|
|
|
Florian Sommer, Jürgen Dürrwang and Reiner Kriesten
Due to current development trends in the automotive industry towards stronger connected and autonomous driving, the attack surface of vehicles is growing which increases the risk of security attacks. This has been confirmed by several research projects i...
ver más
|
|
|
|
|
|
Boubakeur Annane,Osman Ghazali
Pág. pp. 20 - 32
The principle constraints of mobile devices are their limited resources such as processing capability, storage space and battery life. While cloud computing offers a vast computing resources services. A new idea emerged by including the cloud computing i...
ver más
|
|
|
|
|
|
Nicole J. Wilson, Leila M. Harris, Angie Joseph-Rear, Jody Beaumont and Terre Satterfield
There is growing acknowledgement that the material dimensions of water security alone are inadequate; we also need to engage with a broader set of hydrosocial relationships. Indeed, more holistic approaches are needed to explain Indigenous peoples? relat...
ver más
|
|
|
|
|
|
Hiep Cong Pham,Duy Dang Pham,Linda Brennan,Joan Richardson
This evaluation of end-users and IT experts/managers? attitudes towards performing IT security tasks indicates important differences between their perspectives on what is and is not necessary to establish a secure corporate IT environment. Through a seri...
ver más
|
|
|
|
|
|
Craig A. Horne,Sean B. Maynard,Atif Ahmad
Dependence on information, including for some of the world?s largest organisations such as governments and multi-national corporations, has grown rapidly in recent years. However, reports of information security breaches and their associated consequences...
ver más
|
|
|