Sign in to use this feature.

Years

Between: -

Search Results (5,397)

Search Parameters:
Keywords = privacy

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
12 pages, 446 KiB  
Review
Wearable Sensors for Healthcare of Industrial Workers: A Scoping Review
by Juhyun Moon and Byeong-Kwon Ju
Electronics 2024, 13(19), 3849; https://doi.org/10.3390/electronics13193849 (registering DOI) - 28 Sep 2024
Abstract
Background and Objectives: This scoping review evaluates the use of wearable sensor technologies for workplace safety and health monitoring in industrial settings. The aim is to synthesize evidence on the impact of these sensors and their application in high-risk environments. Materials and Methods: [...] Read more.
Background and Objectives: This scoping review evaluates the use of wearable sensor technologies for workplace safety and health monitoring in industrial settings. The aim is to synthesize evidence on the impact of these sensors and their application in high-risk environments. Materials and Methods: Following the PRISMA guidelines, a systematic search across four international electronic databases yielded 59 studies, of which 17 were included in the final review. The selection criteria involved studies that specifically utilized wearable sensors to monitor various health and environmental parameters relevant to industrial workers. Results: The analysis categorizes wearable technologies into five distinct groups based on their function: gas monitoring technologies, heart rate and physiological data collection, fatigue and activity monitoring, comprehensive environmental and physiological monitoring, and advanced sensing and data collection systems. These devices demonstrated substantial benefits in terms of early detection of health risks and enhancement of safety protocols. Conclusions: The review concludes that wearable sensor technologies significantly contribute to workplace safety by providing real-time, data-driven insights into environmental hazards and workers’ physiological status, thus supporting proactive health management practices in industrial settings. Further research is recommended to address the challenges of data privacy, sensor reliability, and cost-effective integration to maximize their potential in occupational health safety. Full article
(This article belongs to the Section Bioelectronics)
20 pages, 2074 KiB  
Review
Blockchain-Based Privacy Preservation for the Internet of Medical Things: A Literature Review
by Afnan Alsadhan, Areej Alhogail and Hessah Alsalamah
Electronics 2024, 13(19), 3832; https://doi.org/10.3390/electronics13193832 (registering DOI) - 28 Sep 2024
Viewed by 248
Abstract
The Internet of Medical Things (IoMT) is a rapidly expanding network comprising medical devices, sensors, and software that collect and exchange patient health data. Today, the IoMT has the potential to revolutionize healthcare by offering more personalized care to patients and improving the [...] Read more.
The Internet of Medical Things (IoMT) is a rapidly expanding network comprising medical devices, sensors, and software that collect and exchange patient health data. Today, the IoMT has the potential to revolutionize healthcare by offering more personalized care to patients and improving the efficiency of healthcare delivery. However, the IoMT also introduces significant privacy concerns, particularly regarding data privacy. IoMT devices often collect and store large amounts of data about patients’ health. These data could be used to track patients’ movements, monitor their health habits, and even predict their future health risks. This extensive data collection and surveillance could be a major invasion of patient privacy. Thus, privacy-preserving research in an IoMT context is an important area of research that aims to mitigate these privacy issues. This review paper comprehensively applies the PRISMA methodology to analyze, review, classify, and compare current approaches of preserving patient data privacy within IoMT blockchain-based healthcare environments. Full article
Show Figures

