Results 1 to 10 of about 484,375 (148)
The present paper, which composes a broader research agenda developed by Data Privacy Brasil Research Association, aims to conduct a descriptive and qualitative study of the Brazilian National Identity System through a data protection and data justice ...
Bruno Bioni+3 more
doaj +1 more source
Mobility patterns of vehicles and people provide powerful data sources for location-based services such as fleet optimization and traffic flow analysis.
Stefano Bennati, Aleksandra Kovacevic
doaj +1 more source
This article argues that much of what we refer to as privacy in present-day society was materialised, experienced, instrumentalised, and also, to some extent, protected before the 19th century, when it was broadly conceptualised as a value and a right ...
Johannes Ljungberg, Natalie P. Körner
doaj +2 more sources
Camouflage Backdoor Attack against Pedestrian Detection
Pedestrian detection models in autonomous driving systems heavily rely on deep neural networks (DNNs) to perceive their surroundings. Recent research has unveiled the vulnerability of DNNs to backdoor attacks, in which malicious actors manipulate the ...
Yalun Wu+9 more
doaj +1 more source
Availability and Reliability of Service Function Chain: A Quantitative Evaluation View
Service function chain (SFC) based on network function virtualization (NFV) technology can handle network traffic flexibly and efficiently. The virtual network function (VNF), as the core function unit of SFC, can experience software aging, which reduces
Yaru Li+5 more
doaj +1 more source
NAND flash memory-based IoT device can potentially still leave behind original personal data in an invalid area even if the data has been deleted. In this paper, we raise the forensic issue of original data remaining in unmanaged blocks caused by NAND ...
Na Young Ahn, Dong Hoon Lee
doaj +1 more source
Background Regulatory agencies, such as the European Medicines Agency and Health Canada, are requiring the public sharing of clinical trial reports that are used to make drug approval decisions.
Janice Branson+5 more
doaj +1 more source
Over the past decade, decentralized cryptocurrencies have received attention in industry and academia. Hardware wallets are dedicated devices that manage cryptocurrencies safely without entrusting cryptographic keys to a third party. Side-channel attacks
Dongjun Park+5 more
doaj +1 more source
LSGAN-AT: enhancing malware detector robustness against adversarial examples
Adversarial Malware Example (AME)-based adversarial training can effectively enhance the robustness of Machine Learning (ML)-based malware detectors against AME. AME quality is a key factor to the robustness enhancement.
Jianhua Wang+4 more
doaj +1 more source
Automatically Attributing Mobile Threat Actors by Vectorized ATT&CK Matrix and Paired Indicator
During the past decade, mobile attacks have been established as an indispensable attack vector adopted by Advanced Persistent Threat (APT) groups. The ubiquitous nature of the smartphone has allowed users to use mobile payments and store private or ...
Kyoungmin Kim+3 more
doaj +1 more source