Search

Your search keyword '"Gregory Epiphaniou"' showing total 81 results

Search Constraints

Start Over You searched for: Author "Gregory Epiphaniou" Remove constraint Author: "Gregory Epiphaniou" Language undetermined Remove constraint Language: undetermined
81 results on '"Gregory Epiphaniou"'

Search Results

2. Distributed Ledger Technologies in Supply Chain Security Management: A Comprehensive Survey

4. Pivot Attack Classification for Cyber Threat Intelligence

5. Super Learner Ensemble for Anomaly Detection and Cyber-Risk Quantification in Industrial Control Systems

6. MedSecurance Project: Advanced Security-for-Safety Assurance for Medical Device IoT (IoMT)

7. APIVADS: A Novel Privacy-Preserving Pivot Attack Detection Scheme Based on Statistical Pattern Recognition

11. An International Technical Standard for Commercial Space System Cybersecurity - A Call to Action

12. A Flow-based Multi-agent Data Exfiltration Detection Architecture for Ultra-low Latency Networks

13. A Service-Oriented Approach for Sensing in the Internet of Things: Intelligent Transportation Systems and Privacy Use Cases

15. Trustworthy digital infrastructure for identity systems: why should privacy matter to security engineers?

16. AI-Augmented Usability Evaluation Framework for Software Requirements Specification

17. Cyber Resilience and Incident Response in Smart Cities: A Systematic Literature Review

24. Cyber-Physical Systems: Security Threats and Countermeasures

26. Cyber security of New Space Systems

27. Safety, Security and Privacy in Machine Learning Based Internet of Things

28. Towards an IoT Community-Cluster Model for Burglar Intrusion Detection and Real-Time Reporting in Smart Homes

30. Reinforcement Learning for Security-Aware Computation Offloading in Satellite Networks

32. Smart Distributed Ledger Technologies in Industry 4.0: Challenges and Opportunities in Supply Chain Management

33. Digital Twins for Precision Healthcare

34. A privacy-preserving route planning scheme for the Internet of Vehicles

35. Integration of federated machine learning and blockchain for the provision of secure big data analytics for Internet of Things

36. Cyberstalking: Investigating formal intervention and the role of Corporate Social Responsibility

37. Big Data Forensics: Hadoop Distributed File Systems as a Case Study

38. Federated Blockchain-Based Tracking and Liability Attribution Framework for Employees and Cyber-Physical Objects in a Smart Workplace

39. Security in Online Games: Current Implementations and Challenges

40. Blockchain for Modern Digital Forensics: The Chain-of-Custody as a Distributed Ledger

41. Optimizing Turbo Codes for Secret Key Generation in Vehicular Ad Hoc Networks

42. Blockchain and Healthcare

43. Private Cloud Storage Forensics: Seafile as a Case Study

44. Distributed Filesystem Forensics: Ceph as a Case Study

45. AdPExT: Designing a Tool to Assess Information Gleaned from Browsers by Online Advertising Platforms

46. Anonymity networks and the fragile cyber ecosystem

47. How technology can mitigate and counteract cyber-stalking and online grooming

48. Corrections to 'Electronic Regulation of Data Sharing and Processing Using Smart Ledger Technologies for Supply-Chain Security' [doi: 10.1109/TEM.2020.2965991]

49. Error Reconciliation with Turbo Codes for Secret Key Generation in Vehicular Ad Hoc Networks

50. Security and Privacy of Things: Regulatory Challenges and Gaps for the Secure Integration of Cyber-Physical Systems

Catalog

Books, media, physical & digital resources