Results 21 to 30 of about 310,711 (289)

Efficient data possession–checking protocol with deduplication in cloud

open access: yesInternational Journal of Distributed Sensor Networks, 2017
Deduplication has been widely applied to save storage overhead in the cloud server. Data integrity verification with deduplication can not only save space of the cloud server but also ensure security of the stored data.
Jinxia Wei   +4 more
doaj   +1 more source

LRM: A Location Recombination Mechanism for Achieving Trajectory $k$ -Anonymity Privacy Protection

open access: yesIEEE Access, 2019
Trajectory k-anonymity is a prevalent technique for protecting trajectory privacy. However, the existing techniques for generating fake trajectories can be easily broken by an adversary because of the failure to capture the probabilistic features and ...
Yunfeng Wang   +7 more
doaj   +1 more source

Online Intrusion Scenario Discovery and Prediction Based on Hierarchical Temporal Memory (HTM)

open access: yesApplied Sciences, 2020
With the development of intrusion detection, a number of the intelligence algorithms (e.g., artificial neural networks) are introduced to enhance the performance of the intrusion detection systems.
Kai Zhang   +5 more
doaj   +1 more source

Secure ABE Scheme for Access Management in Blockchain-Based IoT

open access: yesIEEE Access, 2021
Internet of Things (IoT) has been widely used in various fields of our daily life in the past years. Obviously, in the future, the significance of its security will be more evident and enormous.
Jiansheng Zhang   +4 more
doaj   +1 more source

An Attention-Based Graph Neural Network for Spam Bot Detection in Social Networks

open access: yesApplied Sciences, 2020
With the rapid development of social networks, spam bots and other anomaly accounts’ malicious behavior has become a critical information security problem threatening the social network platform.
Chensu Zhao   +5 more
doaj   +1 more source

An Efficient Approach for LBS Privacy Preservation in Mobile Social Networks

open access: yesApplied Sciences, 2019
With the rapid development of smart handheld devices, wireless communication, and positioning technologies, location-based service (LBS) has been gaining tremendous popularity in mobile social networks (MSN).
Guangcan Yang   +5 more
doaj   +1 more source

Disability and disaster recovery: a tale of two cities? [PDF]

open access: yes, 2006
This paper examines the connections between disability and disaster from a global perspective. Concepts from the research and policy literature are used to distinguish between individual and social models of disability, and between natural hazards and ...
Hemingway, L., Priestley, M.
core   +1 more source

Capacity Gaps in Post Disaster Waste Management: Case Study in Sri Lanka [PDF]

open access: yes, 2015
Disaster waste is one of the major consequences aftermath of any disaster, impacts on public and environment, rescue and emergency services, provision of lifeline support and socio-economic recovery of affected areas.
AT Ozden   +14 more
core   +1 more source

A Filter Feature Selection Algorithm Based on Mutual Information for Intrusion Detection

open access: yesApplied Sciences, 2018
For a large number of network attacks, feature selection is used to improve intrusion detection efficiency. A new mutual information algorithm of the redundant penalty between features (RPFMI) algorithm with the ability to select optimal features is ...
Fei Zhao   +4 more
doaj   +1 more source

A Heterogeneous Ensemble Learning Framework for Spam Detection in Social Networks with Imbalanced Data

open access: yesApplied Sciences, 2020
The popularity of social networks provides people with many conveniences, but their rapid growth has also attracted many attackers. In recent years, the malicious behavior of social network spammers has seriously threatened the information security of ...
Chensu Zhao   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy