Bob Duncan

Orcid: 0000-0002-9692-4667

According to our database1, Bob Duncan authored at least 17 papers between 2011 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Privacy and security challenges for autonomous agents : A study of two social humanoid service robots.
Proceedings of the IEEE International Conference on Cloud Computing Technology and Science, 2022

2020
Cybersecurity Risk Management in Small and Medium-Sized Enterprises: A Systematic Review of Recent Evidence.
Proceedings of the 2020 International Conference on Cyber Situational Awareness, 2020

2018
The Impact of Crypto-Currency Risks on the Use of Blockchain for Cloud Security and Privacy.
Proceedings of the 2018 International Conference on High Performance Computing & Simulation, 2018

Risk Management for Cloud Compliance with the EU General Data Protection Regulation.
Proceedings of the 2018 International Conference on High Performance Computing & Simulation, 2018

Attackers Constantly Threaten the Survival of Organisations, but there is a New Shark in the Water: Carcharodon Carcharias Moderator Europa Universalis.
Proceedings of the 2018 International Conference on Cyber Security and Protection of Digital Services, 2018

2017
Advances in Security in Computing and Communications.
CoRR, 2017

Unikernels for Cloud Architectures: How Single Responsibility can Reduce Complexity, Thus Improving Enterprise Cloud Security.
Proceedings of the COMPLEXIS 2016, 2017

Anomaly Detection for Soft Security in Cloud based Auditing of Accounting Systems.
Proceedings of the CLOSER 2017, 2017

2016
Enterprise IoT security and scalability: how unikernels can improve the status Quo.
Proceedings of the 9th International Conference on Utility and Cloud Computing, 2016

2015
Enhancing Cloud Security and Privacy: Broadening the Service Level Agreement.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Could the Outsourcing of Incident Response Management Provide a Blueprint for Managing Other Cloud Security Requirements?
Proceedings of the Enterprise Security - Second International Workshop, 2015

Information Security in the Cloud: Should We be Using a Different Approach?
Proceedings of the 7th IEEE International Conference on Cloud Computing Technology and Science, 2015

The Importance of Proper Measurement for a Cloud Security Assurance Model.
Proceedings of the 7th IEEE International Conference on Cloud Computing Technology and Science, 2015

2014
Compliance with standards, assurance and audit: does this equal security?
Proceedings of the 7th International Conference on Security of Information and Networks, 2014

Reflecting on Whether Checklists Can Tick the Box for Cloud Security.
Proceedings of the IEEE 6th International Conference on Cloud Computing Technology and Science, 2014

2013
Developing a Conceptual Framework for Cloud Security Assurance.
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013

2011
Direction giving: an attempt to increase user engagement.
Proceedings of the ENLG 2011, 2011


  Loading...