Figure 1

20 pages, 5867 KiB  
Article
Sustainable Hygiene Solutions: Developing a Foot-Operated Door Mechanism for Communal Spaces Using TRIZ and Universal Design Principles
by Kai-Chao Yao, Chun-Nu Cheng, Kuo-Yi Li, Jing-Ran Xu, Wei-Lun Huang, Wei-Sho Ho, Chin-Wen Liao, Shu-Chen Yang, Hui-Ling Hsiao, Yin-Chi Lin and Ching-Yi Lai
Sustainability 2024, 16(19), 8415; https://doi.org/10.3390/su16198415 - 27 Sep 2024
Viewed by 231
Abstract
Traditional door mechanisms in public spaces, such as knob locks and standard handles, require manual contact, making them prone to contamination and posing significant health risks. To address the critical need for a safer and more hygienic solution, this study aimed to develop [...] Read more.
Traditional door mechanisms in public spaces, such as knob locks and standard handles, require manual contact, making them prone to contamination and posing significant health risks. To address the critical need for a safer and more hygienic solution, this study aimed to develop an innovative foot-operated door mechanism that is accessible and intuitive for all users. The study applies the Theory of Inventive Problem Solving (TRIZ), ergonomic principles, and universal design to develop the foot-operated mechanism, while using Importance–Performance Analysis (IPA) and the Kano model to evaluate user satisfaction and identify design improvements. The foot-operated mechanism developed in this study features internal and external pedals for seamless door operation, a secure locking system, and color-coded indicators for clear occupancy status communication, ensuring both ease of use and privacy. The design significantly enhances hygiene by minimizing manual contact and improves user convenience, as confirmed through the IPA-Kano analysis. This mechanism not only provides a practical and effective solution to contamination risks but also demonstrates versatility, making it suitable for various public spaces and accessible to a wide range of users. This study represents a significant contribution to public infrastructure by providing a safer, more hygienic, and sustainable solution for door operation in public spaces. Full article
(This article belongs to the Section Sustainable Engineering and Science)
Show Figures

Figure 1

15 pages, 585 KiB  
Article
Perceptions and Expectations of Patients with Lung Cancer and Melanoma about the Telenursing Approach: A Phenomenological Study
by Aurora De Leo, Sara Dionisi, Alessandro Spano, Laura Iacorossi, Gloria Liquori, Noemi Giannetta, Emanuele Di Simone, Paola Presta, Fabrizio Petrone, Marco Di Muzio and Nicolò Panattoni
Nurs. Rep. 2024, 14(4), 2680-2694; https://doi.org/10.3390/nursrep14040198 - 27 Sep 2024
Viewed by 198
Abstract
Background: Telenursing could improve continuity of care in patients with cancer. This study aims to explore the expectations and perceptions of patients with lung cancer and melanoma toward telenursing. Methods: A descriptive qualitative study using a phenomenological approach was conducted on a convenience [...] Read more.
Background: Telenursing could improve continuity of care in patients with cancer. This study aims to explore the expectations and perceptions of patients with lung cancer and melanoma toward telenursing. Methods: A descriptive qualitative study using a phenomenological approach was conducted on a convenience sampling of twenty patients aged 18 years or over from a Cancer Center. With the consent of patients and the relevant Ethics Committee, in-depth open-ended face-to-face interviews were conducted until data saturation. The phenomenon’s essence was achieved through themes emerging from the qualitative data analysis. Results: Patients’ perceptions and expectations were related to areas explored by a general theme on the nurse–patient relationship’s importance. Four themes and eleven sub-themes were focused on misconceptions about lack of use, patients’ potential and fears, the home as a place of care, and the caring relationship. Fifteen patients perceived the internet as a chaotic “bubble”. Conclusions: Despite the lack of previous use, patients consider telenursing positively as “a bridge between home and care”, especially in the advanced stages of the disease. They highlighted strengths and weaknesses of telenursing, such as having “someone for you”, connection, fear of psychological addiction, loss of privacy, and lack of empathy. This study was not registered. Full article
Show Figures

