Results 31 to 40 of about 367,444 (216)

Privacy-Preserving Fog Aggregation of Smart Grid Data Using Dynamic Differentially-Private Data Perturbation

open access: yesIEEE Access, 2022
The edge of the smart grid has a massive number of power and resource-constrained interconnected devices. Mainly, smart meters report power consumption data from consumer homes, industrial buildings, and other connected infrastructures.
Fawaz Kserawi   +2 more
doaj   +1 more source

A novel and highly efficient botnet detection algorithm based on network traffic analysis of smart systems

open access: yesInternational Journal of Distributed Sensor Networks, 2022
In smart systems, attackers can use botnets to launch different cyber attack activities against the Internet of Things. The traditional methods of detecting botnets commonly used machine learning algorithms, and it is difficult to detect and control ...
Li Duan   +3 more
doaj   +1 more source

Hiding Contextual Information for Defending a Global Attacker

open access: yesIEEE Access, 2018
As wireless sensor networks are mostly deployed in harsh and hostile environments, lack of human maintenance, it has become a severe challenge to offer security or privacy service, especially when facing a powerful attacker.
Qian Zhou, Xiaolin Qin, Xiaojun Xie
doaj   +1 more source

Information Privacy/Information Property

open access: yesSSRN Electronic Journal, 2000
From most objective standpoints, protecting information privacy though industry self-regulation is an abject failure. The current political climate has been hostile to proposals for meaningful privacy regulation. Privacy advocates have been casting around for some third alternative and a number of them have fastened on the idea that data privacy can be
openaire   +4 more sources

Optimal Forgery and Suppression of Ratings for Privacy Enhancement in Recommendation Systems

open access: yesEntropy, 2014
Recommendation systems are information-filtering systems that tailor information to users on the basis of knowledge about their preferences. The ability of these systems to profile users is what enables such intelligent functionality, but at the same ...
Javier Parra-Arnau   +2 more
doaj   +1 more source

Perception of Information Sensitivity for Internet Users in Saudi Arabia

open access: yesActa Informatica Pragensia, 2020
The rapid evolution of Internet use has led to the collection of big data about users, which has raised users' privacy concerns about their personal information.
Khaled Almotairi, Bilal Bataineh
doaj   +1 more source

Global Education Industry - Exploring the state of affairs in Austria

open access: yesSeminar.net, 2021
Digitization initiatives in the field of education always correspond with developments in the education industry. In recent years, globally networked development dynamics have emerged that are essentially characterized by an education-industrial complex ...
English English, Reinhold Madritsch
doaj   +1 more source

Revisiting the Multiple-of Property for SKINNY: The Exact Computation of the Number of Right Pairs

open access: yesIEEE Access
At EUROCRYPT 2017, Grassi et al. proposed the multiple-of-8 property for 5-round $\mathtt {AES}$ , where the number $n$ of right pairs is a multiple of 8. At ToSC 2019, Boura et al.
Hanbeom Shin   +6 more
doaj   +1 more source

Home - About - Disclaimer - Privacy