Cooperative privacy preservation for wearable devices in hybrid computing-based smart health

H Liu, X Yao, T Yang, H Ning - IEEE Internet of Things Journal, 2018 - ieeexplore.ieee.org
Along with an integration of wearable devices, wireless communications and big data in the
smart health, biomedical data is collected referring to multiple associated patients during …

Future development of Taiwan's smart cities from an information security perspective

SM Wu, D Guo, YJ Wu, YC Wu - Sustainability, 2018 - mdpi.com
Smart cities are primarily based on information and communications technology
development and applications across various academic subjects and domains. Integrating …

Selective disclosure and yoking-proof based privacy-preserving authentication scheme for cloud assisted wearable devices

H Liu, H Ning, Y Yue, Y Wan, LT Yang - Future Generation Computer …, 2018 - Elsevier
Along with the development of user-centric wireless communications, wearable devices
appear to be popular for real-time collecting a user's private data to provide intelligent …

Physical‐layer information hiding technique for cognitive radio communications in cooperative relaying systems

AH Ghane, JS Harsini - IET Communications, 2019 - Wiley Online Library
This study presents a novel idea for information hiding at the physical layer level in order to
securely transmit confidential cognitive radio data in cooperative relaying systems …

Human and Cognitive Factors involved in Phishing Detection. A Literature Review

D Arévalo, D Valarezo, W Fuertes… - 2023 Congress in …, 2023 - ieeexplore.ieee.org
Human and cognitive factors considerably influence social engineering attacks.
Cybercriminals take advantage of the innocence, carelessness, stress, lack of knowledge …

XACs-DyPol: Towards an XACML-based Access Control Model for Dynamic Security Policy

TK Dang, XS Ha, LK Tran - arXiv preprint arXiv:2005.07160, 2020 - arxiv.org
Authorization and access control play an essential role in protecting sensitive information
from malicious users. The system is based on security policies to determine if an access …

A Neurophysiological Exploration of Human Behavior in User-Centered Cybersecurity

C Arisoy - 2023 - oaktrust.library.tamu.edu
In today's digital era, where security is paramount due to the ever-increasing prevalence of
cyber threats, the conventional emphasis on technical cybersecurity measures has evolved …

On the Prospect of using Cognitive Systems to Enforce Data Access Control

FF Duarte, DD Regateiro, ÓM Pereira… - … Conference on Internet …, 2017 - scitepress.org
Data access control is a field that has been a subject of a lot of research for many years,
which has resulted in many models being designed. Many of these models are deterministic …

Bio-Socially Inspired Strategies in Support of Dynamic Spectrum Access: An Evolutionary Game Theory Perspective

MAM Abu Shattal - 2017 - scholarworks.wmich.edu
Abstract Dynamic Spectrum Access (DSA) has been introduced to fulfill the expanded need
for spectrum by different wireless networks and applications. Within the realm of spectrum …

[引用][C] Plataforma Web para entrenamiento de ataques de Phishing mediante seguridad y psicología cognitiva

A Briceño, D Anabel, DI Valarezo Bracho… - 2021