2013
DOI: 10.1007/s12652-013-0177-8
|View full text |Cite
|
Sign up to set email alerts
|

Security issues on IT systems during disasters: a survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
8
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 16 publications
(8 citation statements)
references
References 74 publications
0
8
0
Order By: Relevance
“…In addition, the work in [4] evaluates the potentiality of BGP-compliant recovery schemes exploiting route diversity in order to recover from large-scale Internet failures. A survey on the security issues related to disasters, with emphasis on maintaining network access, is presented in [5]. From a more theoretical point of view, the contribution presented in [6] studied the stability of the Internet, as a scale free network with respect to crashes, such as random removal of sites, according to a percolation theory-driven approach.…”
Section: Related Workmentioning
confidence: 99%
“…In addition, the work in [4] evaluates the potentiality of BGP-compliant recovery schemes exploiting route diversity in order to recover from large-scale Internet failures. A survey on the security issues related to disasters, with emphasis on maintaining network access, is presented in [5]. From a more theoretical point of view, the contribution presented in [6] studied the stability of the Internet, as a scale free network with respect to crashes, such as random removal of sites, according to a percolation theory-driven approach.…”
Section: Related Workmentioning
confidence: 99%
“…Emergency broadcasting message can be transported by varies of ways, such as mobile network [1,2], Internet network [3], FM network [4], digital TV network [5] and so on. In the article, we pay our focus on researching emergency transportation scheme for rural areas in China.…”
Section: Introductionmentioning
confidence: 99%
“…As many of these organisations depend on broad and heterogeneous communication networks, the possibilities for the exfiltration of sensitive private information are numerous and the detection of such threats presents many challenges. For instance, as organisations are beginning to store enormous amounts of data in the ''cloud'', they must ensure that the information in the cloud is protected from unauthorised disclosure (Kiyomoto et al 2014). In order to maintain confidentiality, organisations ought to use detection and prevention mechanisms to protect their data and secrets from any sort of attack or leakage.…”
Section: Introductionmentioning
confidence: 99%