Results 31 to 40 of about 367,444 (216)
The edge of the smart grid has a massive number of power and resource-constrained interconnected devices. Mainly, smart meters report power consumption data from consumer homes, industrial buildings, and other connected infrastructures.
Fawaz Kserawi +2 more
doaj +1 more source
In smart systems, attackers can use botnets to launch different cyber attack activities against the Internet of Things. The traditional methods of detecting botnets commonly used machine learning algorithms, and it is difficult to detect and control ...
Li Duan +3 more
doaj +1 more source
Hiding Contextual Information for Defending a Global Attacker
As wireless sensor networks are mostly deployed in harsh and hostile environments, lack of human maintenance, it has become a severe challenge to offer security or privacy service, especially when facing a powerful attacker.
Qian Zhou, Xiaolin Qin, Xiaojun Xie
doaj +1 more source
Channel State Information-Free Location-Privacy Enhancement: Fake Path Injection [PDF]
Jianxiu Li, Urbashi Mitra
openalex +1 more source
Information Privacy/Information Property
From most objective standpoints, protecting information privacy though industry self-regulation is an abject failure. The current political climate has been hostile to proposals for meaningful privacy regulation. Privacy advocates have been casting around for some third alternative and a number of them have fastened on the idea that data privacy can be
openaire +4 more sources
Optimal Forgery and Suppression of Ratings for Privacy Enhancement in Recommendation Systems
Recommendation systems are information-filtering systems that tailor information to users on the basis of knowledge about their preferences. The ability of these systems to profile users is what enables such intelligent functionality, but at the same ...
Javier Parra-Arnau +2 more
doaj +1 more source
Perception of Information Sensitivity for Internet Users in Saudi Arabia
The rapid evolution of Internet use has led to the collection of big data about users, which has raised users' privacy concerns about their personal information.
Khaled Almotairi, Bilal Bataineh
doaj +1 more source
Global Education Industry - Exploring the state of affairs in Austria
Digitization initiatives in the field of education always correspond with developments in the education industry. In recent years, globally networked development dynamics have emerged that are essentially characterized by an education-industrial complex ...
English English, Reinhold Madritsch
doaj +1 more source
How Students’ Information Sensitivity, Privacy Trade-Offs, and Stages of Customer Journey Affect Consent to Utilize Personal Data [PDF]
Ari Alamäki +2 more
openalex +1 more source
Revisiting the Multiple-of Property for SKINNY: The Exact Computation of the Number of Right Pairs
At EUROCRYPT 2017, Grassi et al. proposed the multiple-of-8 property for 5-round $\mathtt {AES}$ , where the number $n$ of right pairs is a multiple of 8. At ToSC 2019, Boura et al.
Hanbeom Shin +6 more
doaj +1 more source

