|
|
|
|
|
|
Date Reviewed |
|
|
1 - 3 of 3
reviews
|
|
|
|
|
|
|
|
The privacy implications of cyber security systems: a technological survey Toch E., Bettini C., Shmueli E., Radaelli L., Lanzi A., Riboni D., Lepri B. ACM Computing Surveys 51(2): 1-27, 2018. Type: Article
This paper provides an accessible overview of the issues that spring up when looking into the privacy of cybersecurity systems. The paper starts by classifying cybersecurity technologies using four different categories:...
|
Jun 15 2018 |
|
|
|
|
|
|
Human rights and digital technology: digital tightrope Perry S., Roda C., Palgrave Macmillan, London, UK, 2017. 203 pp. Type: Book (978-1-137588-04-3)
Perry and Roda’s aim for this book is to be a syllabus for a course on human rights and digital technology. The authors cover different sorts of technology dilemmas with respect to human rights. They start with the most exten...
|
Oct 24 2017 |
|
|
|
|
|
|
Predicting cyber attacks with Bayesian networks using unconventional signals Okutan A., Yang S., McConky K. CISRC 2017 (Proceedings of the 12th Annual Cyber and Information Security Research Conference, Oak Ridge, TN, Apr 4-6, 2017) 1-4, 2017. Type: Proceedings
Bayesian networks can be used to predict all kinds of events. In this case, unconventional signals, that is, data from global events and social media, are used to predict whether cyber attacks will happen on companies. The outcome of t...
|
Jun 2 2017 |
|
|
|
|
|
|
|
|
|
|
|