Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
privacy breaches
biblio
Encircling the Base Station for Source Location Privacy in Wireless Sensor Networks
Submitted by aekwall on Mon, 10/26/2020 - 10:54am
Base stations
Location Privacy in Wireless Networks
source location privacy
signal strength
routing schemes
routing information
packet delivery
Location Privacy breach
incoming packet
dummy traffic
dummy packets
delay
base station
Phantoms
privacy breaches
TTL
telecommunication traffic
Compositionality
sensors
encryption techniques
telecommunication network routing
Metrics
Cryptography
Routing
privacy
wireless sensor networks
pubcrawl
Human behavior
Resiliency
Cryptographic Protocols
telecommunication security
data privacy
biblio
A Game Theoretical Analysis of Risk Adaptive Access Control for Privacy Preserving
Submitted by aekwall on Mon, 09/21/2020 - 2:48pm
Resiliency
Human behavior
information theory
multistage two player game
privacy
privacy breaches
privacy preserving
Privacy Risk
privacy violation access requests
pubcrawl
Games
risk adaptive access control
risk analysis
Risk based access control
risk based access model
risk value
Scalability
Shannon information
sub-game perfect Nash equilibrium
cross-domain environment
Access Control
access control system
access request
Adaptation models
authorisation
Big Data
Cloud Computing
Control Theory and Privacy
Computing Theory and Privacy
cyber physical systems
cyber-physical systems
data privacy
estimation
game model
game theoretical analysis
game theoretical risk based access control
game theory