Preparing for cyber crisis management exercises

G Østby, SJ Kowalski - International Conference on Human-Computer …, 2020 - Springer
… approach the cyber security exercise design and execution challenge by using the design …
-step preparation schedule for exercises (PSE) for full-scale cyber-incident exercises that will …

[PDF][PDF] EXPLORING THE WIRELESS SENSOR NETWORK NEEDS, PROTOCOLS, AND SECURITY ISSUES

M Joshi - NETWORKS AND CYBER SECURITY - researchgate.net
… must serve as the foundation for the created timetable [4]–[6]. … at data packages being routed,
and then reading them using … In the event of centralised control, the sink often defines the …

Lifestyle, exercise and activity package for people living with progressive multiple sclerosis (LEAP-MS): protocol for a single-arm feasibility study

J Latchem-Hastings, E Randell, K Button… - Pilot and feasibility …, 2021 - Springer
… Participants will receive a telephone reminder if they have not … communication through the
platform, but will schedule regular … We will assess and record any adverse events that may be …

There can be no compromise: The necessity of ratcheted authentication in secure messaging

B Dowling, B Hale - Cryptology ePrint Archive, 2020 - eprint.iacr.org
… denote this security framework the Mediated Epoch Three-party … This process of deriving
keys from prekey bundles is referred … schedule of Signal’s underlying Double Ratchet protocol. …

A smartphone-assisted brief online cognitive-behavioral intervention for pregnant women with depression: a study protocol of a randomized controlled trial

PF Zuccolo, MO Xavier, A Matijasevich, G Polanczyk… - Trials, 2021 - Springer
… Motherly is composed of a package of interventions … The app allows participants to schedule
and engage in, and … whether an app providing an intervention package, including CBT, …

A Tutorial-Style Introduction to

K Bhargavan, A Bichhawat, QH Do, P Hosseyni… - Protocols, Strands, and …, 2021 - Springer
… knows), and can schedule any part of a protocol, ie, functions … sufficient properties of the
protocol to prove the security goal. … ), ie, event predicates on the finishI event can be defined in …

Multi-tenant Cloud SaaS Application for a meeting to task transition via deep learning models

V Walter-Tscharf - 2022 IEEE Global Conference on Artificial …, 2022 - ieeexplore.ieee.org
… into task management, mail or calendar tools. Reinforcing the focus … , using speech-event
detection results, meeting recordings … is based on the ROUGE package, which describes how …

Automating look-ahead schedule generation for construction using linked-data based constraint checking and reinforcement learning

RK Soman, M Molina-Solana - Automation in Construction, 2022 - Elsevier
… violation in a LAS and alert the responsible authority. For … for each work package before the
work packages are released … state and not on any previous event. For the LAS problem, each …

SoK: Game-based security models for group key exchange

B Poettering, P Rösler, J Schwenk, D Stebila - Cryptographers' Track at the …, 2021 - Springer
… instances follows a fixed schedule. We consider these … to obtain (through a corruption oracle)
static party secrets that do … executed by participants are session initialization (either of an …

We are meeting on Microsoft Teams: Forensic analysis in Windows, Android, and iOS operating systems

H Bowling, K Seigfried‐Spellar… - Journal of Forensic …, 2023 - Wiley Online Library
… to address some security issues that may be raised by using Microsoft … Many artifacts were
located in the discord package directory … Each user created 15 calendar events. Five of the …