Maintaining both availability and integrity of communications: Challenges and guidelines for data security and privacy during disasters and crises
暂无分享,去创建一个
Paul Gardner-Stephen | Matthias Hollick | Flor Álvarez | M. Hollick | P. Gardner-Stephen | Flor Álvarez | Paul Gardner-Stephen
[1] Sufian Yousef,et al. Analysis and Enhancement of Authentication Algorithms in Mobile Networks , 2006 .
[2] D Keromytis Angelos,et al. VOICE OVER IP: RISKS, THREATS AND VULNERABILITIES , 2009 .
[3] Roberto Di Pietro,et al. Security in wireless ad-hoc networks - A survey , 2014, Comput. Commun..
[4] Satoshi Kurihara,et al. Information sharing on Twitter during the 2011 catastrophic earthquake , 2013, WWW.
[5] Taejoon Park,et al. A Survey of Security Threats on 4G Networks , 2007, 2007 IEEE Globecom Workshops.
[6] Fabio Ricciato,et al. A review of DoS attack models for 3G cellular networks from a system-design perspective , 2010, Comput. Commun..
[7] Dmitry Namiot. On Mobile Mesh Networks , 2015 .
[8] Vallipuram Muthukkumarasamy,et al. Insecurity in Public-Safety Communications: APCO Project 25 , 2011, SecureComm.
[9] K. Szocik. An Axiological Aspect of Terrorism: Remarks on Scott Atran's Perspective , 2016 .
[10] Dave Yates,et al. Emergency knowledge management and social media technologies: A case study of the 2010 Haitian earthquake , 2011, Int. J. Inf. Manag..
[11] Daniel Gutiérrez-Reina,et al. A Survey on Ad Hoc Networks for Disaster Scenarios , 2014, 2014 International Conference on Intelligent Networking and Collaborative Systems.
[12] A. Kannammal,et al. Survey on secure routing in mobile ad hoc networks , 2016, 2016 International Conference on Advances in Human Machine Interaction (HMI).
[13] Angelos D. Keromytis,et al. A Comprehensive Survey of Voice over IP Security Research , 2012, IEEE Communications Surveys & Tutorials.
[14] Paul Gardner-Stephen,et al. The Serval Project: Practical Wireless Ad-Hoc Mobile Telecommunications , 2011 .
[15] Jin Cao,et al. A Survey on Security Aspects for LTE and LTE-A Networks , 2014, IEEE Communications Surveys & Tutorials.
[16] Jun Hu,et al. Security Issues in Online Social Networks , 2011, IEEE Internet Computing.
[17] Matt Blaze,et al. Why (Special Agent) Johnny (Still) Can't Encrypt: A Security Analysis of the APCO Project 25 Two-Way Radio System , 2011, USENIX Security Symposium.
[18] Nicolas Sklavos,et al. LTE/SAE Security Issues on 4G Wireless Networks , 2013, IEEE Security & Privacy.
[19] Paul Arbon,et al. Defining disaster: The need for harmonisation of terminology , 2015 .
[20] Paul Gardner-Stephen,et al. The rational behind the Serval Network Layer for Resilient Communications , 2013, J. Comput. Sci..
[21] Thomas F. La Porta,et al. Exploiting open functionality in SMS-capable cellular networks , 2008, J. Comput. Secur..
[22] Paul Gardner-Stephen,et al. The serval mesh: A platform for resilient communications in disaster & crisis , 2013, 2013 IEEE Global Humanitarian Technology Conference (GHTC).
[23] R. Shaw,et al. Utilization of Social Media in the East Japan Earthquake and Tsunami and its Effectiveness , 2012 .
[24] Prabhakar L. Ramteke,et al. MANET : History , Challenges And Applications , 2013 .
[25] Yuguang Fang,et al. Privacy and security for online social networks: challenges and opportunities , 2010, IEEE Network.
[26] Louise K. Comfort,et al. Communication, Coherence, and Collective Action , 2006 .
[27] Paul Gardner-Stephen,et al. MeshMS: Ad Hoc Data Transfer within Mesh Network , 2012 .
[28] Tamba I. Isaac. An Economic Analysis of Boko Haram’s Activities in the Chad-Cameroon-Nigeria Border Area , 2015 .
[29] Silvia Giordano,et al. Mobile ad hoc networks , 2002 .