Vehicle Routing Optimization for Humanitarian Logistics in Disaster Recovery: A Survey

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:International Conference on Security & Management (18. : 2019 : Las Vegas, Nev.) SAM'19
1. Verfasser: Annuar, Wadi Khalid (VerfasserIn)
Weitere Verfasser: Moll, Maximilian (VerfasserIn), Lee, Lai Soon (VerfasserIn), Pickl, Stefan (VerfasserIn), Seow, Hsin Vonn (VerfasserIn)
Pages:19
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2019
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
A Study of Anti-Phising Methodologies and Phishing Detection Algorithms 2019 Cerda, Beatrice M.
Semantic Knowledge Architecture for Cyber Security 2019 Sayan, Carla
Cross-Platform Malware: Study of the Forthcoming Hazard Adaptation and Behavior 2019 Zahran, Bassam
Toward a Quantum Resistant SecretMatch Privacy Enhanced Technology - A Case Study 2019 Horne, Dwight
Chaining JSON Blocks for Secure Transmission of Mobile Data Sequences 2019 Yoon, John
Blockchain based IoT node Authentication in WSNs 2019 Hong, Sunghyuck
An Efficient Private Matching and Set Intersection Protocol: Implementation PM-Malicious Server 2019 Saldamli, Gokay
Smart Voting Keys to e-Democracy 2019 Wolfe, Andrew
Survey on Shilling Attacks and their Detection Algorithms in Recommender Systems 2019 Badran, Miriam El Khoury
Feature-level Data Fusion for Bio-metric Mobile Applications. A case study 2019 Soviany, Sorin
Mobile App-Browser Extension Based Authentication 2019 Desai, Ritwik
Formalization of Security Requirements and Attack Models for Cryptographic Hash Functions in ProVerif 2019 Yoshimura, Togo
Towards a Method for Examining the Effects of Cognitive Load on the Performance of Cyber First Responders 2019 Speelman, Craig
Security Lessons from Building a Back-End Service for Data Collection 2019 Lui, Halmon
That's how I feel: A Study of User's Security Mental Model 2019 Albalawi, Tahani
Impact of Cyber Security Mechanisms on Employees' Behavior 2019 Hausawi, Yasser
Out-of-Band Authentication Using 2-Factor Image Matching 2019 Lu, H. Karen
Component Selection Process in Assembling Cyberattack Simulation Models 2019 Mayfield, Katia
A Survey of Layered Approach to Threats and Countermeasures 2019 Bujud, Dina S.
Attribute Stream-Based Access Control (ASBAC) - Functional Architecture and Patterns 2019 Heutelbeck, Dominic
Alle Artikel auflisten