-
1
-
-
85044500553
-
-
Apprenda. Iaas, PaaS, SaaS (explained and compared). Accessed 20.07.16.
-
Apprenda. Iaas, PaaS, SaaS (explained and compared). http://apprenda.com/library/paas/iaas-paas-saas-explained-compared Accessed 20.07.16.
-
-
-
-
2
-
-
84893844243
-
Security and privacy in your smart city
-
Bartoli, A., Hernández-Serrano, J., Soriano, M., Dohler, M., Kountouris, A., Barthel, D., Security and privacy in your smart city. Proceedings of the Barcelona smart cities congress, 2011, 1–6.
-
(2011)
Proceedings of the Barcelona smart cities congress
, pp. 1-6
-
-
Bartoli, A.1
Hernández-Serrano, J.2
Soriano, M.3
Dohler, M.4
Kountouris, A.5
Barthel, D.6
-
3
-
-
85044504415
-
Cybersecurity challenges: A view from the private sector
-
Basi, T., Cybersecurity challenges: A view from the private sector. 2016, April http://www.serene-risc.ca/en.
-
(2016)
-
-
Basi, T.1
-
4
-
-
85044520842
-
Critical infrastructure threat landscape: Understanding and reacting
-
Bosco, F., Critical infrastructure threat landscape: Understanding and reacting. 2016, April http://www.serene-risc.ca/en.
-
(2016)
-
-
Bosco, F.1
-
5
-
-
84866022540
-
Differentially private transit data publication: A case study on the Montreal transportation system
-
Chen, R., Fung, B.C.M., Desai, B.C., Sossou, N., Differentially private transit data publication: A case study on the Montreal transportation system. Proceedings of the 18th ACM SIGKDD international conference on knowledge discovery and data mining, ACM, 2012, 213–221.
-
(2012)
Proceedings of the 18th ACM SIGKDD international conference on knowledge discovery and data mining, ACM
, pp. 213-221
-
-
Chen, R.1
Fung, B.C.M.2
Desai, B.C.3
Sossou, N.4
-
6
-
-
28444494455
-
Industrial cybersecurity for power system and SCADA networks
-
Creery, A., Byres, E.J., Industrial cybersecurity for power system and SCADA networks. Industry Applications Society 52nd Annual Petroleum and Chemical Industry Conference, IEEE, 2005, 303–309.
-
(2005)
Industry Applications Society 52nd Annual Petroleum and Chemical Industry Conference, IEEE
, pp. 303-309
-
-
Creery, A.1
Byres, E.J.2
-
7
-
-
33746335051
-
Differential privacy
-
Dwork, C., Differential privacy. Proceedings of the 33rd international conference on automata, languages and programming – Volume Part II, ICALP'06, 2006, 1–12.
-
(2006)
Proceedings of the 33rd international conference on automata, languages and programming – Volume Part II, ICALP'06
, pp. 1-12
-
-
Dwork, C.1
-
8
-
-
84901690626
-
Cyber security challenges in smart cities: Safety, security and privacy
-
Elmaghraby, A.S., Losavio, M.M., Cyber security challenges in smart cities: Safety, security and privacy. Journal of advanced research 5:4 (2014), 491–497.
-
(2014)
Journal of advanced research
, vol.5
, Issue.4
, pp. 491-497
-
-
Elmaghraby, A.S.1
Losavio, M.M.2
-
9
-
-
85027994385
-
HPE security research, cyber risk report 2016
-
Enterprise, H.P., HPE security research, cyber risk report 2016., 2016, February.
-
(2016)
-
-
Enterprise, H.P.1
-
10
-
-
85044517786
-
Research and development when enforcing cybercrime and cybersecurity in France
-
Freyssinet, E., Research and development when enforcing cybercrime and cybersecurity in France. 2016, April http://www.serene-risc.ca/en.
-
(2016)
-
-
Freyssinet, E.1
-
11
-
-
84865689933
-
Service-oriented architecture for high-dimensional private data mashup
-
Fung, B.C.M., Trojer, T., Hung, P.C.K., Xiong, L., Al-Hussaeni, K., Dssouli, R., Service-oriented architecture for high-dimensional private data mashup. IEEE Transactions on Services Computing (TSC) 5:3 (2012), 373–386.
-
(2012)
IEEE Transactions on Services Computing (TSC)
, vol.5
, Issue.3
, pp. 373-386
-
-
Fung, B.C.M.1
Trojer, T.2
Hung, P.C.K.3
Xiong, L.4
Al-Hussaeni, K.5
Dssouli, R.6
-
12
-
-
65449162734
-
Composition attacks and auxiliary information in data privacy
-
Ganta, S.R., Kasiviswanathan, S.P., Smith, A., Composition attacks and auxiliary information in data privacy. Proceedings of the 14th ACM SIGKDD international conference on knowledge discovery and data mining, KDD ’08, 2008, 265–273.
-
(2008)
Proceedings of the 14th ACM SIGKDD international conference on knowledge discovery and data mining, KDD ’08
, pp. 265-273
-
-
Ganta, S.R.1
Kasiviswanathan, S.P.2
Smith, A.3
-
13
-
-
84891668457
-
Anonymizing trajectory data for passenger flow analysis
-
Ghasemzadeh, M., Fung, B.C.M., Chen, R., Awasthi, A., Anonymizing trajectory data for passenger flow analysis. Transportation Research Part C: Emerging Technologies 39 (2014), 63–79.
-
(2014)
Transportation Research Part C: Emerging Technologies
, vol.39
, pp. 63-79
-
-
Ghasemzadeh, M.1
Fung, B.C.M.2
Chen, R.3
Awasthi, A.4
-
14
-
-
33750405289
-
Security issues in SCADA networks
-
Igure, V.M., Laughter, S.A., Williams, R.D., Security issues in SCADA networks. Computers & Security 25:7 (2006), 498–506.
-
(2006)
Computers & Security
, vol.25
, Issue.7
, pp. 498-506
-
-
Igure, V.M.1
Laughter, S.A.2
Williams, R.D.3
-
15
-
-
85009073812
-
Smart cities: A survey on security concerns
-
7:612-625
-
Ijaz, S., Shah, M.A., Khan, A., Ahmed, M., Smart cities: A survey on security concerns. International Journal of Advanced Computer Science and Applications, 7(2), 2016 7:612-625.
-
(2016)
International Journal of Advanced Computer Science and Applications
, vol.7
, Issue.2
-
-
Ijaz, S.1
Shah, M.A.2
Khan, A.3
Ahmed, M.4
-
16
-
-
84946686682
-
Towards cloud based smart cities data security and privacy management
-
Khan, Z., Pervez, Z., Ghafoor, A., Towards cloud based smart cities data security and privacy management. Proceedings of IEEE/ACM 7th international conference on utility and cloud computing (UCC), IEEE, 2014, 806–811.
-
(2014)
Proceedings of IEEE/ACM 7th international conference on utility and cloud computing (UCC), IEEE
, pp. 806-811
-
-
Khan, Z.1
Pervez, Z.2
Ghafoor, A.3
-
17
-
-
84961215475
-
Privacy-preserving data mashup model for trading person-specific information
-
Khokhar, R.H., Fung, B.C.M., Iqbal, F., Alhadidi, D., Bentahar, J., Privacy-preserving data mashup model for trading person-specific information. Electronic Commerce Research and Applications 17 (2016), 19–37.
-
(2016)
Electronic Commerce Research and Applications
, vol.17
, pp. 19-37
-
-
Khokhar, R.H.1
Fung, B.C.M.2
Iqbal, F.3
Alhadidi, D.4
Bentahar, J.5
-
19
-
-
85044536958
-
Visualizing cascading failures in critical cyber infrastructures
-
Kopylec, J., D'Amico, A., Goodall, J., Visualizing cascading failures in critical cyber infrastructures. International conference on critical infrastructure protection 35 (2007), 1–364.
