Search
Now showing items 1-3 of 3
Towards improved trust in threat intelligence sharing using Blockchain and trusted computing.
(IEEE Xplore, 2019-10)
Threat intelligence sharing is posited as an important aid to help counter cybersecurity attacks and a number of threat intelligence sharing communities exist. There is a general consensus that many challenges remain to ...
MR-Edge: a MapReduce-based Protocol for IoT Edge Computing with resource constraints.
(IEEE Xplore, 2019)
Edge computing is proposed to remedy the
Cloud-only processing architecture for Internet of Things (IoT)
because of the massive amounts of IoT data. The challenge is
how to deploy and execute data processing tasks ...
Visual surveillance within the EU general data protection regulation: a technology perspective.
(IEEE, 2019-08-23)
From an individual's perspective, technological advancement has merits and demerits. Video captured by surveillance cameras while a person goes about their daily life may improve their personal safety but the images collected ...