Skip to main content

Home/ Groups/ CSIA 459
Michael Austin

Near Field Communication: How will it change airport processing and the passenger exper... - 0 views

  •  
    A brief article on the prospects of NFC with regards to Airport Management.
James Thomas

Contracts for Information Sharing in Collaborative Networks - 0 views

  •  
    This article discusses the formation of collaborative networks in crisis management and its importance.
James Thomas

Improving Co-located Collaboration through Intergrating Mobile Devices and Interactive ... - 0 views

  •  
    This article is based on a study conducted to observe and document human collaborative interaction using mobile devices and interactive surfaces.
James Thomas

Collaboration in Multicloud Computing Environments - 0 views

  •  
    This article describes a new concept in development for cloud computing which involves combining cloud services into a collection of clouds to form what it defines as a multicloud environment called cloud mashups.
James Thomas

Leveraging Mobile Context for Effective Collaboration and Task Management - 0 views

  •  
    Collaboration in a moment of crisis
Kerry Tam

Mobile Security: Finally a serious problem? - 1 views

  •  
    Article from UMUC's library on mobile security
Kerry Tam

How to mitigate smarthphone threats to your corporate network - 0 views

  •  
    As more and more people have smartphone, it can have the potential risk to an organizations security. This article has a few tips to reduce the threats.
Kerry Tam

Symbian 'vulnerability' and mobile threats - 0 views

  •  
    A study I found at UMUC's library how mobile OS are attacked by hackers and what methods they use to access OS
Michael Austin

Massive cyberattack hits Internet users - CNN.com - 0 views

  •  
    A (very) recent example of a DDoS attack.
Trevor Pyle

Cyber War Over Spam Slows Access for Internet Users | PBS NewsHour | March 27, 2013 - 2 views

  •  
    PBS Newshour video on the clash between Spamhaus and Cyberbunker.
glenn_g

Thinking Putty defeats Fingerprint Scanners! - 1 views

  •  
    Just a heads up on why I don't like biometric Authentication. It gets worse when used for Identification. I'll try to find a link
  •  
    Glen, This did a little to damage fingerprint biometric technologies when it was first discussed in the public. I read the original article I think, when Matsumoto was using original gelatin to fake the scanners. There was also a documentary, or short news clip I had seen awhile back in which he demonstrated it. Newer technologies are starting to combine (multi-factor) authentication in order to gain access now, such as fingerprint and iris. This should help curb things like this, as well as stop the backdoor of username and password. phil
Ken Ripley

Your cell phone is spying on you - 2 views

  •  
    Accessed at the UMUC Library, so enter your last name and barcode/EMPLID.
  •  
    Ken, This was a very good article. Nothing that I had not heard in the recent couple years, but you can see how society is being tracked to the point that no civil liberties union will be able to do anything anymore. The byproducts of the features that everyone wants, i.e. for convenience, are what allow these agencies monitoring and mining all of this data, with our silent approval. The use of this data will only continue to rise, and we will soon see if the secure state we are building will do more good than bad.
Phil Kemp

BIOMETRIC AUTHENTICATION THROUGH A VIRTUAL KEYBOARD FOR SMARTPHONES - 0 views

  •  
    Link goes to UMUC Library Resources so you will need to provide last name and pass to access.
Phil Kemp

Arm's Flex when Responding Call for Implicit User Authentication in Smartphone - 0 views

  •  
    Link goes to UMUC library, so you will need to provide last name and pass if you want to access.
Phil Kemp

Cell Phone-Based Biometric Identification - 0 views

  •  
    Source 4 of 5 for my Annotated Bibliography on the implementation of biometrics to secure smart phone technologies
Phil Kemp

ENTERPRISES HAVE SMART-PHONE BIOMETRIC OPTIONS: Facial recognition, fingerprint identi... - 0 views

  •  
    Source 3 of 5 for my Annotated Bibliography on the implementation fo biometrics to secure smart phone technologies.
Phil Kemp

Exploring Touch-screen Biometrics for User Identification on Smart Phones - 0 views

  •  
    Source 2 of 5 for my Annotated Bibliography on the implementation of biometrics to secure smart phone technologies.
« First ‹ Previous 261 - 280 of 336 Next › Last »
Showing 20 items per page