Skip to main content

Home/ Groups/ CSIA 459
1More

Telemedicine and the future of telemedicine - 0 views

shared by Seth Molin on 01 Apr 13 - No Cached
  •  
    Article 2 from UMUC library
1More

Hospital uses telemedicine as bridge to mainland - 1 views

  •  
    Article 1 for annotate Bibliography
1More

Protecting Health Information on Mobile Devices - 0 views

  •  
    Vickye, Thanks for posting the article. As mobile devices continue to expand into the medical industry, this will definitely become a serious issue.
1More

The limits of privacy in automated profiling and data mining - 0 views

  •  
    Source for my annotated bibliography.
1More

Big Data: Issues and Challenges Moving Forward - 0 views

  •  
    Source for my annotated bibliography.
1More

Web Analytics for Security Informatics - 0 views

shared by Trevor Pyle on 01 Apr 13 - No Cached
  •  
    Source for my annotated bibliography.
1More

Risk-Based Systems Security Engineering: Stopping Attacks with Intention - 0 views

  •  
    Source for my annotated bibliography.
1More

Security Analytics and Measurements - 0 views

  •  
    Source for my annotated bibliography. I focused on the Cyber Adversaries and Game Theory article.
1More

Manageing Smart Phones Security Risks - 1 views

  •  
    annotated bibliography
1More

Cell Phones and Cancer Risks - 1 views

  •  
    annotated Bibliography
1More

Declaratively programming the mobile web with Mobl - 1 views

  •  
    annotated bibliography
1More

The Really Smart Phone - 0 views

  •  
    annotated bibliography
2More

Our Internet Surveillance State - 1 views

  •  
    The article was written by Bruce and published on CNN this month. It discusses the fact that almost everything we do can be and is monitored by someone, and eventually is subject to Government purvue. He shows how several key people who have been found their way into law enforcement pathways have taken many precautions, but all eventually were caught by other means which were correlated together to form the big picture.
  •  
    Phil, I have to say after reading this I am glad I still have a flip phone with no smart technology on it. I have read were your smart phones embed the lat/long into pictures if that function is turned on and that data can be retrieved from facebook if you have the right software. It just goes to show that what we see on TV has an impact on what we have in real life. Lee
3More

Near Field Communications Primer - 1 views

  •  
    Here is a primer on Near Field Communications (NFC) which is a set of standards for smartphones that establishes radio communication between similar devices which are in close proximity. It is a subset for RFID (radio-frequency identification) and is being integrated into our daily lives as in most technology. The low-cost NFC tags practical uses are limited only by imagination, the challenge will be is to mitigate the cybersecurity risks it poses.
  •  
    Here is another video presentation on NFC. http://www.youtube.com/watch?v=_RBbuGwC7Eg
  •  
    I have to say this was a very interesting video to watch, and I see now how these things work and what we can do with them. I do like the fact that they have a shorter range than Bluetooth as well as less power consumption. I would still be worried about losing information when say on a crowded train or bus. People could brush up against your phone and you may not realize it. thanks for sharing. Lee
1More

ScienceDirect.com - Procedia Engineering - A Survey on Futuristic Health Care System: W... - 0 views

  •  
    "With the increasing use of wireless networks and miniaturization of electronic Devices has allowed the realization of Wireless Body Area Networks (WBANs). It is one of the latest technologies in health care diagnosis and management. WBAN consists of various intelligent bio sensors attached on or implanted in the body like under the skin. "
1More

Cyberstroke - 1 views

  •  
    Describese the efforts to create cyberweapons and some good descriptions of some that are in development
1More

ScienceDirect.com - Procedia Engineering - Wireless Sensor Network with Temperature Com... - 0 views

  •  
    "System consists of identically designed sensor modules which are self-sustaining, wireless, act as transmitters and receivers and are equipped with a special sensor technology for long-term monitoring of buildings or engineering facilities. The sensor unit uses strain gauges for stress analysis and contains interfaces for additional sensors. The system in particular applies to buildings and structures for transport and traffic and large-scale industrial facilities, where a subsequent wiring installation is difficult or impossible."
1More

Surge of Cybersecurity Beuracracies Sparks Lucrative Opertunities - 1 views

  •  
    How we can make buckets of money due to the changing cybersecurity environment and the tools we will have to develop and be proficient with. Good stuff about the DHS in cybersecurity here
1More

First Strike - 0 views

  •  
    The US shift from defense to offense and the development of 'cyberweapons'
1More

ScienceDirect.com - Procedia Engineering - A Rule Based Approach for Attribute Selectio... - 0 views

  •  
    "A new rule based attribute selection algorithm for removing the redundant attributes which are used in decision making on intrusions in wireless sensor networks. This work focuses mainly on finding important attributes to find Denial of Service attacks. "
« First ‹ Previous 221 - 240 of 336 Next › Last »
Showing 20 items per page