Security and Privacy IoT Vulnerabilities: The Danger of Too Many Entry Points
By Mangesh Bhamre, Plume Design, Inc.
|
2022 |
A Method and Framework for IoT Network Security
By Umamaheswar Achari Kakinada, Dr. Hossam H. Hmimy & Manish Jindal, Charter Communications Inc.
|
2020 |
Adapting Proven Technology to Counter IoT Threats
By Petr Peterka, Verimatrix
|
2017 |
Wi-Fi Privacy and Security: Evolving to Keep up with Marketplace Demands
By Carol Ansley, Cox Communications, Inc.; Tushar Sharma, Cox Communications, Inc.
|
2023 |
Implementing a Behavioral Analysis Approach to Thwart IoT Attacks
By David Yates, Guavus, A Thales Company
|
2017 |
Privacy Posture 2022 - The Intersection of Technology, Policy, Standards, and Security
By Brian Scriber, CableLabs
|
2022 |
Successful Wi-Fi 6 Deployment to Customer Homes: A Service Provider’s Guide to Intelligently Controlling And Optimizing the Wi-Fi 6 Home Network
By Bill McFarland, Plume Design, Inc.
|
2021 |
Connectivity and COVID-19: Maintaining QoE During a Crisis
By William McFarland, Plume
|
2020 |
Shifting the Conversation from Speeds, Feeds, and WiFi 7 to a Multidimensional Model for Flawless Application Performance
By Adam Hotchkiss, Plume Design, Inc.
|
2023 |
The Evolution Of Cellular IoT
By Hani Beshara, Ericsson Inc.
|
2019 |
Too Many Cooks in the Kitchen: Fostering Organizational Cohesion by Digitizing the RPD
By De Fu Li, Comcast; Gregory Medders, Comcast; Eric Stonfer, Comcast; Bhanu Krishnamurthy, Comcast; Sinan Onder, Comcast; Mehul Patel, Comcast
|
2023 |
Navigating IoT Technologies, Standards and Frameworks for Managed IoT Service
By Gary Gutknecht, Technicolor
|
2018 |
5G Security & Protection Framework
By Vasu Dalal & Patrick Nta, NOKIA
|
2021 |
Changing the World: IoT Chaos as a Ladder to Improving Security
By Brian A. Scriber, CableLabs
|
2019 |
Optimal Availability & Security For Voice Over Cable Networks
By Chun K. Chan, Andrew R. McGee, Martin J. Glapa, and Uma Chandrashekhar, Bell Laboratories, Lucent Technologies
|
2004 |
When Security and Privacy Collide: New Approaches are Needed
By Sandy Wilbourn & Craig Sprosts, Akamai
|
2018 |
Zero Trust Security Architecture for The Enterprise
By Sarah Weinstein, Christopher Zarcone, Stephen Zevan; Comcast
|
2022 |
Assuring Data Delivery from Critical IoT Devices: A Method to Create New Services and Mitigate Liability
By Michael Kloberdans & Shlomo Ovadia, Charter Communications
|
2018 |
Security Strategies in the Wake of Nation-State Attack Evolution
By Emma Rochon & Nancy Davoust, Comcast Cable
|
2021 |
Edge Compute and Software Life-Cycle Management: Creating Consumer Value and Flexibility
By Patrick Goemaere & Rajat Ghai, Technicolor
|
2018 |