Addressing the concerns of the lacks family: quantification of kin genomic privacy

M Humbert, E Ayday, JP Hubaux, A Telenti - Proceedings of the 2013 …, 2013 - dl.acm.org
The rapid progress in human-genome sequencing is leading to a high availability of
genomic data. This data is notoriously very sensitive and stable in time. It is also highly …

Trust models of internet of smart things: A survey, open issues, and future directions

A Altaf, H Abbas, F Iqbal, A Derhab - Journal of Network and Computer …, 2019 - Elsevier
Abstract Internet of Things (IoT) is a rapidly growing field which provides seamless
connectivity to physical objects to make them part of smart environment. In order to fully …

Systems and methods for using event-correlation graphs to generate remediation procedures

KA Roundy, S Bhatkar - US Patent 9,256,739, 2016 - Google Patents
(57) ABSTRACT A computer-implemented method for using event-correlation graphs to
generate remediation procedures may include (1) detecting a suspicious event involving a …

Systems and methods for using event-correlation graphs to detect attacks on computing systems

K Roundy, F Guo, S Bhatkar, T Cheng, J Fu… - US Patent …, 2015 - Google Patents
(57) ABSTRACT A computer-implemented method for using event-correlation graphs to
detect attacks on computing systems may include (1) detecting a Suspicious event involving …

Toward trustworthy cloud service selection: A time-aware approach using interval neutrosophic set

H Ma, Z Hu, K Li, H Zhang - Journal of Parallel and Distributed Computing, 2016 - Elsevier
Cloud services consumers face a critical challenge in selecting trustworthy services from
abundant candidates, and facilitating these choices has become a critical issue in the …

A RSU-aided distributed trust framework for pseudonym-enabled privacy preservation in VANETs

S Wang, N Yao - Wireless Networks, 2019 - Springer
Vehicular ad hoc networks (VANETs) have the potential to change the way of people drive,
travel and so on, in which vehicle can broadcast and forward the message of road condition …

Systems and methods for reducing false positives when using event-correlation graphs to detect attacks on computing systems

F Guo, S Bhatkar, K Roundy - US Patent 9,166,997, 2015 - Google Patents
H04L 29/00(2006.01) puting systems may include (1) detecting a suspicious event H04L
29/06(2006.01) involving a first actor within a computing system,(2) con G06F 2/57(2013.01) …

A novel item anomaly detection approach against shilling attacks in collaborative recommendation systems using the dynamic time interval segmentation technique

H **a, B Fang, M Gao, H Ma, Y Tang, J Wen - Information Sciences, 2015 - Elsevier
Various types of web applications have gained both higher customer satisfaction and more
benefits since being successfully armed with personalized recommendation. However, the …

RPRep: A robust and privacy-preserving reputation management scheme for pseudonym-enabled VANETs

J Wang, Y Zhang, Y Wang, X Gu - International Journal of …, 2016 - journals.sagepub.com
Establishing trust and reputation for evaluation of message reliability is key to the vehicular
ad hoc networks (VANETs). Most of the previous reputation management systems focus on …

Quantifying interdependent risks in genomic privacy

M Humbert, E Ayday, JP Hubaux, A Telenti - ACM Transactions on …, 2017 - dl.acm.org
The rapid progress in human-genome sequencing is leading to a high availability of
genomic data. These data is notoriously very sensitive and stable in time, and highly …