{"title":"Cybersecurity and Secure Information Systems","authors":"A. Masys, A. Hassanien, M. Elhoseny","doi":"10.1007/978-3-030-16837-7","DOIUrl":"https://doi.org/10.1007/978-3-030-16837-7","url":null,"abstract":"","PeriodicalId":158863,"journal":{"name":"Advanced Sciences and Technologies for Security Applications","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133641395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure Interconnection of IT-OT Networks in Industry 4.0","authors":"Cristina Alcaraz","doi":"10.1007/978-3-030-00024-0_11","DOIUrl":"https://doi.org/10.1007/978-3-030-00024-0_11","url":null,"abstract":"","PeriodicalId":158863,"journal":{"name":"Advanced Sciences and Technologies for Security Applications","volume":"5 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133212088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sensemaking Under Conditions of Extreme Uncertainty: From Observation to Action","authors":"Christian O. Fjäder","doi":"10.1007/978-3-030-71998-2_3","DOIUrl":"https://doi.org/10.1007/978-3-030-71998-2_3","url":null,"abstract":"","PeriodicalId":158863,"journal":{"name":"Advanced Sciences and Technologies for Security Applications","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116650983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Global Challenges in Maritime Security","authors":"","doi":"10.1049/etr.2012.9005","DOIUrl":"https://doi.org/10.1049/etr.2012.9005","url":null,"abstract":"Although piracy attacks off Somalia may be abating, there is no decline in sea terrorism worldwide. On the contrary, our sea trade routes may never have been more vulnerable and threat to economies through disruption of maritime lines of supply never more relevant. Over 50,000 merchant ships ply the seven seas. ISO container traffic is more or less back to previous levels. There are more than 200 million container movements involving the USA alone. And world sea trade is expected to increase significantly over the next few years.","PeriodicalId":158863,"journal":{"name":"Advanced Sciences and Technologies for Security Applications","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129933967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Terrorism and the Internet of Things: Cyber-Terrorism as an Emergent Threat","authors":"Adam Henschke","doi":"10.1007/978-3-030-90221-6_5","DOIUrl":"https://doi.org/10.1007/978-3-030-90221-6_5","url":null,"abstract":"","PeriodicalId":158863,"journal":{"name":"Advanced Sciences and Technologies for Security Applications","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129775836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jamal, G. Epiphaniou, Haider M. Al-Khateeb, Blockchain
{"title":"Blockchain and Clinical Trial","authors":"Jamal, G. Epiphaniou, Haider M. Al-Khateeb, Blockchain","doi":"10.1007/978-3-030-11289-9","DOIUrl":"https://doi.org/10.1007/978-3-030-11289-9","url":null,"abstract":"","PeriodicalId":158863,"journal":{"name":"Advanced Sciences and Technologies for Security Applications","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121492975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ryan Singh, Haider M. Al-Khateeb, Gabriela Ahmadi-Assalemi, G. Epiphaniou
{"title":"Towards an IoT Community-Cluster Model for Burglar Intrusion Detection and Real-Time Reporting in Smart Homes","authors":"Ryan Singh, Haider M. Al-Khateeb, Gabriela Ahmadi-Assalemi, G. Epiphaniou","doi":"10.1007/978-3-030-87166-6_3","DOIUrl":"https://doi.org/10.1007/978-3-030-87166-6_3","url":null,"abstract":"","PeriodicalId":158863,"journal":{"name":"Advanced Sciences and Technologies for Security Applications","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124339338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Artificial Intelligence, Its Applications in Different Sectors and Challenges: Bangladesh Context","authors":"Kudrat-E-Khuda (Babu)","doi":"10.1007/978-3-030-88040-8_4","DOIUrl":"https://doi.org/10.1007/978-3-030-88040-8_4","url":null,"abstract":"","PeriodicalId":158863,"journal":{"name":"Advanced Sciences and Technologies for Security Applications","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115315668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}