Addressing the concerns of the lacks family: quantification of kin genomic privacy
The rapid progress in human-genome sequencing is leading to a high availability of
genomic data. This data is notoriously very sensitive and stable in time. It is also highly …
genomic data. This data is notoriously very sensitive and stable in time. It is also highly …
Trust models of internet of smart things: A survey, open issues, and future directions
Abstract Internet of Things (IoT) is a rapidly growing field which provides seamless
connectivity to physical objects to make them part of smart environment. In order to fully …
connectivity to physical objects to make them part of smart environment. In order to fully …
Systems and methods for using event-correlation graphs to generate remediation procedures
(57) ABSTRACT A computer-implemented method for using event-correlation graphs to
generate remediation procedures may include (1) detecting a suspicious event involving a …
generate remediation procedures may include (1) detecting a suspicious event involving a …
Systems and methods for using event-correlation graphs to detect attacks on computing systems
(57) ABSTRACT A computer-implemented method for using event-correlation graphs to
detect attacks on computing systems may include (1) detecting a Suspicious event involving …
detect attacks on computing systems may include (1) detecting a Suspicious event involving …
Toward trustworthy cloud service selection: A time-aware approach using interval neutrosophic set
Cloud services consumers face a critical challenge in selecting trustworthy services from
abundant candidates, and facilitating these choices has become a critical issue in the …
abundant candidates, and facilitating these choices has become a critical issue in the …
A RSU-aided distributed trust framework for pseudonym-enabled privacy preservation in VANETs
S Wang, N Yao - Wireless Networks, 2019 - Springer
Vehicular ad hoc networks (VANETs) have the potential to change the way of people drive,
travel and so on, in which vehicle can broadcast and forward the message of road condition …
travel and so on, in which vehicle can broadcast and forward the message of road condition …
Systems and methods for reducing false positives when using event-correlation graphs to detect attacks on computing systems
H04L 29/00(2006.01) puting systems may include (1) detecting a suspicious event H04L
29/06(2006.01) involving a first actor within a computing system,(2) con G06F 2/57(2013.01) …
29/06(2006.01) involving a first actor within a computing system,(2) con G06F 2/57(2013.01) …
A novel item anomaly detection approach against shilling attacks in collaborative recommendation systems using the dynamic time interval segmentation technique
Various types of web applications have gained both higher customer satisfaction and more
benefits since being successfully armed with personalized recommendation. However, the …
benefits since being successfully armed with personalized recommendation. However, the …
RPRep: A robust and privacy-preserving reputation management scheme for pseudonym-enabled VANETs
J Wang, Y Zhang, Y Wang, X Gu - International Journal of …, 2016 - journals.sagepub.com
Establishing trust and reputation for evaluation of message reliability is key to the vehicular
ad hoc networks (VANETs). Most of the previous reputation management systems focus on …
ad hoc networks (VANETs). Most of the previous reputation management systems focus on …
Quantifying interdependent risks in genomic privacy
The rapid progress in human-genome sequencing is leading to a high availability of
genomic data. These data is notoriously very sensitive and stable in time, and highly …
genomic data. These data is notoriously very sensitive and stable in time, and highly …