Figure 1

23 pages, 4792 KiB  
Article
BACH: A Tool for Analyzing Blockchain Transactions Using Address Clustering Heuristics
by Michele Caringella, Francesco Violante, Francesco De Lucci, Stefano Galantucci and Matteo Costantini
Information 2024, 15(10), 589; https://doi.org/10.3390/info15100589 - 26 Sep 2024
Viewed by 242
Abstract
Cryptocurrencies have now become an emerging blockchain-based payment technology; among them, bitcoin is the best known and most widely used. Users on these networks are pseudo-anonymous, meaning that while all transactions from an address are transparent and searchable by anyone, the users’ true [...] Read more.
Cryptocurrencies have now become an emerging blockchain-based payment technology; among them, bitcoin is the best known and most widely used. Users on these networks are pseudo-anonymous, meaning that while all transactions from an address are transparent and searchable by anyone, the users’ true identities are not directly revealed; to preserve their privacy, users often use many different addresses. In recent years, some studies have been conducted regarding analyzing clusters of bitcoin addresses that, according to certain heuristics, belong to the same entity. This capability provides law enforcement with valuable information for investigating illegal activities involving cryptocurrencies. Clustering methods that rely on a single heuristic often fail to accurately and comprehensively cluster multiple addresses. This paper proposes Bitcoin Address Clustering based on multiple Heuristics (BACH): a tool that uses three different clustering heuristics to identify clusters of bitcoin addresses, which are displayed through a three-dimensional graph. The results lead to several analyses, including a comparative evaluation of WalletExplorer, which is a similar address clustering tool. BACH introduces the innovative feature of visualizing the internal structure of clusters in a graphical format. The study also shows how the combined use of different heuristics provides better results and more complete clusters than those obtained from their individual use. Full article
26 pages, 401 KiB  
Review
A Qualitative Survey on Community Detection Attack Algorithms
by Leyla Tekin and Belgin Ergenç Bostanoğlu
Symmetry 2024, 16(10), 1272; https://doi.org/10.3390/sym16101272 - 26 Sep 2024
Viewed by 177
Abstract
Community detection enables the discovery of more connected segments of complex networks. This capability is essential for effective network analysis. But, it raises a growing concern about the disclosure of user privacy since sensitive information may be over-mined by community detection algorithms. To [...] Read more.
Community detection enables the discovery of more connected segments of complex networks. This capability is essential for effective network analysis. But, it raises a growing concern about the disclosure of user privacy since sensitive information may be over-mined by community detection algorithms. To address this issue, the problem of community detection attacks has emerged to subtly perturb the network structure so that the performance of community detection algorithms deteriorates. Three scales of this problem have been identified in the literature to achieve different levels of concealment, such as target node, target community, or global attack. A broad range of community detection attack algorithms has been proposed, utilizing various approaches to tackle the distinct requirements associated with each attack scale. However, existing surveys of the field usually concentrate on studies focusing on target community attacks. To be self-contained, this survey starts with an overview of community detection algorithms used on the other side, along with the performance measures employed to evaluate the effectiveness of the community detection attacks. The core of the survey is a systematic analysis of the algorithms proposed across all three scales of community detection attacks to provide a comprehensive overview. The survey wraps up with a detailed discussion related to the research opportunities of the field. Overall, the main objective of the survey is to provide a starting and diving point for scientists. Full article
(This article belongs to the Section Computer)
23 pages, 2853 KiB  
Article
Unraveling the Influential Mechanisms of Smart Interactions on Stickiness Intention: A Privacy Calculus Perspective
by Jinyi He, Xinjian Liang and Jiaolong Xue
J. Theor. Appl. Electron. Commer. Res. 2024, 19(4), 2582-2604; https://doi.org/10.3390/jtaer19040124 - 26 Sep 2024
Viewed by 252
Abstract
Artificial intelligence (AI) technologies are changing the ways of interaction between humans and machines, and smart interactions have become one of the hot topics of artificial intelligent in-home voice assistants (AVAs) by connecting humans, machines, content, and AVAs. Based on the privacy calculus [...] Read more.
Artificial intelligence (AI) technologies are changing the ways of interaction between humans and machines, and smart interactions have become one of the hot topics of artificial intelligent in-home voice assistants (AVAs) by connecting humans, machines, content, and AVAs. Based on the privacy calculus theory (PCT), the authors conducted an online questionnaire-based survey to investigate the influential mechanisms of smart interactions on stickiness intention (SI), demonstrated the positive (negative) effects of smart interactions on benefits and risks, and verified the moderating role of susceptibility to normative influence (SNI). The results show that smart interactions positively impact SI via utilitarian benefit and hedonic benefit; humanness has a U-shaped effect on privacy risk; personalization, connectivity, and linkage positively impact privacy risk; multimodal control negatively impacts privacy risk; and SNI positively moderates the effects of smart interactions on stickiness intention. The study enriched and expanded the literature on smart interactions in the context of AIoT and offered practical implications for AVA service providers and developers to design or optimize smart interactions for AI interactive services. By examining the double-edged sword effects of personalization and humanness, our findings offer novel insights into the privacy calculus in smart interactions. Full article
(This article belongs to the Topic Interactive Marketing in the Digital Era)
Show Figures

