Page 112 - Read Online
P. 112
Chen. J Surveill Secur Saf 2020;1:102-5 I http://dx.doi.org/10.20517/jsss.2020.26 Page 105
Availability of data and materials
Not applicable.
Financial support and sponsorship
The author has not declared a specific grant for this editorial from any funding agency in the public,
commercial, or not-for-profit sectors.
Conflicts of interest
The author declared that there are no conflicts of interest.
Ethical approval and consent to participate
Not applicable.
Consent for publication
Not applicable.
Copyright
© The Author(s) 2020.
REFERENCES
1. Shmidt B, Labib A, Hadleigh-Dunn S. Learning and unlearning from disasters: an analysis of the Virginia Tech, USA shooting and the
Lion Air 610 Airline crash. J Surveill Secur Saf 2020;1:1-15.
2. Xu Z, Cheng C, Sugumaran V. Big data analytics of crime prevention and control based on image processing upon cloud computing. J
Surveill Secur Saf 2020;1:16-33.
3. Kim TH, Reeves D. A survey of domain name system vulnerabilities and attacks. J Surveill Secur Saf 2020;1:34-60.
4. Jiang LH, Wang C, Shen J. Stereo storage structure assisted one-way anonymous auditing protocol in e-health system. J Surveill Secur
Saf 2020;1:61-78.
5. Salmani K, Barker K. Leakless privacy-preserving multi-keyword ranked search over encrypted cloud data. J Surveill Secur Saf
2020;1:79-101.