Search
Now showing items 11-18 of 18
A framework for privacy-preserving data sharing in smart grid
(2016-01-01)
While smart grid introduces a lot of enhancements to the traditional power grid and improves managing and controlling consumers demands, it also introduces security and privacy issues. Therefore, failure to address them ...
Secure and privacy-preserving fog-assisted vehicular crowdsensing
(2018-08-01)
Vehicular crowdsensing (VCS) is an emerging paradigm where vehicles use onboard sensors to collect and share data with the aim of measuring phenomena of common interest. VCS has allowed for automated control as well as ...
An analysis of face matching accuracy and related variables: a meta-analysis and two follow-up studies
(2022-07-01)
Face matching is used in many different transportation and policing situations and is an important last line of defense in security contexts such as the TSA. Despite how important this task is in ensuring security, no ...
A privacy preservation framework for smart connected toys
(2019-09-01)
Advances within the toy industry and interconnectedness have resulted in the rapid and pervasive development of Smart Connected Toys (SCTs), built to aid children in learning, socialization, and development. A SCT is a ...
Towards a computational model of information trust
(2022-02-01)
Information has been an essential element in the development of collaborative and cooperative frameworks. From decision making to the attainment of different goals, people have been relatively adept at making judgments ...
Agent-based modeling framework for adaptive cyber defence of the Internet of Things
(2022-12-01)
The adoption of the Internet of Things (IoT) continues to increase significantly, introducing unique challenges and threats to cybersecurity. In parallel, adaptive and autonomous cyber defence has become an emerging research ...
Virtual machine detection through Central Processing Unit (CPU) detail anomalies
(2022-12-01)
Malware analysts commonly use virtual machines to provide safe environments to study malware. Malware authors in response, include virtual machine detection functions in their malware so it changes its behavior should a ...
Matching expectations and reality in AI systems - cybersecurity use case
(2023-04-01)
Artificial intelligence (AI) is a growing field in computer science which develops intelligent systems capable of performing things that a human mind can do. The manufacturers of security systems integrate AI capabilities ...