-
1
-
-
84864274193
-
Big data privacy issues in public social media
-
to appear
-
M. Smith, B. Henne, C. Szongott, and G. von Voigt, "Big data privacy issues in public social media," in 2012 Digital Ecosystems and Technologies Conference (DEST), to appear, 2012.
-
(2012)
2012 Digital Ecosystems and Technologies Conference (DEST)
-
-
Smith, M.1
Henne, B.2
Szongott, C.3
Von Voigt, G.4
-
2
-
-
78649342447
-
An obfuscation-based approach for protecting location privacy
-
June
-
C. a. Ardagna, M. Cremonini, S. De Capitani di Vimercati, and P. Samarati, "An Obfuscation-Based Approach for Protecting Location Privacy," IEEE Transactions on Dependable and Secure Computing, vol. 8, no. 1, pp. 13-27, June 2009.
-
(2009)
IEEE Transactions on Dependable and Secure Computing
, vol.8
, Issue.1
, pp. 13-27
-
-
Ardagna, C.A.1
Cremonini, M.2
De Capitani Di Vimercati, S.3
Samarati, P.4
-
3
-
-
36549043405
-
Protecting location privacy with personalized k- anonymity: Architecture and algorithms
-
Jan.
-
B. Gedik and L. Liu, "Protecting Location Privacy with Personalized k- Anonymity: Architecture and Algorithms," IEEE Transactions on Mobile Computing, vol. 7, no. 1, pp. 1-18, Jan. 2008.
-
(2008)
IEEE Transactions on Mobile Computing
, vol.7
, Issue.1
, pp. 1-18
-
-
Gedik, B.1
Liu, L.2
-
4
-
-
83155190943
-
Towards a mobile security & privacy simulator
-
sept.
-
B. Henne, C. Szongott, and M. Smith, "Towards a mobile security & privacy simulator," in 2011 IEEE Conference on Open Systems (ICOS), sept. 2011, pp. 95 -100.
-
(2011)
2011 IEEE Conference on Open Systems (ICOS)
, pp. 95-100
-
-
Henne, B.1
Szongott, C.2
Smith, M.3
-
5
-
-
84864185764
-
-
(Feb.). [Online]
-
(2012, Feb.) SimPy: Simulation in Python. [Online]. Available: http://simpy.sourceforge.net/
-
(2012)
SimPy: Simulation in Python
-
-
-
6
-
-
33847726707
-
Coupled simulation/ emulation for cross-layer enabled mobile wireless computing
-
M. Smith, S. Hanemann, and B. Freisleben, "Coupled simulation/ emulation for cross-layer enabled mobile wireless computing," in Proceedings of the Second International Conference on Embedded Software and Systems, 2005, pp. 375-385.
-
(2005)
Proceedings of the Second International Conference on Embedded Software and Systems
, pp. 375-385
-
-
Smith, M.1
Hanemann, S.2
Freisleben, B.3
-
8
-
-
84885395162
-
On the impact of user movement simulations in the evaluation of lbs privacy-preserving techniques
-
Malaga, Spain, October 9, 2008
-
S. Mascetti, D. Freni, C. Bettini, X. S. Wang, S. Jajodia, and U. D. Milano, "On the Impact of User Movement Simulations in the Evaluation of LBS Privacy-Preserving Techniques," in Proceedings of the 1st International Workshop on Privacy in Location-Based Applications, Malaga, Spain, October 9, 2008, 2008.
-
(2008)
Proceedings of the 1st International Workshop on Privacy in Location-Based Applications
-
-
Mascetti, S.1
Freni, D.2
Bettini, C.3
Wang, X.S.4
Jajodia, S.5
Milano, U.D.6
-
9
-
-
66349131932
-
Understanding the spreading patterns of mobile phone viruses
-
May
-
P. Wang, M. C. González, C. A. Hidalgo, and A.-L. Barabási, "Understanding the spreading patterns of mobile phone viruses." Science (New York, N.Y.), vol. 324, no. 5930, pp. 1071-6, May 2009.
-
(2009)
Science (New York, N.Y.)
, vol.324
, Issue.5930
, pp. 1071-1076
-
-
Wang, P.1
González, M.C.2
Hidalgo, C.A.3
Barabási, A.-L.4
-
10
-
-
34547218865
-
A preliminary investigation of worm infections in a bluetooth environment
-
J. Su, K. K. W. Chan, A. G. Miklas, K. Po, A. Akhavan, S. Saroiu, E. de Lara, and A. Goel, "A preliminary investigation of worm infections in a bluetooth environment," in Proceedings of the 4th ACM workshop on Recurring malcode, ser. WORM '06, 2006, pp. 9-16.
-
(2006)
Proceedings of the 4th ACM Workshop on Recurring Malcode, Ser. WORM '06
, pp. 9-16
-
-
Su, J.1
Chan, K.K.W.2
Miklas, A.G.3
Po, K.4
Akhavan, A.5
Saroiu, S.6
De Lara, E.7
Goel, A.8
-
11
-
-
84947612643
-
Proximity breeds danger: Emerging threats in metro-area wireless networks
-
P. Akritidis, W. Y. Chin, V. T. Lam, S. Sidiroglou, and K. G. Anagnostakis, "Proximity breeds danger: emerging threats in metro-area wireless networks," in Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium, ser. SS'07, 2007, pp. 22:1-22:16.
-
(2007)
Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium, Ser. SS'07
, pp. 221-2216
-
-
Akritidis, P.1
Chin, W.Y.2
Lam, V.T.3
Sidiroglou, S.4
Anagnostakis, K.G.5
-
12
-
-
84855612314
-
Improving location privacy in mix-zones for vanets
-
nov.
-
A. Carianha, L. Barreto, and G. Lima, "Improving location privacy in mix-zones for vanets," in Performance Computing and Communications Conference, 2011 IEEE 30th International, nov. 2011, pp. 1-6.
-
(2011)
Performance Computing and Communications Conference, 2011 IEEE 30th International
, pp. 1-6
-
-
Carianha, A.1
Barreto, L.2
Lima, G.3
-
13
-
-
55049136478
-
Realistic mobility simulation of urban mesh networks
-
Mar.
-
J. Kim, V. Sridhara, and S. Bohacek, "Realistic mobility simulation of urban mesh networks," Ad Hoc Netw., vol. 7, pp. 411-430, Mar. 2009.
-
(2009)
Ad Hoc Netw.
, vol.7
, pp. 411-430
-
-
Kim, J.1
Sridhara, V.2
Bohacek, S.3
-
14
-
-
35248827662
-
Mags project: Multi-agent geosimulation and crowd simulation
-
B. Moulin, W. Chaker, J. Perron, P. Pelletier, J. Hogan, and E. Gbei, "Mags project: Multi-agent geosimulation and crowd simulation." in COSIT, ser. LNCS, vol. 2825, 2003, pp. 151-168.
-
(2003)
COSIT, Ser. LNCS
, vol.2825
, pp. 151-168
-
-
Moulin, B.1
Chaker, W.2
Perron, J.3
Pelletier, P.4
Hogan, J.5
Gbei, E.6
-
15
-
-
33646149657
-
2d-3d multiagent geosimulation with knowledgebased agents of customers' shopping behavior in a shopping mall
-
W. Ali and B. Moulin, "2d-3d multiagent geosimulation with knowledgebased agents of customers' shopping behavior in a shopping mall," in Spatial Information Theory, 2005, vol. 3693, pp. 445-458.
-
(2005)
Spatial Information Theory
, vol.3693
, pp. 445-458
-
-
Ali, W.1
Moulin, B.2
|