[HTML][HTML] Privacy-Preserving Techniques in Cloud/Fog and Internet of Things

CC Lee, M Gheisari, MJ Shayegan, MT Ahvanooey… - Cryptography, 2023 - mdpi.com
Recently, wireless networks have been developed using cloud infrastructure and software-
based networks. Their connections to the next-generation Internet and the Internet of Things …

Windows technical hardening against the most prevalent threats

A Numminen - 2023 - jyx.jyu.fi
This thesis identified the most essential hardening measures in Windows to combat the
current most prevalent threats. The goal was set to identify the tactics used by the current …