-
(2007)
International conference on critical infrastructure protection
, vol.35
, pp. 1-364
-
-
Kopylec, J.1
D'Amico, A.2
Goodall, J.3
-
20
-
-
85044518180
-
Cybersecurity challenges: A view from the public sector
-
Lum, W., Cybersecurity challenges: A view from the public sector. 2016, April http://www.serene-risc.ca/en.
-
(2016)
-
-
Lum, W.1
-
21
-
-
84879098109
-
The pursuit of citizens’ privacy: A privacy-aware smart city is possible
-
Martinez-Balleste, A., Pérez-Martínez, T.A., Solanas, A., The pursuit of citizens’ privacy: A privacy-aware smart city is possible. IEEE Communications Magazine 51:6 (2013), 136–141.
-
(2013)
IEEE Communications Magazine
, vol.51
, Issue.6
, pp. 136-141
-
-
Martinez-Balleste, A.1
Pérez-Martínez, T.A.2
Solanas, A.3
-
22
-
-
77958579043
-
Privacy-preserving data mining: A feature set partitioning approach
-
Matatov, N., Rokach, L., Maimon, O., Privacy-preserving data mining: A feature set partitioning approach. Information Sciences 180:14 (2010), 2696–2720.
-
(2010)
Information Sciences
, vol.180
, Issue.14
, pp. 2696-2720
-
-
Matatov, N.1
Rokach, L.2
Maimon, O.3
-
23
-
-
84894539105
-
Secure two-party differentially private data release for vertically partitioned data
-
Mohammed, N., Alhadidi, D., Fung, B.C.M., Debbabi, M., Secure two-party differentially private data release for vertically partitioned data. IEEE Transactions on Dependable and Secure Computing 11:1 (2014), 59–71.
-
(2014)
IEEE Transactions on Dependable and Secure Computing
, vol.11
, Issue.1
, pp. 59-71
-
-
Mohammed, N.1
Alhadidi, D.2
Fung, B.C.M.3
Debbabi, M.4
-
24
-
-
80052663001
-
Differentially private data release for data mining
-
Mohammed, N., Chen, R., Fung, B.C.M., Yu, P.S., Differentially private data release for data mining. Proceedings of the 17th ACM SIGKDD international conference on knowledge discovery and data mining, KDD, 2011, 493–501.
-
(2011)
Proceedings of the 17th ACM SIGKDD international conference on knowledge discovery and data mining, KDD
, pp. 493-501
-
-
Mohammed, N.1
Chen, R.2
Fung, B.C.M.3
Yu, P.S.4
-
25
-
-
84940849607
-
Privacy-aware dynamic feature selection
-
Pattu, E., Kantarcioglu, M., Ulusoy, H., Malin, B., Privacy-aware dynamic feature selection. Proceedings of the 31st IEEE international conference on data engineering (ICDE), 2015, 78–88.
-
(2015)
Proceedings of the 31st IEEE international conference on data engineering (ICDE)
, pp. 78-88
-
-
Pattu, E.1
Kantarcioglu, M.2
Ulusoy, H.3
Malin, B.4
-
26
-
-
84900633329
-
Reconciling privacy and efficient utility management in smart cities
-
Rebollo-Monedero, D., Bartoli, A., Hernández-Serrano, J., Forné, J., Soriano, M., Reconciling privacy and efficient utility management in smart cities. Transactions on Emerging Telecommunications Technologies 25:1 (2014), 94–108.
-
(2014)
Transactions on Emerging Telecommunications Technologies
, vol.25
, Issue.1
, pp. 94-108
-
-
Rebollo-Monedero, D.1
Bartoli, A.2
Hernández-Serrano, J.3
Forné, J.4
Soriano, M.5
-
27
-
-
0035696915
-
Identifying, understanding, and analyzing critical infrastructure interdependencies
-
Rinaldi, S., Peerenboom, J., Kelly, T., Identifying, understanding, and analyzing critical infrastructure interdependencies. IEEE Control Systems 21:6 (2001), 11–25.
