Page 112 - Read Online
P. 112

Chen. J Surveill Secur Saf 2020;1:102-5  I  http://dx.doi.org/10.20517/jsss.2020.26                                                               Page 105

               Availability of data and materials
               Not applicable.


               Financial support and sponsorship
               The author has not declared a specific grant for this editorial from any funding agency in the public,
               commercial, or not-for-profit sectors.

               Conflicts of interest
               The author declared that there are no conflicts of interest.


               Ethical approval and consent to participate
               Not applicable.

               Consent for publication
               Not applicable.


               Copyright
               © The Author(s) 2020.


               REFERENCES
               1.   Shmidt B, Labib A, Hadleigh-Dunn S. Learning and unlearning from disasters: an analysis of the Virginia Tech, USA shooting and the
                   Lion Air 610 Airline crash. J Surveill Secur Saf 2020;1:1-15.
               2.   Xu Z, Cheng C, Sugumaran V. Big data analytics of crime prevention and control based on image processing upon cloud computing. J
                   Surveill Secur Saf 2020;1:16-33.
               3.   Kim TH, Reeves D. A survey of domain name system vulnerabilities and attacks. J Surveill Secur Saf 2020;1:34-60.
               4.   Jiang LH, Wang C, Shen J. Stereo storage structure assisted one-way anonymous auditing protocol in e-health system. J Surveill Secur
                   Saf 2020;1:61-78.
               5.   Salmani K, Barker K. Leakless privacy-preserving multi-keyword ranked search over encrypted cloud data. J Surveill Secur Saf
                   2020;1:79-101.
   107   108   109   110   111   112   113   114   115   116   117