|
|
|
Dimah Almani, Tim Muller, Xavier Carpent, Takahito Yoshizawa and Steven Furnell
This research investigates the deployment and effectiveness of the novel Pre-Signature scheme, developed to allow for up-to-date reputation being available in Vehicle-to-Vehicle (V2V) communications in rural landscapes, where the communications infrastru...
ver más
|
|
|
|
|
|
|
Joakim Kävrestad, Allex Hagberg, Marcus Nohlberg, Jana Rambusch, Robert Roos and Steven Furnell
Cybersecurity is a pressing matter, and a lot of the responsibility for cybersecurity is put on the individual user. The individual user is expected to engage in secure behavior by selecting good passwords, identifying malicious emails, and more. Typical...
ver más
|
|
|
|
|
|
|
Bako Zawali, Richard A. Ikuesan, Victor R. Kebande, Steven Furnell and Arafat A-Dhaqm
Complexity and sophistication among multimedia-based tools have made it easy for perpetrators to conduct digital crimes such as counterfeiting, modification, and alteration without being detected. It may not be easy to verify the integrity of video conte...
ver más
|
|
|
|
|
|
|
Tri Hoang Vo, Woldemar Fuhrmann, Klaus-Peter Fischer-Hellmann and Steven Furnell
In recent years, enterprise applications have begun to migrate from a local hosting to a cloud provider and may have established a business-to-business relationship with each other manually. Adaptation of existing applications requires substantial implem...
ver más
|
|
|
|
|
|
|
Steven Furnell,Aung Htike Phyo
In recent years the Internet connection has become a frequent point of attack for most organisations. However, the loss due to insider misuse is far greater than the loss due to external abuse. This paper focuses on the problem of insider misuse, the sca...
ver más
|
|
|
|