Results 31 to 40 of about 2,252,336 (338)

Automatically Attributing Mobile Threat Actors by Vectorized ATT&CK Matrix and Paired Indicator

open access: yesSensors, 2021
During the past decade, mobile attacks have been established as an indispensable attack vector adopted by Advanced Persistent Threat (APT) groups. The ubiquitous nature of the smartphone has allowed users to use mobile payments and store private or ...
Kyoungmin Kim   +3 more
doaj   +1 more source

Bounded-Leakage Differential Privacy [PDF]

open access: yes, 2020
We introduce and study a relaxation of differential privacy [Dwork et al., 2006] that accounts for mechanisms that leak some additional, bounded information about the database.
Ligett, Katrina   +2 more
core   +1 more source

Privacy Preserving Data Mining

open access: yesAdvances in Information Security, 2015
Recent interest in data collection and monitoring using data mining for security and business-related applications has raised privacy. Privacy Preserving Data Mining (PPDM) techniques require data modification to disinfect them from sensitive information
J. Vaidya, Yu Zhu, C. Clifton
semanticscholar   +1 more source

Dual Privacy-Preserving Lightweight Navigation System for Vehicular Networks

open access: yesIEEE Access, 2022
As an indispensable part of intelligent transportation system, a traffic-sensitive navigation system can assist drivers in avoiding traffic congestion by providing navigation services.
Yingying Yao   +4 more
doaj   +1 more source

Numerical Evaluation of Job Finish Time Under MTD Environment

open access: yesIEEE Access, 2020
Moving target defense (MTD) has recently emerged as a game-changer in the confrontation between cyberattack and defense. MTD mechanism constantly and randomly changes the system configurations to create uncertainty of the attack surface against cyber ...
Zhi Chen   +3 more
doaj   +1 more source

Integral Cryptanalysis of Lightweight Block Cipher PIPO

open access: yesIEEE Access, 2022
PIPO is a lightweight block cipher proposed at ICISC 2020, which has a byte-oriented structure suitable for bit-sliced implementation and allows for efficient higher-order masking implementations.
Sunyeop Kim   +5 more
doaj   +1 more source

A Survey on Federated Learning Systems: Vision, Hype and Reality for Data Privacy and Protection [PDF]

open access: yesIEEE Transactions on Knowledge and Data Engineering, 2019
As data privacy increasingly becomes a critical societal concern, federated learning has been a hot research topic in enabling the collaborative training of machine learning models among different organizations under the privacy restrictions.
Q. Li   +3 more
semanticscholar   +1 more source

Securing Systems With Indispensable Entropy: LWE-Based Lossless Computational Fuzzy Extractor for the Internet of Things

open access: yesIEEE Access, 2017
With the advent of the Internet of Things, lightweight devices necessitate secure and cost-efficient key storage. Since traditional secure key storage is expensive, novel solutions have been developed based on the idea of deriving the key from noisy ...
Christopher Huth   +4 more
doaj   +1 more source

On ADS-B Sensor Placement for Secure Wide-Area Multilateration

open access: yesProceedings, 2020
As automatic dependent surveillance–broadcast (ADS-B) becomes more prevalent, the placement of on-ground sensors is vital for Air Traffic Control (ATC) to control the airspace.
Ala’ Darabseh   +3 more
doaj   +1 more source

RAPPOR: Randomized Aggregatable Privacy-Preserving Ordinal Response [PDF]

open access: yesConference on Computer and Communications Security, 2014
Randomized Aggregatable Privacy-Preserving Ordinal Response, or RAPPOR, is a technology for crowdsourcing statistics from end-user client software, anonymously, with strong privacy guarantees.
Ú. Erlingsson, A. Korolova, Vasyl Pihur
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy