Data Security and Privacy Protection for Cloud Storage: A Survey
The new development trends including Internet of Things (IoT), smart city, enterprises digital transformation and world’s digital economy are at the top of the tide.
Pan Yang, N. Xiong, Jingli Ren
semanticscholar +1 more source
Enhanced Data Security of Communication System Using Combined Encryption and Steganography
Data security has become a paramount necessity and more obligation in daily life. Most of our systems can be hacked, and it causes very high risks to our confidential files inside the systems.
H. Alrikabi, H. Hazim
semanticscholar +1 more source
A survey on healthcare data security in wireless body area networks
Advances in remote interchanges, the internet of nano things have empowered the wireless body area networks (WBAN) to end up a promising systems of networking standard.
Tallat Jabeen, Humaira Ashraf, A. Ullah
semanticscholar +1 more source
IoT Security Vulnerabilities and Predictive Signal Jamming Attack Analysis in LoRaWAN [PDF]
Internet of Things (IoT) gains popularity in recent times due to its flexibility, usability, diverse applicability and ease of deployment. However, the issues related to security is less explored. The IoT devices are light weight in nature and have low
Bhowmik, Deepayan +2 more
core +3 more sources
REISCH: incorporating lightweight and reliable algorithms into healthcare applications of WSNs [PDF]
Healthcare institutions require advanced technology to collect patients' data accurately and continuously. The tradition technologies still suffer from two problems: performance and security efficiency.
Al-Zubaidie, Mishall +2 more
core +2 more sources
Multi-Access Edge Computing Architecture, Data Security and Privacy: A Review
Multi-Access Edge Computing (MEC) is an extension of cloud computing that aims to provide computation, storage, and networking capabilities at the edge of the network in close proximity to end-users.
Belal Ali, M. Gregory, Shuo Li
semanticscholar +1 more source
Dubhe: a deep-learning-based B5G coverage analysis method
In recent years, with the rapid development of various technologies such as the Internet of Things and the Internet, the demand for massive device connections and a variety of differentiated new business applications has continued to increase.
Haoyan Xu, Xiaolong Xu, Fu Xiao
doaj +1 more source
A Design of MAC Model Based on the Separation of Duties and Data Coloring: DSDC-MAC [PDF]
Among the access control methods for database security, there is Mandatory Access Control (MAC) model in which the security level is set to both the subject and the object to enhance the security control. Legacy MAC models have focused only on one thing,
Kim, Jin-Woo +3 more
core +2 more sources
Chaotic iterations versus Spread-spectrum: chaos and stego security [PDF]
A new framework for information hiding security, called chaos-security, has been proposed in a previous study. It is based on the evaluation of unpredictability of the scheme, whereas existing notions of security, as stego-security, are more linked to ...
Bahi, Jacques M. +2 more
core +3 more sources
Hate Speech Detection Using Machine Learning: A Survey
Currently hate speech is a growing challenge for society, individuals, policymakers, and researchers, as social media platforms make it easy to anonymously create and grow online friends and followers, and provide an online forum for debate about ...
Seble, H., +7 more
doaj

