Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
 
van der Ham, Jeroen
National Cyber Security Centre NL
Den Haag, Netherlands
 
   Reviewer Selected
Follow this Reviewer
 
 
 
Options:
Date Reviewed  
 
1
- 3 of 3 reviews

   
  The privacy implications of cyber security systems: a technological survey
Toch E., Bettini C., Shmueli E., Radaelli L., Lanzi A., Riboni D., Lepri B. ACM Computing Surveys 51(2): 1-27, 2018.  Type: Article

This paper provides an accessible overview of the issues that spring up when looking into the privacy of cybersecurity systems. The paper starts by classifying cybersecurity technologies using four different categories:...

Jun 15 2018  
   Human rights and digital technology: digital tightrope
Perry S., Roda C., Palgrave Macmillan, London, UK, 2017. 203 pp.  Type: Book (978-1-137588-04-3)

Perry and Roda’s aim for this book is to be a syllabus for a course on human rights and digital technology. The authors cover different sorts of technology dilemmas with respect to human rights. They start with the most exten...

Oct 24 2017  
  Predicting cyber attacks with Bayesian networks using unconventional signals
Okutan A., Yang S., McConky K.  CISRC 2017 (Proceedings of the 12th Annual Cyber and Information Security Research Conference, Oak Ridge, TN, Apr 4-6, 2017) 1-4, 2017.  Type: Proceedings

Bayesian networks can be used to predict all kinds of events. In this case, unconventional signals, that is, data from global events and social media, are used to predict whether cyber attacks will happen on companies. The outcome of t...

Jun 2 2017  
 
 
   
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy