|
|
|
Agus Winarno and Riri Fitri Sari
Personal data security is a cybersecurity trend that has captured the world?s attention. Governments, practitioners and academics are jointly building personal data security in various communication systems, including IoT. The protocol that is widely use...
ver más
|
|
|
|
|
|
Zhigang Zhu, Zhijian Yi, Shiyao Li and Lin Li
Radar data mining is the key module for signal analysis, where patterns hidden inside of signals are gradually available in the learning process and its superiority is significant for enhancing the security of the radar emitter classification (REC) syste...
ver más
|
|
|
|
|
|
Islam T. Almalkawi,Jafar Raed,Ayoub Alsarhan,Alaa Abdallah,Emad Abdallah
Pág. pp. 43 - 69
Even though many security schemes proposed for wireless sensor networks protect transmitted data content from being revealed to different types of attacks and fulfill most of the desired security requirements, they are not addressing concealing the priva...
ver más
|
|
|
|
|
|
Yixin He, Daosen Zhai, Dawei Wang, Xiao Tang and Ruonan Zhang
In this paper, we investigate the relay selection problem for the unmanned aerial vehicle (UAV)-assisted vehicular ad-hoc networks (VANETs). For the considered network, we first model and analyze the link quality of service (LQoS) from the source node (S...
ver más
|
|
|
|
|
|
Wibisono Sukmo Wardhono,Nurizal Dwi Priandani,Mahardeka Tri Ananta,Komang Candra Brata,Herman Tolle
Pág. pp. 160 - 167
As social media environments become more interactive and amount of users grown tremendously, privacy is a matter of increasing concern. When personal data become a commodity, social media company can share users data to another party such as government. ...
ver más
|
|
|