networking security
Recently Published Documents


TOTAL DOCUMENTS

56
(FIVE YEARS 9)

H-INDEX

8
(FIVE YEARS 1)

2022 ◽  
Vol 124 ◽  
pp. 102696
Author(s):  
Mena Safwat ◽  
Ali Elgammal ◽  
Eslam G. AbdAllah ◽  
Marianne A. Azer

2021 ◽  
Author(s):  
Safar M. Maghdid ◽  
halgurd maghdid

<p>The number of connected mobile devices and Internet of Things (IoT) is growing around us, rapidly. Since, most of the people daily activities are relying on these connected things or devices. Specifically, this past year (with COVID-19) changed daily life in abroad and this is increased the use of IoT enabled technologies in health sector, work, and play. Further, the most common service via using these technologies is the localization/positioning service for different applications including: geo-tagging, billing, contact tracing, health-care system, point-of-interest recommendations, social networking, security, and more. Despite the availability of a large number of localization solutions in the literature, the precision of localization cannot meet the needs of consumers. For that reason, this paper provides an in-depth investigation of the existing technologies and techniques in the localization field, within the IoT era. Furthermore, the benefits and drawbacks of each technique with enabled technologies are illustrated and a comparison between the utilized technologies in the localization is made. The paper as a guideline is also going through all of the metrics that may be used to assess the localization solutions. Finally, the state-of-the-art solutions are examined, with challenges and perspectives regarding indoors/outdoors environments are demonstrated.</p>


2021 ◽  
Author(s):  
Safar M. Maghdid ◽  
halgurd maghdid

<p>The number of connected mobile devices and Internet of Things (IoT) is growing around us, rapidly. Since, most of the people daily activities are relying on these connected things or devices. Specifically, this past year (with COVID-19) changed daily life in abroad and this is increased the use of IoT enabled technologies in health sector, work, and play. Further, the most common service via using these technologies is the localization/positioning service for different applications including: geo-tagging, billing, contact tracing, health-care system, point-of-interest recommendations, social networking, security, and more. Despite the availability of a large number of localization solutions in the literature, the precision of localization cannot meet the needs of consumers. For that reason, this paper provides an in-depth investigation of the existing technologies and techniques in the localization field, within the IoT era. Furthermore, the benefits and drawbacks of each technique with enabled technologies are illustrated and a comparison between the utilized technologies in the localization is made. The paper as a guideline is also going through all of the metrics that may be used to assess the localization solutions. Finally, the state-of-the-art solutions are examined, with challenges and perspectives regarding indoors/outdoors environments are demonstrated.</p>


Author(s):  
Abdallah Mustafa Abdelrahman ◽  
Joel J. P. C. Rodrigues ◽  
Mukhtar M. E. Mahmoud ◽  
Kashif Saleem ◽  
Ashok Kumar Das ◽  
...  

Author(s):  
George-Daniel DUMITRU

Information protection is very essential these days to anyone using a pc or to any company that employs computers and networking in their day to day operations. That is almost everyone. Information protection need to be at the forefront of everyone’s thinking in view that so a lot of our personal information is out there on the Internet. On this paper, the thinking of protection and privateness in social media, or social networking can be mentioned. First, a short history and the notion of social networking will be introduced. Many of the safety dangers related with the use of social media are presented. Also, the trouble of privateness and how it relates to security are described.


2018 ◽  
Vol 56 (11) ◽  
pp. 60-61 ◽  
Author(s):  
Xiaoming Fu ◽  
Dirk Kutscher ◽  
Satyajayant Misra ◽  
Ruidong Li

Sign in / Sign up

Export Citation Format

Share Document