2017
DOI: 10.1504/ijitst.2017.10012593
|View full text |Cite
|
Sign up to set email alerts
|

Incorporating privacy and security in military application based on opportunistic sensor network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…ONs apply to many real-life scenarios such as wildlife tracking [ 1 ], sensor networks [ 5 ], military networks [ 6 ], intermittent Internet connectivity [ 7 ], crowd management [ 8 ], emergency crises [ 9 ], etc.…”
Section: Background and Related Workmentioning
confidence: 99%
“…ONs apply to many real-life scenarios such as wildlife tracking [ 1 ], sensor networks [ 5 ], military networks [ 6 ], intermittent Internet connectivity [ 7 ], crowd management [ 8 ], emergency crises [ 9 ], etc.…”
Section: Background and Related Workmentioning
confidence: 99%
“…Usually, the data interchange does not just proceed within the internal system but also spans across company boundaries. In addition to that, the nature of industrial data is security-critical and privacy-sensitive, which makes it attractive for cyber-attacks that could cause physical damages and threaten human life (Arafath et al, 2017;Sadeghi et al, 2015).…”
Section: Security-and Privacy-related Requirementsmentioning
confidence: 99%