A systematic review of crime facilitated by the consumer Internet of Things
The nature of crime is changing—estimates suggest that at least half of all crime is now
committed online. Once everyday objects (eg televisions, baby monitors, door locks) that are …
committed online. Once everyday objects (eg televisions, baby monitors, door locks) that are …
A recommendation approach for user privacy preferences in the fitness domain
Fitness trackers are undoubtedly gaining in popularity. As fitness-related data are
persistently captured, stored, and processed by these devices, the need to ensure users' …
persistently captured, stored, and processed by these devices, the need to ensure users' …
Cyanobacterial risk prevention under global warming using an extended Bayesian network
Cyanobacterial blooms under global warming are increasing worldwide, producing
emerging contaminants, which threaten the health of human beings and aquatic …
emerging contaminants, which threaten the health of human beings and aquatic …
Enhancing user awareness on inferences obtained from fitness trackers data
In the IoT era, sensitive and non-sensitive data are recorded and transmitted to multiple
service providers and IoT platforms, aiming to improve the quality of our lives through the …
service providers and IoT platforms, aiming to improve the quality of our lives through the …
Leaking data from enterprise networks using a compromised smartwatch device
The recent proliferation of the Internet of Things (IoT) technology poses major security and
privacy concerns. Specifically, the use of personal IoT devices, such as tablets …
privacy concerns. Specifically, the use of personal IoT devices, such as tablets …
Heart Rate-Based Identification of Users of IoT Wearables: A Supervised Learning Approach
Biometric identification from heart rate sequences provides a simple yet effective
mechanism, that can neither be reverse engineered nor replicated, to protect user privacy …
mechanism, that can neither be reverse engineered nor replicated, to protect user privacy …
An attack scenario and mitigation mechanism for enterprise BYOD environments
The recent proliferation of the Internet of Things (IoT) technology poses major security and
privacy concerns. Specifically, the use of personal IoT devices, such as tablets …
privacy concerns. Specifically, the use of personal IoT devices, such as tablets …
A Framework to Support Users' Privacy Preferences in the Proliferation of IoT
OR Sanchez - 2019 - tesidottorato.depositolegale.it
In the proliferation of personal IoT devices, the need for privacy protection becomes an
increasing concern. User's privacy preferences are not being respected in today's complex …
increasing concern. User's privacy preferences are not being respected in today's complex …
Privatumo apsaugos metodas nuo buvimo vietos nustatymo mobiliesiems įrenginiams.
D Zemeckytė - 2021 - epubl.ktu.edu
Abstract [eng] The use of smartphones is increasing every year. We do not just use them to
call or otherwise connect with friends or loved ones. These devices have practically become …
call or otherwise connect with friends or loved ones. These devices have practically become …
Personlig integritet i aktivitetsmätare
M Castmo - 2017 - diva-portal.org
Studien undersöker och sammanfattar vad det finns för risker i samband med användandet
av aktivitetsmätare, så som aktivitetsarmband och smartwatches. Det finns många studier …
av aktivitetsmätare, så som aktivitetsarmband och smartwatches. Det finns många studier …