Results 31 to 40 of about 2,252,336 (338)
Automatically Attributing Mobile Threat Actors by Vectorized ATT&CK Matrix and Paired Indicator
During the past decade, mobile attacks have been established as an indispensable attack vector adopted by Advanced Persistent Threat (APT) groups. The ubiquitous nature of the smartphone has allowed users to use mobile payments and store private or ...
Kyoungmin Kim +3 more
doaj +1 more source
Bounded-Leakage Differential Privacy [PDF]
We introduce and study a relaxation of differential privacy [Dwork et al., 2006] that accounts for mechanisms that leak some additional, bounded information about the database.
Ligett, Katrina +2 more
core +1 more source
Privacy Preserving Data Mining
Recent interest in data collection and monitoring using data mining for security and business-related applications has raised privacy. Privacy Preserving Data Mining (PPDM) techniques require data modification to disinfect them from sensitive information
J. Vaidya, Yu Zhu, C. Clifton
semanticscholar +1 more source
Dual Privacy-Preserving Lightweight Navigation System for Vehicular Networks
As an indispensable part of intelligent transportation system, a traffic-sensitive navigation system can assist drivers in avoiding traffic congestion by providing navigation services.
Yingying Yao +4 more
doaj +1 more source
Numerical Evaluation of Job Finish Time Under MTD Environment
Moving target defense (MTD) has recently emerged as a game-changer in the confrontation between cyberattack and defense. MTD mechanism constantly and randomly changes the system configurations to create uncertainty of the attack surface against cyber ...
Zhi Chen +3 more
doaj +1 more source
Integral Cryptanalysis of Lightweight Block Cipher PIPO
PIPO is a lightweight block cipher proposed at ICISC 2020, which has a byte-oriented structure suitable for bit-sliced implementation and allows for efficient higher-order masking implementations.
Sunyeop Kim +5 more
doaj +1 more source
A Survey on Federated Learning Systems: Vision, Hype and Reality for Data Privacy and Protection [PDF]
As data privacy increasingly becomes a critical societal concern, federated learning has been a hot research topic in enabling the collaborative training of machine learning models among different organizations under the privacy restrictions.
Q. Li +3 more
semanticscholar +1 more source
With the advent of the Internet of Things, lightweight devices necessitate secure and cost-efficient key storage. Since traditional secure key storage is expensive, novel solutions have been developed based on the idea of deriving the key from noisy ...
Christopher Huth +4 more
doaj +1 more source
On ADS-B Sensor Placement for Secure Wide-Area Multilateration
As automatic dependent surveillance–broadcast (ADS-B) becomes more prevalent, the placement of on-ground sensors is vital for Air Traffic Control (ATC) to control the airspace.
Ala’ Darabseh +3 more
doaj +1 more source
RAPPOR: Randomized Aggregatable Privacy-Preserving Ordinal Response [PDF]
Randomized Aggregatable Privacy-Preserving Ordinal Response, or RAPPOR, is a technology for crowdsourcing statistics from end-user client software, anonymously, with strong privacy guarantees.
Ú. Erlingsson, A. Korolova, Vasyl Pihur
semanticscholar +1 more source

