Rapid changes in technology infrastructure, the explosion of data, always-on-always-connected world, the emergence of “multiple internets” and escalating regulation and standards have and continue to offer fertile ground for the development of products and services to increase ICT and personal security. A prevalent challenge however, facing the privacy and cybersecurity (PACS) community is transitioning technical R&D outputs into commercial and marketplace-ready products and services. Compounding this, the PACS domain is deeply influenced from various themes driven by technical, human, societal, organizational, economic, legal, and regulatory concerns among others; these factors combine to create marketplace and innovation ecosystem with co...
© 2016 Sam PitruzzelloFailing to profit from innovations as a result of knowledge leakage is a key b...
Submitted to Journal of Information Security and ApplicationsThe CyberSec4Europe project, as one of ...
Concerns about information security and privacy continue to make headlines in the media and rate as ...
Rapid changes in technology infrastructure, the explosion of data, always-on-always-connected world,...
A pressing challenge facing the cybersecurity and privacy re-search community is transitioning techn...
A pressing challenge facing the cybersecurity and privacy research community is transitioning techni...
This paper reflects on security, privacy and trust from the point of you of the innovation in inform...
The focus of this study is on furthering our understanding of the relationship between technology an...
The rise of interconnected “intelligent” objects that move their capabilities from sensing and data ...
This study investigates the interplay between Internet innovation and privacy. We propose working de...
Part 1: Invited PapersInternational audiencePrivacy has long been perceived as a hindrance to innova...
Over the past half-century, technology has evolved beyond our wildest dreams. However, while the ben...
This paper will explore how the often illegal activities of hackers (in the original usage of the te...
With increasing economic pressures and exponential growth in technological innovations, companies ar...
The efficacy of modern computer systems is normally regarded as a function of five basic attributes ...
© 2016 Sam PitruzzelloFailing to profit from innovations as a result of knowledge leakage is a key b...
Submitted to Journal of Information Security and ApplicationsThe CyberSec4Europe project, as one of ...
Concerns about information security and privacy continue to make headlines in the media and rate as ...
Rapid changes in technology infrastructure, the explosion of data, always-on-always-connected world,...
A pressing challenge facing the cybersecurity and privacy re-search community is transitioning techn...
A pressing challenge facing the cybersecurity and privacy research community is transitioning techni...
This paper reflects on security, privacy and trust from the point of you of the innovation in inform...
The focus of this study is on furthering our understanding of the relationship between technology an...
The rise of interconnected “intelligent” objects that move their capabilities from sensing and data ...
This study investigates the interplay between Internet innovation and privacy. We propose working de...
Part 1: Invited PapersInternational audiencePrivacy has long been perceived as a hindrance to innova...
Over the past half-century, technology has evolved beyond our wildest dreams. However, while the ben...
This paper will explore how the often illegal activities of hackers (in the original usage of the te...
With increasing economic pressures and exponential growth in technological innovations, companies ar...
The efficacy of modern computer systems is normally regarded as a function of five basic attributes ...
© 2016 Sam PitruzzelloFailing to profit from innovations as a result of knowledge leakage is a key b...
Submitted to Journal of Information Security and ApplicationsThe CyberSec4Europe project, as one of ...
Concerns about information security and privacy continue to make headlines in the media and rate as ...