10.4018/978-1-7998-4201-9","DOIUrl":"https://doi.org/10.4018/978-1-7998-4201-9","url":null,"abstract":"","PeriodicalId":302907,"journal":{"name":"Advances in Information Security, Privacy, and Ethics","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123412712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/978-1-7998-7118-7
{"title":"NATO and the Future of European and Asian Security","authors":"","doi":"10.4018/978-1-7998-7118-7","DOIUrl":"https://doi.org/10.4018/978-1-7998-7118-7","url":null,"abstract":"","PeriodicalId":302907,"journal":{"name":"Advances in Information Security, Privacy, and Ethics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125776533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/978-1-7998-8693-8
{"title":"Cybersecurity Capabilities in Developing Nations and Its Impact on Global Security","authors":"","doi":"10.4018/978-1-7998-8693-8","DOIUrl":"https://doi.org/10.4018/978-1-7998-8693-8","url":null,"abstract":"","PeriodicalId":302907,"journal":{"name":"Advances in Information Security, Privacy, and Ethics","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125692526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/978-1-7998-2253-0
{"title":"Quantum Cryptography and the Future of Cyber Security","authors":"","doi":"10.4018/978-1-7998-2253-0","DOIUrl":"https://doi.org/10.4018/978-1-7998-2253-0","url":null,"abstract":"","PeriodicalId":302907,"journal":{"name":"Advances in Information Security, Privacy, and Ethics","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114844068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/978-1-7998-2414-5
{"title":"Blockchain Applications in IoT Security","authors":"","doi":"10.4018/978-1-7998-2414-5","DOIUrl":"https://doi.org/10.4018/978-1-7998-2414-5","url":null,"abstract":"","PeriodicalId":302907,"journal":{"name":"Advances in Information Security, Privacy, and Ethics","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115549554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/978-1-7998-3487-8
{"title":"Privacy Concerns Surrounding Personal Information Sharing on Health and Fitness Mobile Apps","authors":"","doi":"10.4018/978-1-7998-3487-8","DOIUrl":"https://doi.org/10.4018/978-1-7998-3487-8","url":null,"abstract":"","PeriodicalId":302907,"journal":{"name":"Advances in Information Security, Privacy, and Ethics","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132021527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/978-1-7998-6677-0
{"title":"Limitations and Future Applications of Quantum Cryptography","authors":"","doi":"10.4018/978-1-7998-6677-0","DOIUrl":"https://doi.org/10.4018/978-1-7998-6677-0","url":null,"abstract":"","PeriodicalId":302907,"journal":{"name":"Advances in Information Security, Privacy, and Ethics","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114917763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/978-1-7998-1082-7
{"title":"Modern Principles, Practices, and Algorithms for Cloud Security","authors":"","doi":"10.4018/978-1-7998-1082-7","DOIUrl":"https://doi.org/10.4018/978-1-7998-1082-7","url":null,"abstract":"","PeriodicalId":302907,"journal":{"name":"Advances in Information Security, Privacy, and Ethics","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133125155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}