Aspects of quality in Internet of Things (IoT) solutions: A systematic map** study
Internet of Things (IoT) is an emerging technology that has the promising power to change
our future. Due to the market pressure, IoT systems may be released without sufficient …
our future. Due to the market pressure, IoT systems may be released without sufficient …
Cybercrime and society
M Yar, KF Steinmetz - 2019 - torrossa.com
Untitled Page 1 Page 2 AND CYBERCRIME SOCIETY Page 3 Sara Miller McCune founded
SAGE Publishing in 1965 to support the dissemination of usable knowledge and educate a …
SAGE Publishing in 1965 to support the dissemination of usable knowledge and educate a …
Towards secure FinTech: A survey, taxonomy, and open research challenges
Financial Technology (FinTech) has attracted a wide range of attention and is rapidly
proliferating. As a result of its consistent growth new terms have been introduced in this …
proliferating. As a result of its consistent growth new terms have been introduced in this …
Tor hidden services: A systematic literature review
DL Huete Trujillo, A Ruiz-Martínez - Journal of Cybersecurity and Privacy, 2021 - mdpi.com
Anonymous communications networks were created to protect the privacy of
communications, preventing censorship and traffic analysis. The most famous anonymous …
communications, preventing censorship and traffic analysis. The most famous anonymous …
Highly efficient federated learning with strong privacy preservation in cloud computing
C Fang, Y Guo, N Wang, A Ju - Computers & Security, 2020 - Elsevier
Federated learning is a new machine learning framework that allows mutually distrusting
clients to reap the benefits from the joint training model without explicitly disclosing their …
clients to reap the benefits from the joint training model without explicitly disclosing their …
Research in electronic and mobile payment systems: a bibliometric analysis
Electronic (mobile) payment systems are an important aspect of e-commerce. However, few
reviews highlight the most significant findings and challenges. In this article, we have …
reviews highlight the most significant findings and challenges. In this article, we have …
De-Wipimization: Detection of data wi** traces for investigating NTFS file system
Data wi** is used to securely delete securely unwanted files. However, the misuse of data
wi** can destroy pieces of evidence to be spoiled in a digital forensic investigation. To …
wi** can destroy pieces of evidence to be spoiled in a digital forensic investigation. To …
Content delivery enhancement in Vehicular Social Network with better routing and caching mechanism
B Yi, X Wang, M Huang - Journal of Network and Computer Applications, 2021 - Elsevier
Abstract Vehicular Social Network (VSN) emerges as one meaningful scenario of Mobile
Social Network (MSN) and aims at addressing the traffic congestion and security problems …
Social Network (MSN) and aims at addressing the traffic congestion and security problems …
Kajian Literatur Sistematis Teori Pertukaran Sosial Dalam Hubungan Dua Arah
PF Muttaqien - Communicative: Jurnal Komunikasi Dan …, 2023 - jurnal.uibbc.ac.id
Social exchange theory (SET) is often perceived as a theory that only considers the profit-
and-loss aspects of a two-way relationship. This theory is suspected of not considering other …
and-loss aspects of a two-way relationship. This theory is suspected of not considering other …
[HTML][HTML] Evolution of web tracking protection in Chrome
In our society, protecting users' privacy is of utmost importance, especially when users
access websites. Increased awareness of privacy concerns has led web browsers to …
access websites. Increased awareness of privacy concerns has led web browsers to …