Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
privacy attacks
biblio
De-identification and Privacy Issues on Bigdata Transformation
Submitted by grigby1 on Mon, 12/28/2020 - 11:39am
ICT industry
t-closeness
Scalability
Resiliency
resilience
pubcrawl
privacy attacks
privacy
personal information
Metrics
l-Diversity
k-anonymity
Industries
Big Data
Human behavior
Guidelines
government sectors
diseases
de-identification processes
data privacy
Data models
data analysis
controllable privacy level
Big Data transformation
big data privacy
biblio
Even Black Cats Cannot Stay Hidden in the Dark: Full-band De-anonymization of Bluetooth Classic Devices
Submitted by grigby1 on Mon, 12/28/2020 - 11:28am
resilience
Human behavior
identified privacy attack
laptops
Lower Address Part
master device
personal area networks
piconet master
privacy
privacy attacks
privacy guarantees
pubcrawl
high data rates
Resiliency
software radio
Software-defined Radio based sniffer
Synchronization
telecommunication traffic
tethering
tracking attacks
Upper Address Part
Wireless communication
wireless headsets
wireless sensor networks
BT spectrum analysis
apparently benign information
audio streaming
audio streaming voice calling
automobiles
black cats
BLE
Bluetooth
Bluetooth Classic devices
bluetooth low energy
bluetooth security
BT addresses
address randomization
car stereo systems
Clocks
composability
computer network security
data privacy
de-anonymization technique
facto connectivity technology
frame encoding
frequency 79.0 MHz
Full-band De-anonymization
biblio
PAVSS: Privacy Assessment Vulnerability Scoring System
Submitted by aekwall on Mon, 10/12/2020 - 10:31am
social engineering
Expert Systems and Privacy
Twitter data
privacy-breach vulnerability
Privacy Assessment Vulnerability Scoring System
Privacy assessment
PAVSS
online sources
online so cial networks
online platform
Federal Trade Commission
fair information practice principles
consumer information
cybersecurity experts
security of data
stored data
private data
Human Factors
Data Breach
Data Security
privacy
Twitter
social networking (online)
privacy attacks
pubcrawl
Human behavior
data privacy
Scalability
biblio
An Effencient Improvement of RFID Authentication Protocol Using Hash Function ZKP
Submitted by aekwall on Mon, 03/23/2020 - 12:33pm
elliptical curve cryptographic solutions
RFIDs
Schnorr identification protocol
RFID security
RFID privacy
RFID authentication protocol
RFID Authentication
radio frequency identification technology
MITM
Keccak hash function
Hash function ZKP
Hash Function
Elliptical Curve Cryptography
data privacy
RFID system
RFID technology
radiofrequency identification
privacy protection
object detection
man-in-the-middle attack
public key cryptography
privacy attacks
pubcrawl
Human behavior
Resiliency
Cryptographic Protocols
biblio
Ghost Riders: Sybil Attacks on Crowdsourced Mobile Mapping Services
Submitted by aekwall on Mon, 02/18/2019 - 11:57am
real-time crowdsourced maps
large-scale simulations
location privacy
map systems
Mobile handsets
one-time physical co-location
online social networks
points-of-interest
privacy
privacy attacks
large proximity graphs
Roads
security attacks
single Sybil device
software-based Sybil devices
strong location authentication
sybil attacks
virtual vehicles
Waze
Metrics
cartography
data privacy
telecommunication security
mobile computing
real-time systems
pubcrawl
composability
Sybil attack
Accidents
automatic user traffic rerouting
traffic engineering computing
co-location edges
crowdsourced mobile mapping services
crowdsourcing
false congestion
ghost riders
Global Positioning System
Google
Google team
graph theory