|
|
|
Fatemeh Stodt and Christoph Reich
Industrial Internet of Things (IIoT) systems are enhancing the delivery of services and boosting productivity in a wide array of industries, from manufacturing to healthcare. However, IIoT devices are susceptible to cyber-threats such as the leaking of i...
ver más
|
|
|
|
|
|
|
Zhengmin Peng, Kunhui Ye and Jiale Li
Collusion is an all-pervading illegal market behavior that can undermine the sustainable development of the construction industry. It is acknowledged that collusive bidding decision making is influenced by conspirators? cognitive bias. Nevertheless, the ...
ver más
|
|
|
|
|
|
|
Salahudin Salahudin,Achmad Nurmandi,Kisman Karinda,Tinuk Dwi Cahyani
Pág. 138 - 161
ABSTRACTThis paper tries to analyze and utilizes qualitative document content analysis as a means of understanding rent- seeking practices in fiscal policymaking processes. This study revealed that rent-seeking practices in fiscal policymaking in Malang ...
ver más
|
|
|
|
|
|
|
Jia Shi, Xuewen Zeng and Yang Li
Standalone Name Resolution (SNR) is an essential component of many Information-Centric Networking (ICN) infrastructures that maps and stores the mappings of IDs and locators. The delivery of data can be realized only when the name resolution process is c...
ver más
|
|
|
|
|
|
|
Usman Khan, Hammad Tariq Janjuhah, George Kontakiotis, Adnanul Rehman and Stergios D. Zarkogiannis
The Indus River is Asia?s longest river, having its origin in the Tibet Mountain northwest of Pakistan. Routed from northern Gilgit and flowing to the plains, the river passes through several provinces and is connected by numerous small and large tributa...
ver más
|
|
|
|
|
|
|
Pedro Molina-Rodríguez-Navas and Johamna Muñoz Lalinde
Information on the management of local administrations and the actions of the political leaders who govern them is essential for citizens to exercise their political rights. It is therefore necessary for these administrations to provide quality informati...
ver más
|
|
|
|
|
|
|
Rosangela Casolare, Fabio Martinelli, Francesco Mercaldo and Antonella Santone
The Android platform is currently targeted by malicious writers, continuously focused on the development of new types of attacks to extract sensitive and private information from our mobile devices. In this landscape, one recent trend is represented by t...
ver más
|
|
|
|
|
|
|
Limin Shen, Hui Li, Hongyi Wang, Yihuan Wang, Jiayin Feng and Yuqing Jian
On the Android platform, information leakage can use an application-layer privilege escalation attack composed of multi-app collusion. However, the detection effect of a single app that can construct privilege escalation attacks is not good. Furthermore,...
ver más
|
|
|
|
|
|
|
Zhijun Wu, Yun Zhang and Enzhong Xu
For the future of the Internet, because information-centric network (ICN) have natural advantages in terms of content distribution, mobility, and security, it is regarded as a potential solution, or even the key, to solve many current problems. Named Dat...
ver más
|
|
|
|
|
|
|
Marc Escrihuela-Villar, Carlos Gutiérrez-Hita
Pág. 29 - 50
Using the coefficient of cooperation, we analyse the effect of cost asymmetries oncollusive agreements when firms are able to coordinate on distinct output levelsthan the unrestricted joint profit maximization outcome. In this context, we firstinvestigat...
ver más
|
|
|
|