Advanced Search

Security and Privacy IoT Vulnerabilities: The Danger of Too Many Entry Points
By Mangesh Bhamre, Plume Design, Inc.
2022
A Method and Framework for IoT Network Security
By Umamaheswar Achari Kakinada, Dr. Hossam H. Hmimy & Manish Jindal, Charter Communications Inc.
2020
Adapting Proven Technology to Counter IoT Threats
By Petr Peterka, Verimatrix
2017
Wi-Fi Privacy and Security: Evolving to Keep up with Marketplace Demands
By Carol Ansley, Cox Communications, Inc.; Tushar Sharma, Cox Communications, Inc.
2023
Implementing a Behavioral Analysis Approach to Thwart IoT Attacks
By David Yates, Guavus, A Thales Company
2017
Privacy Posture 2022 - The Intersection of Technology, Policy, Standards, and Security
By Brian Scriber, CableLabs
2022
Successful Wi-Fi 6 Deployment to Customer Homes: A Service Provider’s Guide to Intelligently Controlling And Optimizing the Wi-Fi 6 Home Network
By Bill McFarland, Plume Design, Inc.
2021
Connectivity and COVID-19: Maintaining QoE During a Crisis
By William McFarland, Plume
2020
Shifting the Conversation from Speeds, Feeds, and WiFi 7 to a Multidimensional Model for Flawless Application Performance
By Adam Hotchkiss, Plume Design, Inc.
2023
The Evolution Of Cellular IoT
By Hani Beshara, Ericsson Inc.
2019
Too Many Cooks in the Kitchen: Fostering Organizational Cohesion by Digitizing the RPD
By De Fu Li, Comcast; Gregory Medders, Comcast; Eric Stonfer, Comcast; Bhanu Krishnamurthy, Comcast; Sinan Onder, Comcast; Mehul Patel, Comcast
2023
Navigating IoT Technologies, Standards and Frameworks for Managed IoT Service
By Gary Gutknecht, Technicolor
2018
5G Security & Protection Framework
By Vasu Dalal & Patrick Nta, NOKIA
2021
Changing the World: IoT Chaos as a Ladder to Improving Security
By Brian A. Scriber, CableLabs
2019
Optimal Availability & Security For Voice Over Cable Networks
By Chun K. Chan, Andrew R. McGee, Martin J. Glapa, and Uma Chandrashekhar, Bell Laboratories, Lucent Technologies
2004
When Security and Privacy Collide: New Approaches are Needed
By Sandy Wilbourn & Craig Sprosts, Akamai
2018
Zero Trust Security Architecture for The Enterprise
By Sarah Weinstein, Christopher Zarcone, Stephen Zevan; Comcast
2022
Assuring Data Delivery from Critical IoT Devices: A Method to Create New Services and Mitigate Liability
By Michael Kloberdans & Shlomo Ovadia, Charter Communications
2018
Security Strategies in the Wake of Nation-State Attack Evolution
By Emma Rochon & Nancy Davoust, Comcast Cable
2021
Edge Compute and Software Life-Cycle Management: Creating Consumer Value and Flexibility
By Patrick Goemaere & Rajat Ghai, Technicolor
2018