Results 1 to 10 of about 484,375 (148)

The digitization of the Brazilian national identity system: A descriptive and qualitative analysis of its information architecture

open access: yesData & Policy, 2022
The present paper, which composes a broader research agenda developed by Data Privacy Brasil Research Association, aims to conduct a descriptive and qualitative study of the Brazilian National Identity System through a data protection and data justice ...
Bruno Bioni   +3 more
doaj   +1 more source

Modelling imperfect knowledge via location semantics for realistic privacy risks estimation in trajectory data

open access: yesScientific Reports, 2022
Mobility patterns of vehicles and people provide powerful data sources for location-based services such as fleet optimization and traffic flow analysis.
Stefano Bennati, Aleksandra Kovacevic
doaj   +1 more source

Experiencing Intrusion: Smashed Windows as Violations of Privacy in the University Town of Helmstedt, 1684–1706

open access: yesArchitectural Histories, 2023
This article argues that much of what we refer to as privacy in present-day society was materialised, experienced, instrumentalised, and also, to some extent, protected before the 19th century, when it was broadly conceptualised as a value and a right ...
Johannes Ljungberg, Natalie P. Körner
doaj   +2 more sources

Camouflage Backdoor Attack against Pedestrian Detection

open access: yesApplied Sciences, 2023
Pedestrian detection models in autonomous driving systems heavily rely on deep neural networks (DNNs) to perceive their surroundings. Recent research has unveiled the vulnerability of DNNs to backdoor attacks, in which malicious actors manipulate the ...
Yalun Wu   +9 more
doaj   +1 more source

Availability and Reliability of Service Function Chain: A Quantitative Evaluation View

open access: yesInternational Journal of Computational Intelligence Systems, 2023
Service function chain (SFC) based on network function virtualization (NFV) technology can handle network traffic flexibly and efficiently. The virtual network function (VNF), as the core function unit of SFC, can experience software aging, which reduces
Yaru Li   +5 more
doaj   +1 more source

Security of IoT Device: Perspective Forensic/Anti-Forensic Issues on Invalid Area of NAND Flash Memory

open access: yesIEEE Access, 2022
NAND flash memory-based IoT device can potentially still leave behind original personal data in an invalid area even if the data has been deleted. In this paper, we raise the forensic issue of original data remaining in unmanaged blocks caused by NAND ...
Na Young Ahn, Dong Hoon Lee
doaj   +1 more source

Evaluating the re-identification risk of a clinical study report anonymized under EMA Policy 0070 and Health Canada Regulations

open access: yesTrials, 2020
Background Regulatory agencies, such as the European Medicines Agency and Health Canada, are requiring the public sharing of clinical trial reports that are used to make drug approval decisions.
Janice Branson   +5 more
doaj   +1 more source

Stealing Keys From Hardware Wallets: A Single Trace Side-Channel Attack on Elliptic Curve Scalar Multiplication Without Profiling

open access: yesIEEE Access, 2023
Over the past decade, decentralized cryptocurrencies have received attention in industry and academia. Hardware wallets are dedicated devices that manage cryptocurrencies safely without entrusting cryptographic keys to a third party. Side-channel attacks
Dongjun Park   +5 more
doaj   +1 more source

LSGAN-AT: enhancing malware detector robustness against adversarial examples

open access: yesCybersecurity, 2021
Adversarial Malware Example (AME)-based adversarial training can effectively enhance the robustness of Machine Learning (ML)-based malware detectors against AME. AME quality is a key factor to the robustness enhancement.
Jianhua Wang   +4 more
doaj   +1 more source

Automatically Attributing Mobile Threat Actors by Vectorized ATT&CK Matrix and Paired Indicator

open access: yesSensors, 2021
During the past decade, mobile attacks have been established as an indispensable attack vector adopted by Advanced Persistent Threat (APT) groups. The ubiquitous nature of the smartphone has allowed users to use mobile payments and store private or ...
Kyoungmin Kim   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy