A game-theoretic taxonomy and survey of defensive deception for cybersecurity and privacy

J Pawlick, E Colbert, Q Zhu - ACM Computing Surveys (CSUR), 2019 - dl.acm.org
Cyberattacks on both databases and critical infrastructure have threatened public and
private sectors. Ubiquitous tracking and wearable computing have infringed upon privacy …

Influencing models and determinants in big data analytics research: A bibliometric analysis

M Aboelmaged, S Mouakket - Information Processing & Management, 2020 - Elsevier
Incorporating big data analytics into a particular context brings various challenges that rest
on the model or framework through which individuals or organisations adopt big data to …

[BOEK][B] Game theory for cyber deception

J Pawlick, Q Zhu - 2021 - Springer
Interactions both online and in the emerging Internet of things (IoT) feature distributed
agents with local decision-making capabilities and misaligned incentives. This has …

Smart meters big data: Game theoretic model for fair data sharing in deregulated smart grids

A Yassine, AAN Shireh**i, S Shirmohammadi - IEEE access, 2015 - ieeexplore.ieee.org
Aggregating fine-granular data measurements from smart meters presents an opportunity for
utility companies to learn about consumers' power consumption patterns. Several research …

Game theory based correlated privacy preserving analysis in big data

X Wu, T Wu, M Khan, Q Ni… - IEEE Transactions on Big …, 2017 - ieeexplore.ieee.org
Privacy preservation is one of the greatest concerns in big data. As one of extensive
applications in big data, privacy preserving data publication (PPDP) has been an important …

Valuating {Friends'} privacy: Does anonymity of sharing personal data matter?

Y Pu, J Grossklags - Thirteenth symposium on usable privacy and …, 2017 - usenix.org
Through their third-party app installation decisions, users are frequently triggering
interdependent privacy consequences by sharing personal information of their friends who …

Towards a model on the factors influencing social app users' valuation of interdependent privacy

Y Pu, J Grossklags - Proceedings on privacy enhancing …, 2016 - petsymposium.org
In the context of third-party social apps, the problem of interdependency of privacy refers to
users making app adoption decisions which cause the collection and utilization of personal …

Multi-computer malware detection systems with metamorphic functionality

A Kashtalian, S Lysenko, O Savenko… - … and Computer Systems, 2024 - nti.khai.edu
The need to develop new systems for detecting and counteracting malware remains
relevant. In addition to malware detection methods, the need to develop new systems for …

Social Media Profiling Continues to Partake in the Development of Formalistic Self-Concepts. Social Media Users Think So, Too.

S Engelmann, V Scheibe, F Battaglia… - Proceedings of the 2022 …, 2022 - dl.acm.org
Social media platforms generate user profiles to recommend informational resources
including targeted advertisements. The technical possibilities of user profiling methods go …

Prospect theoretic analysis of privacy-preserving mechanism

G Liao, X Chen, J Huang - IEEE/ACM Transactions on …, 2019 - ieeexplore.ieee.org
We study a problem of privacy-preserving mechanism design. A data collector wants to
obtain data from individuals to perform some computations. To relieve the privacy threat to …