Information and communications technologies (ICT)-based wireless personal computing has created increasing interest in convergence technology-based personal services, in which personal equipment is combined with wireless network-based services. Smart services, in which convergence technology services and hybrid peer-to-peer, personal environment network technology plus wireless network information technology are combined, are future-oriented. With the emergence of the smart mobile age, personal users can enjoy a lifestyle that uses content, such as information recommendation and personal services, based on various applications in smart IoT devices. This special issue introduces selected research papers by the authors who submitted them. This issue includes trends in ICTbased wireless personal computing, including digital convergence, hybrid networking systems, big data mining, interactive mobile applications, cloud services, secure data transmission, P2P network architectures, hybrid wireless protocols, index structures, multichannel protocols, crowdsourcing, future communications systems, network architectures, personal computing, short URL generation, and multicasting communications.The paper by Jeong and Shin [1] proposes an efficient access reduction scheme for big data based on total probability theory. Big data collected from a wide variety of areas shows a little variation in information search processing time, depending on the type and size of data. This study is on the reduction approach of divide-and-conquer; that is, it distinguishes all the attributes of data so as to minimize the data to improve the efficiency of data access based on the probability values within the big data group. The paper by Jung et al. [2] presents efficient malicious packet capture through an advanced & SangYeob Oh
Recently, in terms of the use of Internet of Things (IoT) devices in the smart platform for security management, companies have been releasing diverse products, and such products are being proved as effective in the continuous management of computer virology. In addition, in the field of security services, companies and research institutes have been continuously developing solutions using hacking and convergence computing [10][11][12]. This issue covers some of the hottest topics in hacking and convergence computing, including: hacking in convergence computing; electronics hacking, hardware hacking; communication protocol hacking; information indexing, searching, and visualization; secure and anti-hacking; network connection solution; secure virtual network embedding algorithms; secure information authentication protocol; security framework; secure IoT and protocol; privacy and authentication for network; security in convergence computing; cybersecurity; innovative applications of hacking, security computing.The issues between the IoT and the traditional network was performed, and it was concluded that the environment of the IoT-convergence system is a dangerous one with limited resources and fewer network guards. The paper by Li et al.[2] analyzes a study on the service and the trend of fintech security that is based on text mining. This study presents the tasks and directions of the fintech industry in consideration of the successful operation of fintech security through an analysis of the news articles from an online-data collection. The results contributed to a switching of the market awareness of fintech services and security in the present-day ongoing expansion of the fintech market.The paper by Bang [3] introduces the research on financial-institution network-partition design for antihacking. The proposed solution comprises management efficiency, a data-system safety-operation solution, an optimized network-separation system that is developed through the integration of a conventional security system, and a new establishment and process in the financial field. This is a security measure that is supported by the appropriate security of the memory devices for which the minimally required security measure is applied. The paper by Kim et al. [4] presents an evaluation method for secure virtual-network embedding algorithms. This is the Virtual Network Embedding Evaluation Method (VNE-EM) that can be used for purposes such as security, energy efficiency, and mobility functionality. They analyzed a number of studies, and they found appropriate evaluation indexes that can be used in an evaluation of the functionalities of VNE (virtual network embedding) algorithms, for which a grouping of the functional attributes is performed for a real-time classification. The proposed method is more convenient for the performance of the evaluation of the algorithms of infrastructure providers.The paper by Jeong [5] presents a secure informationauthentication protocol that concerns the relationship 123
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2025 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.