Search ResultsElectronic Resources 
by
Mohammed, Alamin, author.
Format:
Excerpt:
In environments such as smart communities and electronic health systems, security and privacy are
by
Oluwatimi, Oyindamola D., author.
Format:
Excerpt:
within context-aware systems to ensure the security of sensitive enterprise data. We propose several
by
Nwafor, Ebelechukwu, author.
Format:
Excerpt:
. However, privacy and security problems arise as a result of CPS connectivity, heterogeneity, and
by
Pandit, Bigyan, author.
Format:
Excerpt:
Knowledge discovery from large data for system security management and threat detection have been a
by
Powell, Nelson Henry, III, author.
Format:
Excerpt:
-power, lossy radio systems deployed in dense, random topologies, working sympathetically to sense and notify a
by
Ferraiuolo, Andrew, author.
Format:
Excerpt:
tracks and constrains the movement of data throughout a system ensuring that confidentiality and
by
Wang, An, author.
Format:
Excerpt:
most important functionality for most security services is the global visibility of network data and

Select an Action





