[HTML][HTML] Cyber resilience in industrial networks: A state of the art, challenges, and future directions

TNI Alrumaih, MJF Alenazi, NA AlSowaygh… - Journal of King Saud …, 2023 - Elsevier
Industrial networks, and more particularly, industrial control systems (ICSs) and industrial
Internet of things (IIoT), are no longer isolated environments. The rapid increase of functional …

[图书][B] Introduction to biometrics

A Jain, R Bolle, S Pankanti - 1996 - Springer
Biometrics deals with identification of individuals based on their biological or behavioral
characteristics. Biometrics has lately been receiving attention in popular media, it is widely …

Biometrics: a grand challenge

AK Jain, S Pankanti, S Prabhakar… - Proceedings of the …, 2004 - ieeexplore.ieee.org
Reliable person identification is an important problem in diverse businesses. Biometrics,
identification based on distinctive personal traits, has the potential to become an …

[图书][B] Safeguards in a world of ambient intelligence

P Ahonen, P Alahuhta, B Daskala, S Delaitre… - 2008 - Springer
Safeguards in a World of Ambient Intelligence | SpringerLink Skip to main content
Advertisement SpringerLink Log in Menu Find a journal Publish with us Search Cart Book cover …

[图书][B] Surveillance or security?: The risks posed by new wiretapping technologies

S Landau - 2011 - books.google.com
How, in the name of greater security, our current electronic surveillance policies are creating
major security risks. Digital communications are the lifeblood of modern society. We “meet …

Federated identity management systems: A privacy-based characterization

E Birrell, FB Schneider - IEEE security & privacy, 2013 - ieeexplore.ieee.org
Identity management systems store attributes associated with users and employ these
attributes to facilitate authorization. The authors analyze existing systems and describe a …

[图书][B] Die digitale Identität

G Hornung - 2005 - kobra.uni-kassel.de
Gegenstand der Arbeit ist die Verwendung von Chipkarten als Ausweise. In diesem
Verwendungszusammenhang darf die Chipkarte nicht nur als ein kleiner tragbarer …

An NFR pattern approach to dealing with NFRs

S Supakkul, T Hill, L Chung, TT Tun… - 2010 18th IEEE …, 2010 - ieeexplore.ieee.org
Non-functional requirements (NFRs), such as security and cost, are generally subjective and
oftentimes synergistic or conflicting with each other. Properly dealing with such NFRs …

A survey of security in multi-agent systems

RC Cavalcante, II Bittencourt, AP da Silva… - Expert Systems with …, 2012 - Elsevier
Multi-agent systems (MAS) are a relatively new software paradigm that is being widely
accepted in several application domains to address large and complex tasks. However, with …

Culture, identity and information privacy in the age of digital government

R Cullen - Online Information Review, 2009 - emerald.com
Background In New Zealand the use of personal information by government agencies is
subject to stringent control through the privacy principles articulated in Section 6 of the …