Aspects of quality in Internet of Things (IoT) solutions: A systematic map** study

BS Ahmed, M Bures, K Frajtak, T Cerny - IEEE Access, 2019 - ieeexplore.ieee.org
Internet of Things (IoT) is an emerging technology that has the promising power to change
our future. Due to the market pressure, IoT systems may be released without sufficient …

Cybercrime and society

M Yar, KF Steinmetz - 2019 - torrossa.com
Untitled Page 1 Page 2 AND CYBERCRIME SOCIETY Page 3 Sara Miller McCune founded
SAGE Publishing in 1965 to support the dissemination of usable knowledge and educate a …

Towards secure FinTech: A survey, taxonomy, and open research challenges

S Mehrban, MW Nadeem, M Hussain, MM Ahmed… - Ieee …, 2020 - ieeexplore.ieee.org
Financial Technology (FinTech) has attracted a wide range of attention and is rapidly
proliferating. As a result of its consistent growth new terms have been introduced in this …

Tor hidden services: A systematic literature review

DL Huete Trujillo, A Ruiz-Martínez - Journal of Cybersecurity and Privacy, 2021 - mdpi.com
Anonymous communications networks were created to protect the privacy of
communications, preventing censorship and traffic analysis. The most famous anonymous …

Highly efficient federated learning with strong privacy preservation in cloud computing

C Fang, Y Guo, N Wang, A Ju - Computers & Security, 2020 - Elsevier
Federated learning is a new machine learning framework that allows mutually distrusting
clients to reap the benefits from the joint training model without explicitly disclosing their …

Research in electronic and mobile payment systems: a bibliometric analysis

O Tounekti, A Ruiz-Martínez, AF Skarmeta Gomez - Sustainability, 2022 - mdpi.com
Electronic (mobile) payment systems are an important aspect of e-commerce. However, few
reviews highlight the most significant findings and challenges. In this article, we have …

De-Wipimization: Detection of data wi** traces for investigating NTFS file system

DB Oh, KH Park, HK Kim - Computers & Security, 2020 - Elsevier
Data wi** is used to securely delete securely unwanted files. However, the misuse of data
wi** can destroy pieces of evidence to be spoiled in a digital forensic investigation. To …

Content delivery enhancement in Vehicular Social Network with better routing and caching mechanism

B Yi, X Wang, M Huang - Journal of Network and Computer Applications, 2021 - Elsevier
Abstract Vehicular Social Network (VSN) emerges as one meaningful scenario of Mobile
Social Network (MSN) and aims at addressing the traffic congestion and security problems …

Kajian Literatur Sistematis Teori Pertukaran Sosial Dalam Hubungan Dua Arah

PF Muttaqien - Communicative: Jurnal Komunikasi Dan …, 2023 - jurnal.uibbc.ac.id
Social exchange theory (SET) is often perceived as a theory that only considers the profit-
and-loss aspects of a two-way relationship. This theory is suspected of not considering other …

[HTML][HTML] Evolution of web tracking protection in Chrome

R Pan, A Ruiz-Martínez - Journal of Information Security and Applications, 2023 - Elsevier
In our society, protecting users' privacy is of utmost importance, especially when users
access websites. Increased awareness of privacy concerns has led web browsers to …