Results 31 to 40 of about 2,757,418 (333)
DGS-HSA: A Dummy Generation Scheme Adopting Hierarchical Structure of the Address
With the increasing convenience of location-based services (LBSs), there have been growing concerns about the risk of privacy leakage. We show that existing techniques fail to defend against a statistical attack meant to infer the user’s location privacy
Mingzhen Li +8 more
doaj +1 more source
Efficient data possession–checking protocol with deduplication in cloud
Deduplication has been widely applied to save storage overhead in the cloud server. Data integrity verification with deduplication can not only save space of the cloud server but also ensure security of the stored data.
Jinxia Wei +4 more
doaj +1 more source
LRM: A Location Recombination Mechanism for Achieving Trajectory
Trajectory k-anonymity is a prevalent technique for protecting trajectory privacy. However, the existing techniques for generating fake trajectories can be easily broken by an adversary because of the failure to capture the probabilistic features and ...
Yunfeng Wang +7 more
doaj +1 more source
Online Intrusion Scenario Discovery and Prediction Based on Hierarchical Temporal Memory (HTM)
With the development of intrusion detection, a number of the intelligence algorithms (e.g., artificial neural networks) are introduced to enhance the performance of the intrusion detection systems.
Kai Zhang +5 more
doaj +1 more source
Secure ABE Scheme for Access Management in Blockchain-Based IoT
Internet of Things (IoT) has been widely used in various fields of our daily life in the past years. Obviously, in the future, the significance of its security will be more evident and enormous.
Jiansheng Zhang +4 more
doaj +1 more source
An Attention-Based Graph Neural Network for Spam Bot Detection in Social Networks
With the rapid development of social networks, spam bots and other anomaly accounts’ malicious behavior has become a critical information security problem threatening the social network platform.
Chensu Zhao +5 more
doaj +1 more source
Disaster Recovery (After Catastrophes) [PDF]
This chapter examines approaches to disaster response critically. It compares ‘owner-driven’ and ‘community-ownership’ approaches to recovery policy taken by two different cities in the Indian state of Gujarat following the devastating 2001 Gujarat earthquake. Each model recognizes a different compositional context of agents, temporalities, and effects,
Marjaana Jauhola +3 more
openaire +2 more sources
Evaluations of post-disaster recovery: A review of practice material [PDF]
This paper reviews evaluations of post-disaster recovery efforts. The focus is on operational material and other ‘grey literature’ from disasters that have occurred in Australia, New Zealand and internationally.
Ní Shé, É, Ryan, R, Wortley, L
core +3 more sources
An Efficient Approach for LBS Privacy Preservation in Mobile Social Networks
With the rapid development of smart handheld devices, wireless communication, and positioning technologies, location-based service (LBS) has been gaining tremendous popularity in mobile social networks (MSN).
Guangcan Yang +5 more
doaj +1 more source
The post-disaster period is critical for reducing vulnerability and building resilience. Social capital plays an important role in generating and maintaining risk reducing behaviour and a rich evidence base demonstrating its contribution to the recovery ...
Charlotte Monteil, P. Simmons, A. Hicks
semanticscholar +1 more source

