{"title":"Cybersecurity At Organizations: A Delphi Pilot Study of Expert Opinions About Policy and Protection","authors":"Holly Reitmeier, J. Tromp, John Bottoms","doi":"10.1002/9781119488330.CH11","DOIUrl":"https://doi.org/10.1002/9781119488330.CH11","url":null,"abstract":"","PeriodicalId":109683,"journal":{"name":"Cyber Security in Parallel and Distributed Computing","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127344308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. S. Kumar, Abhishek Kumar, P. S. Rathore, J. Chatterjee
{"title":"An On-Demand and User-Friendly Framework for Cloud Data Centre Networks with Performance Guarantee","authors":"P. S. Kumar, Abhishek Kumar, P. S. Rathore, J. Chatterjee","doi":"10.1002/9781119488330.ch10","DOIUrl":"https://doi.org/10.1002/9781119488330.ch10","url":null,"abstract":"","PeriodicalId":109683,"journal":{"name":"Cyber Security in Parallel and Distributed Computing","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124506360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. Manikandan, B. Balamurugan, C. Senthilkumar, R. R. A. Harinarayan, R. Subramanian
{"title":"Cyberwar is Coming","authors":"T. Manikandan, B. Balamurugan, C. Senthilkumar, R. R. A. Harinarayan, R. Subramanian","doi":"10.1002/9781119488330.ch5","DOIUrl":"https://doi.org/10.1002/9781119488330.ch5","url":null,"abstract":"","PeriodicalId":109683,"journal":{"name":"Cyber Security in Parallel and Distributed Computing","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125887815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cyber-Security Techniques in Distributed Systems, SLAs and other Cyber Regulations","authors":"Soumitra Ghosh, Anjana Mishra, B. K. Mishra","doi":"10.1002/9781119488330.ch7","DOIUrl":"https://doi.org/10.1002/9781119488330.ch7","url":null,"abstract":"","PeriodicalId":109683,"journal":{"name":"Cyber Security in Parallel and Distributed Computing","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128508826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Introduction on Cybersecurity","authors":"Ishaani Priyadarshini","doi":"10.1002/9781119488330.ch1","DOIUrl":"https://doi.org/10.1002/9781119488330.ch1","url":null,"abstract":"","PeriodicalId":109683,"journal":{"name":"Cyber Security in Parallel and Distributed Computing","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126332125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Introduction to Blockchain Technology","authors":"Ishaani Priyadarshini","doi":"10.1002/9781119488330.ch6","DOIUrl":"https://doi.org/10.1002/9781119488330.ch6","url":null,"abstract":"","PeriodicalId":109683,"journal":{"name":"Cyber Security in Parallel and Distributed Computing","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126530579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Srivastava, S. Dube, Gulshan Shrivastaya, Kavita Sharma
{"title":"Smartphone Triggered Security Challenges - Issues, Case Studies and Prevention","authors":"S. Srivastava, S. Dube, Gulshan Shrivastaya, Kavita Sharma","doi":"10.1002/9781119488330.ch12","DOIUrl":"https://doi.org/10.1002/9781119488330.ch12","url":null,"abstract":"","PeriodicalId":109683,"journal":{"name":"Cyber Security in Parallel and Distributed Computing","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122949285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Organization Assignment in Federated Cloud Environments based on Multi-Target Optimization of Security","authors":"Abhishek Kumar, Palvadi Srinivas Kumar, T. Sairam","doi":"10.1002/9781119488330.ch9","DOIUrl":"https://doi.org/10.1002/9781119488330.ch9","url":null,"abstract":"","PeriodicalId":109683,"journal":{"name":"Cyber Security in Parallel and Distributed Computing","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126292852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Alisha Sikri, Surjeet Dalal, N. P. Singh, Dac-Nhuong Le
{"title":"Mapping of e-Wallets With Features","authors":"Alisha Sikri, Surjeet Dalal, N. P. Singh, Dac-Nhuong Le","doi":"10.1002/9781119488330.ch16","DOIUrl":"https://doi.org/10.1002/9781119488330.ch16","url":null,"abstract":"","PeriodicalId":109683,"journal":{"name":"Cyber Security in Parallel and Distributed Computing","volume":"81 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133765575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}