Results 21 to 30 of about 26,049,904 (376)

Data Security and Privacy Protection for Cloud Storage: A Survey

open access: yesIEEE Access, 2020
The new development trends including Internet of Things (IoT), smart city, enterprises digital transformation and world’s digital economy are at the top of the tide.
Pan Yang, N. Xiong, Jingli Ren
semanticscholar   +1 more source

Enhanced Data Security of Communication System Using Combined Encryption and Steganography

open access: yesInternational Journal of Interactive Mobile Technologies, 2021
Data security has become a paramount necessity and more obligation in daily life. Most of our systems can be hacked, and it causes very high risks to our confidential files inside the systems.
H. Alrikabi, H. Hazim
semanticscholar   +1 more source

A survey on healthcare data security in wireless body area networks

open access: yesJournal of Ambient Intelligence and Humanized Computing, 2021
Advances in remote interchanges, the internet of nano things have empowered the wireless body area networks (WBAN) to end up a promising systems of networking standard.
Tallat Jabeen, Humaira Ashraf, A. Ullah
semanticscholar   +1 more source

IoT Security Vulnerabilities and Predictive Signal Jamming Attack Analysis in LoRaWAN [PDF]

open access: yes, 2020
Internet of Things (IoT) gains popularity in recent times due to its flexibility, usability, diverse applicability and ease of deployment. However, the issues related to security is less explored. The IoT devices are light weight in nature and have low
Bhowmik, Deepayan   +2 more
core   +3 more sources

REISCH: incorporating lightweight and reliable algorithms into healthcare applications of WSNs [PDF]

open access: yes, 2020
Healthcare institutions require advanced technology to collect patients' data accurately and continuously. The tradition technologies still suffer from two problems: performance and security efficiency.
Al-Zubaidie, Mishall   +2 more
core   +2 more sources

Multi-Access Edge Computing Architecture, Data Security and Privacy: A Review

open access: yesIEEE Access, 2021
Multi-Access Edge Computing (MEC) is an extension of cloud computing that aims to provide computation, storage, and networking capabilities at the edge of the network in close proximity to end-users.
Belal Ali, M. Gregory, Shuo Li
semanticscholar   +1 more source

Dubhe: a deep-learning-based B5G coverage analysis method

open access: yesEURASIP Journal on Advances in Signal Processing, 2021
In recent years, with the rapid development of various technologies such as the Internet of Things and the Internet, the demand for massive device connections and a variety of differentiated new business applications has continued to increase.
Haoyan Xu, Xiaolong Xu, Fu Xiao
doaj   +1 more source

A Design of MAC Model Based on the Separation of Duties and Data Coloring: DSDC-MAC [PDF]

open access: yes, 2020
Among the access control methods for database security, there is Mandatory Access Control (MAC) model in which the security level is set to both the subject and the object to enhance the security control. Legacy MAC models have focused only on one thing,
Kim, Jin-Woo   +3 more
core   +2 more sources

Chaotic iterations versus Spread-spectrum: chaos and stego security [PDF]

open access: yes, 2010
A new framework for information hiding security, called chaos-security, has been proposed in a previous study. It is based on the evaluation of unpredictability of the scheme, whereas existing notions of security, as stego-security, are more linked to ...
Bahi, Jacques M.   +2 more
core   +3 more sources

Hate Speech Detection Using Machine Learning: A Survey

open access: yesAcademy Journal of Science and Engineering, 2023
Currently hate speech is a growing challenge for society, individuals, policymakers, and researchers, as social media platforms make it easy to anonymously create and grow online friends and followers, and provide an online forum for debate about ...
Seble, H.,   +7 more
doaj  

Home - About - Disclaimer - Privacy