2019
DOI: 10.1016/j.jnca.2018.11.010
|View full text |Cite
|
Sign up to set email alerts
|

A review on security challenges of wireless communications in disaster emergency response and crisis management situations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
21
0
1

Year Published

2020
2020
2022
2022

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 44 publications
(31 citation statements)
references
References 5 publications
0
21
0
1
Order By: Relevance
“…Many of these have already created dedicated strategies and plans in this direction. For example, the UK has developed the Government Transformation Strategy 2017-2020 [ 101 ], which endeavors to give directions to a full scale governmental digital transformation. Similarly, other governments around the world are working diligently to change their strategic and operational dynamics and priorities to cope with the new digital era [ 102 ].…”
Section: Literature Reviewmentioning
confidence: 99%
“…Many of these have already created dedicated strategies and plans in this direction. For example, the UK has developed the Government Transformation Strategy 2017-2020 [ 101 ], which endeavors to give directions to a full scale governmental digital transformation. Similarly, other governments around the world are working diligently to change their strategic and operational dynamics and priorities to cope with the new digital era [ 102 ].…”
Section: Literature Reviewmentioning
confidence: 99%
“…It is worth noting that the presence of malicious nodes in emergency networks in a post-disaster period is not a rare event [35], [36] and counteracting them is particularly demanding. Among the broad spectrum of possible issues, Denial of Service (DoS) attacks are considered extremely dangerous, and their prevention is of pivotal importance.…”
Section: Information Delivery Schemes In Post-disaster Scenariosmentioning
confidence: 99%
“…Within the context of emergency networks, DoS attacks are considered extremely dangerous, since they are easy to implement and capable of severe damages to the network by making certain key nodes unavailable. Therefore, protection against them is of pivotal importance [36]. In this section, we provide an overview of the main solutions for DoS protection for gossiping.…”
Section: B Analysis Of State-of-the-art Literaturementioning
confidence: 99%
See 1 more Smart Citation
“…At this time, to improve the visual effect of the image, we will use image enhancement technology [9]. For example, we can highlight some characteristics of the target object in the image or extract the characteristic parameters of the target object, etc [10].…”
Section: Introductionmentioning
confidence: 99%