Figure 1

15 pages, 5543 KiB  
Article
Reflective Adversarial Attacks against Pedestrian Detection Systems for Vehicles at Night
by Yuanwan Chen, Yalun Wu, Xiaoshu Cui, Qiong Li, Jiqiang Liu and Wenjia Niu
Symmetry 2024, 16(10), 1262; https://doi.org/10.3390/sym16101262 - 25 Sep 2024
Viewed by 247
Abstract
The advancements in deep learning have significantly enhanced the accuracy and robustness of pedestrian detection. However, recent studies reveal that adversarial attacks can exploit the vulnerabilities of deep learning models to mislead detection systems. These attacks are effective not only in digital environments [...] Read more.
The advancements in deep learning have significantly enhanced the accuracy and robustness of pedestrian detection. However, recent studies reveal that adversarial attacks can exploit the vulnerabilities of deep learning models to mislead detection systems. These attacks are effective not only in digital environments but also pose significant threats to the reliability of pedestrian detection systems in the physical world. Existing adversarial attacks targeting pedestrian detection primarily focus on daytime scenarios and are easily noticeable by road observers. In this paper, we propose a novel adversarial attack method against vehicle–pedestrian detection systems at night. Our approach utilizes reflective optical materials that can effectively reflect light back to its source. We optimize the placement of these reflective patches using the particle swarm optimization (PSO) algorithm and deploy patches that blend with the color of pedestrian clothing in real-world scenarios. These patches remain inconspicuous during the day or under low-light conditions, but at night, the reflected light from vehicle headlights effectively disrupts the vehicle’s pedestrian detection systems. Considering that real-world detection models are often black-box systems, we propose a “symmetry” strategy, which involves using the behavior of an alternative model to simulate the response of the target model to adversarial patches. We generate adversarial examples using YOLOv5 and apply our attack to various types of pedestrian detection models. Experiments demonstrate that our approach is both effective and broadly applicable. Full article
(This article belongs to the Special Issue Advanced Studies of Symmetry/Asymmetry in Cybersecurity)
Show Figures

Figure 1

26 pages, 8051 KiB  
Article
Artificial Intelligence for the Evaluation of Postures Using Radar Technology: A Case Study
by Davide De Vittorio, Antonio Barili, Giovanni Danese and Elisa Marenzi
Sensors 2024, 24(19), 6208; https://doi.org/10.3390/s24196208 - 25 Sep 2024
Viewed by 388
Abstract
In the last few decades, major progress has been made in the medical field; in particular, new treatments and advanced health technologies allow for considerable improvements in life expectancy and, more broadly, in quality of life. As a consequence, the number of elderly [...] Read more.
In the last few decades, major progress has been made in the medical field; in particular, new treatments and advanced health technologies allow for considerable improvements in life expectancy and, more broadly, in quality of life. As a consequence, the number of elderly people is expected to increase in the following years. This trend, along with the need to improve the independence of frail people, has led to the development of unobtrusive solutions to monitor daily activities and provide feedback in case of risky situations and falls. Monitoring devices based on radar sensors represent a possible approach to tackle postural analysis while preserving the person’s privacy and are especially useful in domestic environments. This work presents an innovative solution that combines millimeter-wave radar technology with artificial intelligence (AI) to detect different types of postures: a series of algorithms and neural network methodologies are evaluated using experimental acquisitions with healthy subjects. All methods produce very good results according to the main parameters evaluating performance; the long short-term memory (LSTM) and GRU show the most consistent results while, at the same time, maintaining reduced computational complexity, thus providing a very good candidate to be implemented in a dedicated embedded system designed to monitor postures. Full article
(This article belongs to the Section Radar Sensors)
Show Figures

Figure 1

17 pages, 803 KiB  
Article
Effective Route Recommendation Leveraging Differentially Private Location Data
by Jongwook Kim
Mathematics 2024, 12(19), 2977; https://doi.org/10.3390/math12192977 - 25 Sep 2024
Viewed by 301
Abstract
The proliferation of GPS-enabled devices and advances in positioning technologies have greatly facilitated the collection of user location data, making them valuable across various domains. One of the most common and practical uses of these location datasets is to recommend the most probable [...] Read more.
The proliferation of GPS-enabled devices and advances in positioning technologies have greatly facilitated the collection of user location data, making them valuable across various domains. One of the most common and practical uses of these location datasets is to recommend the most probable route between two locations to users. Traditional algorithms for route recommendation rely on true trajectory data collected from users, which raises significant privacy concerns due to the personal information often contained in location data. Therefore, in this paper, we propose a novel framework for computing optimal routes using location data collected through differential privacy (DP)-based privacy-preserving methods. The proposed framework introduces a method for accurately extracting transitional probabilities from perturbed trajectory datasets, addressing the challenge of low data utility caused by DP-based methods. Specifically, to effectively compute transitional probabilities, we present a density-adjusted sampling method that enables the collection of representative data across all areas. In addition, we introduce an effective scheme to approximately estimate transitional probabilities based on sampled datasets. Experimental results on real-world data demonstrate the practical applicability and effectiveness of our framework in computing optimal routes while preserving user privacy. Full article
Show Figures

