Skip to main content

Home/ Groups/ CSIA 459
Trevor Pyle

Security Analytics and Measurements - 0 views

  •  
    Source for my annotated bibliography. I focused on the Cyber Adversaries and Game Theory article.
Trevor Pyle

Risk-Based Systems Security Engineering: Stopping Attacks with Intention - 0 views

  •  
    Source for my annotated bibliography.
Trevor Pyle

Web Analytics for Security Informatics - 0 views

shared by Trevor Pyle on 01 Apr 13 - No Cached
  •  
    Source for my annotated bibliography.
Trevor Pyle

Big Data: Issues and Challenges Moving Forward - 0 views

  •  
    Source for my annotated bibliography.
Trevor Pyle

The limits of privacy in automated profiling and data mining - 0 views

  •  
    Source for my annotated bibliography.
Seth Molin

Hospital uses telemedicine as bridge to mainland - 1 views

  •  
    Article 1 for annotate Bibliography
Vickye F

Declaratively programming the mobile web with Mobl - 1 views

  •  
    annotated bibliography
Vickye F

The Really Smart Phone - 0 views

  •  
    annotated bibliography
Vickye F

Protecting Health Information on Mobile Devices - 0 views

  •  
    Vickye, Thanks for posting the article. As mobile devices continue to expand into the medical industry, this will definitely become a serious issue.
Jeremy Croghan

ScienceDirect.com - Procedia Engineering - A Rule Based Approach for Attribute Selectio... - 0 views

  •  
    "A new rule based attribute selection algorithm for removing the redundant attributes which are used in decision making on intrusions in wireless sensor networks. This work focuses mainly on finding important attributes to find Denial of Service attacks. "
glenn_g

First Strike - 0 views

  •  
    The US shift from defense to offense and the development of 'cyberweapons'
glenn_g

Surge of Cybersecurity Beuracracies Sparks Lucrative Opertunities - 1 views

  •  
    How we can make buckets of money due to the changing cybersecurity environment and the tools we will have to develop and be proficient with. Good stuff about the DHS in cybersecurity here
Jeremy Croghan

ScienceDirect.com - Procedia Engineering - Wireless Sensor Network with Temperature Com... - 0 views

  •  
    "System consists of identically designed sensor modules which are self-sustaining, wireless, act as transmitters and receivers and are equipped with a special sensor technology for long-term monitoring of buildings or engineering facilities. The sensor unit uses strain gauges for stress analysis and contains interfaces for additional sensors. The system in particular applies to buildings and structures for transport and traffic and large-scale industrial facilities, where a subsequent wiring installation is difficult or impossible."
glenn_g

Cyberstroke - 1 views

  •  
    Describese the efforts to create cyberweapons and some good descriptions of some that are in development
Jeremy Croghan

ScienceDirect.com - Procedia Engineering - A Survey on Futuristic Health Care System: W... - 0 views

  •  
    "With the increasing use of wireless networks and miniaturization of electronic Devices has allowed the realization of Wireless Body Area Networks (WBANs). It is one of the latest technologies in health care diagnosis and management. WBAN consists of various intelligent bio sensors attached on or implanted in the body like under the skin. "
Seth Molin

Telemedicine and the future of telemedicine - 0 views

shared by Seth Molin on 01 Apr 13 - No Cached
  •  
    Article 2 from UMUC library
« First ‹ Previous 321 - 336
Showing 20 items per page