Results 21 to 30 of about 2,757,418 (333)

Using User Behavior to Measure Privacy on Online Social Networks

open access: yesIEEE Access, 2020
Because social networks exemplify the phenomenon of homogeneity in complex networks, researchers generally believe that a user's privacy disclosure is closely related to that of the users around them, but we find that the related users studied in ...
Xuefeng Li   +5 more
doaj   +1 more source

GL-Tree: A Hierarchical Tree Structure for Efficient Retrieval of Massive Geographic Locations

open access: yesSensors, 2023
Location-based application services and location privacy protection solutions are often required for the storage, management, and efficient retrieval of large amounts of geolocation data for specific locations or location intervals.
Bin Liu, Chunyong Zhang, Yang Xin
doaj   +1 more source

Engaging youth in post-disaster research: Lessons learned from a creative methods approach [PDF]

open access: yes, 2016
Children and youth often demonstrate resilience and capacity in the face of disasters. Yet, they are typically not given the opportunities to engage in youth-driven research and lack access to official channels through which to contribute their ...
Cox, Robin S   +5 more
core   +3 more sources

VANET Secure Reputation Evaluation & Management Model Based on Double Layer Blockchain

open access: yesApplied Sciences, 2023
Vehicle ad-hoc network (VANET) is interconnected through message forwarding and exchanging among vehicle nodes. Due to its highly dynamic topology and its wireless and heterogeneous communication mode, VANET is more vulnerable to security threats from ...
Bochuan Hou   +4 more
doaj   +1 more source

A Search Efficient Privacy-Preserving Location-Sharing Scheme in Mobile Online Social Networks

open access: yesApplied Sciences, 2020
With the advent of intelligent handheld devices, location sharing becomes one of the most popular services in mobile online social networks (mOSNs). In location-sharing services, users can enjoy a better social experience by updating their real-time ...
Guangcan Yang   +6 more
doaj   +1 more source

Community Disaster Recovery

open access: yes, 2021
Disasters can serve as focusing events that increase agenda attention related to issues of disaster response, recovery, and preparedness. Increased agenda attention can lead to policy changes and organisational learning.
D. Crow, Elizabeth A. Albright
semanticscholar   +1 more source

Optimal Weakly Secure Minimum Storage Regenerating Codes Scheme

open access: yesIEEE Access, 2019
In a distributed storage system, regenerating codes can be utilized to ensure data availability. This reduces the repair bandwidth but increases the risk of data eavesdropping on each node.
Jianchao Bian   +3 more
doaj   +1 more source

An Intrusion Action-Based IDS Alert Correlation Analysis and Prediction Framework

open access: yesIEEE Access, 2019
Since the rapid development of the internet, the emergence of network intrusion has become the focus of studies for scholars and security enterprises.
Kai Zhang   +4 more
doaj   +1 more source

A Lightweight ID Based Authentication and Key Agreement Protocol for Multiserver Architecture

open access: yesInternational Journal of Distributed Sensor Networks, 2015
There is an increasing demand of an anonymous authentication to secure communications between numerous different network members while preserving privacy for the members.
Yanrong Lu   +4 more
doaj   +1 more source

Lahar characteristics as a function of triggering mechanism at a seasonally snow-clad volcano: contrasting lahars following the 2014 phreatic eruption of Ontake Volcano, Japan

open access: yesEarth, Planets and Space, 2018
In association with the September 2014 phreatic eruption (VEI 1–2) at Ontake Volcano, a syn-eruptive and two post-eruptive lahars occurred in the Akagawa–Nigorigawa River, southern flank of the volcano.
Kyoko S. Kataoka   +7 more
doaj   +1 more source

Home - About - Disclaimer - Privacy