-
(2001)
IEEE Control Systems
, vol.21
, Issue.6
, pp. 11-25
-
-
Rinaldi, S.1
Peerenboom, J.2
Kelly, T.3
-
28
-
-
0032148585
-
Critical infrastructure: Interlinked and vulnerable
-
Robinson, P., Woodard, J., Varnado, S., Critical infrastructure: Interlinked and vulnerable. Issues in Science and Technology 15:1 (1998), 61–67.
-
(1998)
Issues in Science and Technology
, vol.15
, Issue.1
, pp. 61-67
-
-
Robinson, P.1
Woodard, J.2
Varnado, S.3
-
29
-
-
85006210403
-
Review on computational trust and reputation models
-
Sabater, J., Sierra, C., Review on computational trust and reputation models. Artificial Intelligence Review 24:1 (2005), 33–60.
-
(2005)
Artificial Intelligence Review
, vol.24
, Issue.1
, pp. 33-60
-
-
Sabater, J.1
Sierra, C.2
-
31
-
-
84880882279
-
Issues of privacy and security in the role of software in smart cities
-
Sen, M., Dutt, A., Agarwal, A., Nath, A., Issues of privacy and security in the role of software in smart cities. 2013 international conference on communication systems and network technologies (CSNT), IEEE, 2013, 518–523.
-
(2013)
2013 international conference on communication systems and network technologies (CSNT), IEEE
, pp. 518-523
-
-
Sen, M.1
Dutt, A.2
Agarwal, A.3
Nath, A.4
-
34
-
-
85044532587
-
We watched a team of hackers ‘fully compromise’ a power company in less than 24 hours
-
Accessed 27.08.16
-
Szoldra, P., We watched a team of hackers ‘fully compromise’ a power company in less than 24 hours. 2016, April Accessed 27.08.16 http://www.techinsider.io/red-team-security-hacking-power-company-2016-4.
-
(2016)
-
-
Szoldra, P.1
-
35
-
-
85044516496
-
-
o. T. a. A. (2013, July). UT News UT Austin researchers successfully spoof an $80 million yacht at sea. Accessed 11.08.16.
-
T. U. o. T. a. A. (2013, July). UT News UT Austin researchers successfully spoof an $80 million yacht at sea. http://news.utexas.edu/2013/07/29/ut-austin-researchers-successfully-spoof-an-80-million-yacht-at-sea Accessed 11.08.16.
-
-
-
U, T.1
-
36
-
-
85018279965
-
Feature selection for classification under anonymity constraint
-
Zhang, B., Mohammed, N., Dave, V.S., Hasan, M.A., Feature selection for classification under anonymity constraint. Transactions on Data Privacy 10:1 (2017), 1–25.
-
(2017)
Transactions on Data Privacy
, vol.10
, Issue.1
, pp. 1-25
-
-
Zhang, B.1
Mohammed, N.2
Dave, V.S.3
Hasan, M.A.4
-
37
-
-
84857516371
-
A taxonomy of cyber attacks on SCADA systems
-
Zhu, B., Joseph, A., Sastry, A., A taxonomy of cyber attacks on SCADA systems. Internet of things (iThings/CPSCom), the 4th international conference on cyber, physical and social computing, IEEE, 2011, 380–388.
-
(2011)
Internet of things (iThings/CPSCom), the 4th international conference on cyber, physical and social computing, IEEE
, pp. 380-388
-
-
Zhu, B.1
Joseph, A.2
Sastry, A.3
-
38
-
-
33646256588
-
The next step: Quantifying infrastructure interdependencies to improve security
-
Zimmerman, R., Restrepo, C., The next step: Quantifying infrastructure interdependencies to improve security. International Journal of Critical Infrastructure 2:2–3 (2006), 215–230.
-
(2006)
International Journal of Critical Infrastructure
, vol.2
, Issue.2-3
, pp. 215-230
-
-
Zimmerman, R.1
Restrepo, C.2
|