2018
DOI: 10.1007/978-3-030-01150-5_4
|View full text |Cite
|
Sign up to set email alerts
|

Connecting Human to Cyber-World: Security and Privacy Issues in Mobile Crowdsourcing Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 76 publications
0
4
0
Order By: Relevance
“…For example, On 3rd October 2017, Yahoo revealed that in August 2013, the data breach of Yahoo had affected over 3 billion user accounts [1]. Recent studies [2], [3] reveal that users PINs and passwords are stolen by hackers. To prevent data breaches from intruders, digital resources (data, passwords, etc.)…”
Section: Introductionmentioning
confidence: 99%
“…For example, On 3rd October 2017, Yahoo revealed that in August 2013, the data breach of Yahoo had affected over 3 billion user accounts [1]. Recent studies [2], [3] reveal that users PINs and passwords are stolen by hackers. To prevent data breaches from intruders, digital resources (data, passwords, etc.)…”
Section: Introductionmentioning
confidence: 99%
“…Yang et al [12] explored a number of critical security and privacy issues that impede the application of the mobile crowdsourcing network (MCN). When participating in crowdsourcing, mobile users consume their own resources (e.g., battery, mobile data, and memory) and may suffer potential security and privacy threats, which, in turn, affect the quality of relationship between actors.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In their work, Yang et al [12] also examined the service provider. In their definition, the service provider is a "crowdsourcing platform that provides crowdsourcing services to both end users and public crowds" and end users in turn are "customers who purchase or rent crowdsourcing services at certain costs."…”
Section: Literature Reviewmentioning
confidence: 99%
“…Li et al [67] proposed an scheme to distinguish DDoS and FEs by amalgamation of total deviation and coefficient of correlation . In current generation of heterogeneous and dynamic networks like mobile crowd-sourcing network the issue of privacy preservation and DDoS attack is more severe [106]. there are few researchers who have also proposed solution for DDoS attack management which can utilized to protect webservers from DDos attack.…”
Section: Correlation Coefficient Based Techniquesmentioning
confidence: 99%