This paper investigates the information freshness of two time division multiple access (TDMA) systems: round-based TDMA and user-based TDMA. The age of information (AoI) metric is used to represent the freshness of in...
详细信息
Due to the complexity of blockchain technology,it usually costs too much effort to build,maintain and monitor a blockchain system that supports a targeted *** this end,the emerging“Blockchain as a Service”(BaaS)make...
详细信息
Due to the complexity of blockchain technology,it usually costs too much effort to build,maintain and monitor a blockchain system that supports a targeted *** this end,the emerging“Blockchain as a Service”(BaaS)makes the blockchain and distributed ledgers more accessible,particularly for businesses,by reducing costs and *** combines the high computing power of cloud computing,the pervasiveness of IoT and the decentralization of blockchain,allowing people to build their own applications while ensuring the transparency and openness of the *** paper surveys the research outputs of both academia and ***,it introduces the representative architectures of BaaS systems and then summarizes the research contributions of BaaS from the technologies for service provision,roles,container and virtualization,interfaces,customization and *** typical applications of BaaS in both academic and practical domains are also *** present,the research on the blockchain is abundant,but research on BaaS is still in its *** challenges of BaaS are concluded in this paper for further study directions.
The general increase in data size and data sharing motivates the adoption of Big Data strategies in several scientific disciplines. However, while several options are available, no particular guidelines exist for sele...
详细信息
Small, medium, and micro enterprises (SMMEs) are obliged to adopt digital technologies to render services to their clients and remain competitive. The COVID-19 global crisis has accelerated the cyberfication of system...
详细信息
ISBN:
(纸本)9781914587702
Small, medium, and micro enterprises (SMMEs) are obliged to adopt digital technologies to render services to their clients and remain competitive. The COVID-19 global crisis has accelerated the cyberfication of systems and services. The move to digital platforms has afforded SMMEs opportunities to offer their services to a broader geographical area. However, this has also presented opportunities for cybercriminals to invade the digital infrastructure. Adopting digital transformation has put SMMEs in a vulnerable position since they need to manage their cybersecurity while lacking the necessary skills and ICT infrastructure. The inability of SMMEs to defend themselves against cyberattacks compels them to outsource their security needs to external security service providers. These external security service providers offer security services based on a hierarchical operating model. Essential security services are offered at a lower level. If the paying clients require advanced security services, they may be provided as an add-on to the contractual agreement resulting in additional cost. This paper explores the active cyber defence (ACD) approach to enhance cybersecurity defence while minimising service costs. Therefore, the primary objective and outcome of this paper are to identify some of the essential drivers that will contribute towards developing the active cyber defence framework for SMMEs in developing countries. For purposes of clarity, essential drivers are the gaps highlighted during the literature review and will be referred to as "essential drivers" throughout the paper. The essential drivers, together with suggested recommendations, will be consolidated. The essential drivers were drawn from existing literature by going through peer-reviewed academic papers and company whitepapers. To achieve the primary objective, we need to establish whether SMMEs are utilising the services of external security service providers. The external security service providers wi
There are many privacy risks when location data is collected and aggregated. We introduce the notion of using confidential smart contracts for building location-based decentralized applications that are privacy preser...
详细信息
We study temporal analogues of the Unrestricted Vertex Separator problem from the static world. An (s, z)-temporal separator is a set of vertices whose removal disconnects vertex s from vertex z for every time step in...
详细信息
Visual odometry estimates a robot's pose by analysing images it captured and is integral to autonomous navigation. However, when devices operate outdoors, the large changes in brightness may cause localisation fai...
详细信息
Blockchain is a developing and promising field in transaction and identity management. Recent efforts have been underway to address issues of data insecurity and inefficiency presented by centralized systems. Philippi...
详细信息
Federated Learning (FL) enables multiple clients to collaboratively train models without exposing their local data. FL is an effective approach to utilizing localized data while preserving clients' data privacy, b...
详细信息
We present a novel outlier detector for visual odometry algorithms operating in dynamic vegetated environments. The outlier detector utilises the difference in optical flow patterns caused by camera motion and plants ...
详细信息
暂无评论