Figure 1

24 pages, 6880 KiB  
Article
Privacy-Preserving Transfer Learning Framework for Kidney Disease Detection
by Yavuz Canbay, Seyda Adsiz and Pelin Canbay
Appl. Sci. 2024, 14(19), 8629; https://doi.org/10.3390/app14198629 - 25 Sep 2024
Viewed by 445
Abstract
This paper introduces a new privacy-preserving transfer learning framework for the classification of kidney diseases. In the proposed framework, transfer learning is employed for feature extraction, and differential privacy is used to obtain noisy gradients. A variety of CNN architectures, including Xception, ResNet50, [...] Read more.
This paper introduces a new privacy-preserving transfer learning framework for the classification of kidney diseases. In the proposed framework, transfer learning is employed for feature extraction, and differential privacy is used to obtain noisy gradients. A variety of CNN architectures, including Xception, ResNet50, InceptionResNetV2, MobileNet, DenseNet201, InceptionV3, and VGG19 are utilized to evaluate the proposed framework. Analysis of a large dataset of 12,400 labeled kidney CT images shows that transfer learning architectures based on the proposed framework achieve excellent accuracy ratios in privacy-preserving classification. These results demonstrate the effectiveness of the proposed framework in enabling transfer learning models to classify kidney diseases while ensuring privacy. The MobileNet architecture stands out for its exceptional performance, with an impressive accuracy of 99.83% in privacy-preserving classification. Considering the findings of this study, it is evident that the proposed framework is appropriate for the early and private diagnosis of kidney diseases and promotes the achievement of promising results in this field. Full article
(This article belongs to the Section Computing and Artificial Intelligence)
Show Figures

Figure 1

20 pages, 3692 KiB  
Article
A Privacy-Preserving and Quality-Aware User Selection Scheme for IoT
by Bing Han, Qiang Fu, Hongyu Su, Cheng Chi, Chuan Zhang and Jing Wang
Mathematics 2024, 12(19), 2961; https://doi.org/10.3390/math12192961 - 24 Sep 2024
Viewed by 365
Abstract
In the Internet of Things (IoT), the selection of mobile users with IoT-enabled devices plays a crucial role in ensuring the efficiency and accuracy of data collection. The reputation of these mobile users is a key indicator in selecting high-quality participants, as it [...] Read more.
In the Internet of Things (IoT), the selection of mobile users with IoT-enabled devices plays a crucial role in ensuring the efficiency and accuracy of data collection. The reputation of these mobile users is a key indicator in selecting high-quality participants, as it directly reflects the reliability of the data they submit and their past performance. However, existing approaches often rely on a trusted centralized server, which can lead to single points of failure and increased vulnerability to attacks. Additionally, they may not adequately address the potential manipulation of reputation scores by malicious entities, leading to unreliable and potentially compromised user selection. To address these challenges, we propose PRUS, a privacy-preserving and quality-aware user selection scheme for IoT. By leveraging the decentralized and immutable nature of the blockchain, PRUS enhances the reliability of the user selection process. The scheme utilizes a public-key cryptosystem with distributed decryption to protect the privacy of users’ data and reputation, while truth discovery techniques are employed to ensure the accuracy of the collected data. Furthermore, a privacy-preserving verification algorithm using reputation commitment is developed to safeguard against the malicious tampering of reputation scores. Finally, the Dirichlet distribution is used to predict future reputation values, further improving the robustness of the selection process. Security analysis demonstrates that PRUS effectively protects user privacy, and experimental results indicate that the scheme offers significant advantages in terms of communication and computational efficiency. Full article
Show Figures

Figure 1

14 pages, 377 KiB  
Article
Anonymous Access System with Limited Number of Uses in a Trustless Environment
by Francesc Garcia-Grau, Jordi Herrera-Joancomartí and Aleix Dorca Josa
Appl. Sci. 2024, 14(19), 8581; https://doi.org/10.3390/app14198581 - 24 Sep 2024
Viewed by 327
Abstract
This article proposes a novel method for managing usage counters within an anonymous credential system, addressing the limitation of traditional anonymous credentials in tracking repeated use. The method takes advantage of blockchain technology through Smart Contracts deployed on the Ethereum network to enforce [...] Read more.
This article proposes a novel method for managing usage counters within an anonymous credential system, addressing the limitation of traditional anonymous credentials in tracking repeated use. The method takes advantage of blockchain technology through Smart Contracts deployed on the Ethereum network to enforce a predetermined maximum number of uses for a given credential. Users retain control over increments by providing zero-knowledge proofs (ZKPs) demonstrating private key possession and agreement on the increment value. This approach prevents replay attacks and ensures transparency and security. A prototype implementation on a private Ethereum blockchain demonstrates the feasibility and efficiency of the proposed method, paving the way for its potential deployment in real-world applications requiring both anonymity and usage tracking. Full article
(This article belongs to the Collection Innovation in Information Security)
Show Figures

Figure 1

14 pages, 2416 KiB  
Article
Extended Reality Educational System with Virtual Teacher Interaction for Enhanced Learning
by Fotis Liarokapis, Vaclav Milata and Filip Skola
Multimodal Technol. Interact. 2024, 8(9), 83; https://doi.org/10.3390/mti8090083 - 23 Sep 2024
Viewed by 510
Abstract
Advancements in technology that can reshape educational paradigms, with Extended Reality (XR) have a pivotal role. This paper introduces an interactive XR intelligent assistant featuring a virtual teacher that interacts dynamically with PowerPoint presentations using OpenAI’s ChatGPT API. The system incorporates Azure Cognitive [...] Read more.
Advancements in technology that can reshape educational paradigms, with Extended Reality (XR) have a pivotal role. This paper introduces an interactive XR intelligent assistant featuring a virtual teacher that interacts dynamically with PowerPoint presentations using OpenAI’s ChatGPT API. The system incorporates Azure Cognitive Services for multilingual speech-to-text and text-to-speech capabilities, custom lip-syncing solutions, eye gaze, head rotation and gestures. Additionally, panoramic images can be used as a sky box giving the illusion that the AI assistant is located at another location. Findings from three pilots indicate that the proposed technology has a lot of potential to be used as an additional tool for enhancing the learning process. However, special care must be taken into privacy and ethical issues. Full article
Show Figures

Figure 1

24 pages, 6162 KiB  
Article
Location Privacy Protection for the Internet of Things with Edge Computing Based on Clustering K-Anonymity
by Nanlan Jiang, Yinan Zhai, Yujun Wang, Xuesong Yin, Sai Yang and Pingping Xu
Sensors 2024, 24(18), 6153; https://doi.org/10.3390/s24186153 - 23 Sep 2024
Viewed by 308
Abstract
With the development of the Internet of Things (IoT) and edge computing, more and more devices, such as sensor nodes and intelligent automated guided vehicles (AGVs), can serve as edge devices to provide Location-Based Services (LBS) through the IoT. As the number of [...] Read more.
With the development of the Internet of Things (IoT) and edge computing, more and more devices, such as sensor nodes and intelligent automated guided vehicles (AGVs), can serve as edge devices to provide Location-Based Services (LBS) through the IoT. As the number of applications increases, there is an abundance of sensitive information in the communication process, pushing the focus of privacy protection towards the communication process and edge devices. The challenge lies in the fact that most traditional location privacy protection algorithms are not suited for the IoT with edge computing, as they primarily focus on the security of remote servers. To enhance the capability of location privacy protection, this paper proposes a novel K-anonymity algorithm based on clustering. This novel algorithm incorporates a scheme that flexibly combines real and virtual locations based on the requirements of applications. Simulation results demonstrate that the proposed algorithm significantly improves location privacy protection for the IoT with edge computing. When compared to traditional K-anonymity algorithms, the proposed algorithm further enhances the security of location privacy by expanding the potential region in which the real node may be located, thereby limiting the effectiveness of “narrow-region” attacks. Full article
(This article belongs to the Special Issue Advanced Mobile Edge Computing in 5G Networks)
Show Figures

Figure 1

Back to TopTop