Sema-IIoVT: Emergent semantic-based trustworthy information-centric fog system and testbed for intelligent internet of vehicles

Q Zhang, J Wu, M Zanella, W Yang… - IEEE Consumer …, 2021 - ieeexplore.ieee.org
In large-scale emergency scenarios, massive content for searching, asking for help, and
rescue will be generated and transmitted in intelligent Internet of vehicular things (IIoVT) …

A Deep Learning-Based Emergency Alert Wake-Up Signal Detection Method for the UHD Broadcasting System

JH Song, MS Baek, B Bae, HK Song - Sensors, 2024 - mdpi.com
With the increasing frequency and severity of disasters and accidents, there is a growing
need for efficient emergency alert systems. The ultra-high definition (UHD) broadcasting …

Extending the coverage of evolved Node–B by relaying data using device-to-device offloading in next generation cellular network

CG Balaji, K Murugan - Peer-to-Peer Networking and Applications, 2021 - Springer
The fifth-Generation mobile network introduces a new technology called Device-to-device
(D2D) Communication which allows User Equipment (UE) to communicate directly with each …

Hybrid device-to-device and device-to-vehicle networks for energy-efficient emergency communications

Z Huang - IEEE Systems Journal, 2023 - ieeexplore.ieee.org
Recovering postdisaster communications has been a challenging task for search and
rescue. Recently, device-to-device (D2D) and device-to-vehicle (D2V) networks have drawn …

Stakeholder security analysis-a new approach to security design with example application

NMH Hadaad - 2020 - research.usq.edu.au
Stakeholder security analysis (SSA) is a rigorous approach to analysing and designing
systems from the point of view of cybersecurity which is defined and applied in this …