2017
DOI: 10.22215/timreview/1107
|View full text |Cite
|
Sign up to set email alerts
|

Untitled

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0
1

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 21 publications
0
3
0
1
Order By: Relevance
“…Exposing their IP addresses allows storage provider nodes to be hacked [99]. The bridge is designed only to store metadata and is thus a central point of failure for Storj [100]. Decentralized storage models work off the premise that not everyone will be able to utilize the storage that their devices have on them.…”
Section: ) Potential Vulnerabilities Of Storjmentioning
confidence: 99%
“…Exposing their IP addresses allows storage provider nodes to be hacked [99]. The bridge is designed only to store metadata and is thus a central point of failure for Storj [100]. Decentralized storage models work off the premise that not everyone will be able to utilize the storage that their devices have on them.…”
Section: ) Potential Vulnerabilities Of Storjmentioning
confidence: 99%
“…Dentacoin, insanlara diş hijyenlerine iyi bakmaları için akif bir destek platformu planlamakadır (Ostapenko, 2018). Platform hem hastaları hem de diş hekimlerini iş birliği yapmaya ve güvene dayalı bir topluluk oluşturmaya yardımcı olmaya teşvik etmek için blok zincir tabanlı merkezi olmayan uygulama geliştirmiş (Engelhardt, 2017).…”
Section: Dentacoinunclassified
“…Although some authors consider cyber resilience a part of cybersecurity that is concerned with response [22], [35], [36], other authors consider cyber resilience a more holistic concept that includes the whole lifecycle ( Figure 1) and that includes strategic and human processes into cybersecurity [20], [23], [27], [28]. This ambiguity of the cyber resilience concept may be due to the continuously changing cybersecurity concept throughout the past few decades [30], [35], [37]. However, there are clear differences between the cybersecurity and cyber resilience concepts.…”
Section: State Of the Artmentioning
confidence: 99%