Results 31 to 40 of about 2,757,418 (333)

DGS-HSA: A Dummy Generation Scheme Adopting Hierarchical Structure of the Address

open access: yesApplied Sciences, 2020
With the increasing convenience of location-based services (LBSs), there have been growing concerns about the risk of privacy leakage. We show that existing techniques fail to defend against a statistical attack meant to infer the user’s location privacy
Mingzhen Li   +8 more
doaj   +1 more source

Efficient data possession–checking protocol with deduplication in cloud

open access: yesInternational Journal of Distributed Sensor Networks, 2017
Deduplication has been widely applied to save storage overhead in the cloud server. Data integrity verification with deduplication can not only save space of the cloud server but also ensure security of the stored data.
Jinxia Wei   +4 more
doaj   +1 more source

LRM: A Location Recombination Mechanism for Achieving Trajectory $k$ -Anonymity Privacy Protection

open access: yesIEEE Access, 2019
Trajectory k-anonymity is a prevalent technique for protecting trajectory privacy. However, the existing techniques for generating fake trajectories can be easily broken by an adversary because of the failure to capture the probabilistic features and ...
Yunfeng Wang   +7 more
doaj   +1 more source

Online Intrusion Scenario Discovery and Prediction Based on Hierarchical Temporal Memory (HTM)

open access: yesApplied Sciences, 2020
With the development of intrusion detection, a number of the intelligence algorithms (e.g., artificial neural networks) are introduced to enhance the performance of the intrusion detection systems.
Kai Zhang   +5 more
doaj   +1 more source

Secure ABE Scheme for Access Management in Blockchain-Based IoT

open access: yesIEEE Access, 2021
Internet of Things (IoT) has been widely used in various fields of our daily life in the past years. Obviously, in the future, the significance of its security will be more evident and enormous.
Jiansheng Zhang   +4 more
doaj   +1 more source

An Attention-Based Graph Neural Network for Spam Bot Detection in Social Networks

open access: yesApplied Sciences, 2020
With the rapid development of social networks, spam bots and other anomaly accounts’ malicious behavior has become a critical information security problem threatening the social network platform.
Chensu Zhao   +5 more
doaj   +1 more source

Disaster Recovery (After Catastrophes) [PDF]

open access: yes, 2021
This chapter examines approaches to disaster response critically. It compares ‘owner-driven’ and ‘community-ownership’ approaches to recovery policy taken by two different cities in the Indian state of Gujarat following the devastating 2001 Gujarat earthquake. Each model recognizes a different compositional context of agents, temporalities, and effects,
Marjaana Jauhola   +3 more
openaire   +2 more sources

Evaluations of post-disaster recovery: A review of practice material [PDF]

open access: yes, 2016
This paper reviews evaluations of post-disaster recovery efforts. The focus is on operational material and other ‘grey literature’ from disasters that have occurred in Australia, New Zealand and internationally.
Ní Shé, É, Ryan, R, Wortley, L
core   +3 more sources

An Efficient Approach for LBS Privacy Preservation in Mobile Social Networks

open access: yesApplied Sciences, 2019
With the rapid development of smart handheld devices, wireless communication, and positioning technologies, location-based service (LBS) has been gaining tremendous popularity in mobile social networks (MSN).
Guangcan Yang   +5 more
doaj   +1 more source

Post-disaster recovery and sociocultural change: Rethinking social capital development for the new social fabric

open access: yesInternational Journal of Disaster Risk Reduction, 2020
The post-disaster period is critical for reducing vulnerability and building resilience. Social capital plays an important role in generating and maintaining risk reducing behaviour and a rich evidence base demonstrating its contribution to the recovery ...
Charlotte Monteil, P. Simmons, A. Hicks
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy