A novel risk assessment model for privacy security in internet of things
T Wu, G Zhao - Wuhan University Journal of Natural Sciences, 2014 - Springer
Aiming at the issues of privacy security in Internet of Things (IoT) applications, we propose
an effective risk assessment model to handle probabilistic causality of evaluation factors and …
an effective risk assessment model to handle probabilistic causality of evaluation factors and …
Exploration on human resource management and prediction model of data-driven information security in Internet of Things
X Niu - Heliyon, 2024 - cell.com
The advent of the Internet of Things (IoT) has accelerated the pace of economic
development across all sectors. However, it has also brought significant challenges to …
development across all sectors. However, it has also brought significant challenges to …
Aggregated risk modelling of personal data privacy in internet of things
Y Jinhong, KIM Chul-Soo… - 2019 21st International …, 2019 - ieeexplore.ieee.org
There is a growing interest in personal data mining and user profiling to improve the
surveillance practices for rapid analysis of underlying business patterns. User profiling from …
surveillance practices for rapid analysis of underlying business patterns. User profiling from …
TUI Model for data privacy assessment in IoT networks
S Rizvi, I Williams, S Campbell - Internet of Things, 2022 - Elsevier
The development of the Internet of Things (IoT) has been at the forefront of progressing
societal functionality. However, the addition of IoT devices in conventional information …
societal functionality. However, the addition of IoT devices in conventional information …
A security reputation model for IoT health data using S-AlexNet and dynamic game theory in cloud computing environment
F Kong, Y Zhou, B Xia, L Pan, L Zhu - IEEe Access, 2019 - ieeexplore.ieee.org
With the rapid development of cloud computing, users are exposed to increasingly serious
security threats such as data leakage and privacy exposure when using cloud platform …
security threats such as data leakage and privacy exposure when using cloud platform …
pISRA: privacy considered information security risk assessment model
The security threats related to personally identifiable information are increasing dramatically.
In addition to government agencies, large international companies are potential victims. To …
In addition to government agencies, large international companies are potential victims. To …
Cybersecurity model based on hardening for secure internet of things implementation
The inclusion of Internet of Things (IoT) for building smart cities, smart health, smart grids,
and other smart concepts has driven data-driven decision making by managers and …
and other smart concepts has driven data-driven decision making by managers and …
[Retracted] Legal Regulation of Artificial Intelligence and Digital Twin Decision‐Making Risks in Mobile Edge Computing
Z Wang - Wireless Communications and Mobile Computing, 2022 - Wiley Online Library
Information is the basis of decision security. In the era of big data, information is everywhere,
and risks are everywhere. Information leakage incidents are frequently exposed, bringing …
and risks are everywhere. Information leakage incidents are frequently exposed, bringing …
Computer network information system security prevention methods under the background of big data
Z Cai, C Li - Mathematical Problems in Engineering, 2022 - Wiley Online Library
With the rapid development of modern society, the administrative information content rapid
growth of e‐government information resource sharing becomes the key of the government …
growth of e‐government information resource sharing becomes the key of the government …
Research on IoT privacy security risks
W Xi, L Ling - 2016 International Conference on Industrial …, 2016 - ieeexplore.ieee.org
As IoT being gradually applied, people's life is becoming more and more convenient.
However, when people enjoy those convenience brought by the IoT, there also be some …
However, when people enjoy those convenience brought by the IoT, there also be some …