Smart Assistants in IT Security - An Approach to Addressing the Challenge by Leveraging Assistants' Specific Features
暂无分享,去创建一个
[1] Jan Zibuschka,et al. The ENTOURAGE Privacy and Security Reference Architecture for Internet of Things Ecosystems , 2019, Open Identity Summit.
[2] Luis A. Guerrero,et al. Alexa vs. Siri vs. Cortana vs. Google Assistant: A Comparison of Speech-Based Natural User Interfaces , 2017 .
[3] Gérard Chollet,et al. Building the next generation of personal digital Assistants , 2014, 2014 1st International Conference on Advanced Technologies for Signal and Image Processing (ATSIP).
[4] Nick Feamster,et al. A Smart Home is No Castle: Privacy Vulnerabilities of Encrypted IoT Traffic , 2017, ArXiv.
[5] Scott L. Summers,et al. The Impact of Shadow IT Systems on Perceived Information Credibility and Managerial Decision Making , 2017 .
[6] Jeffrey M. Voas,et al. “Alexa, Can I Trust You?” , 2017, Computer.
[7] Chunyan Miao,et al. A cognitive approach for agent-based personalized recommendation , 2007, Knowl. Based Syst..
[8] Adi Shamir,et al. IoT Goes Nuclear: Creating a ZigBee Chain Reaction , 2017, 2017 IEEE Symposium on Security and Privacy (SP).
[9] Philippe Aghion,et al. Artificial Intelligence and Economic Growth , 2017, The Economics of Artificial Intelligence.
[10] Jose M. Such,et al. Smart Home Personal Assistants , 2019, ACM Comput. Surv..
[11] Wenyuan Xu,et al. DolphinAttack: Inaudible Voice Commands , 2017, CCS.
[12] Alex X. Liu,et al. The Insecurity of Home Digital Voice Assistants - Amazon Alexa as a Case Study , 2017, ArXiv.
[13] Sarhan M. Musa,et al. Artificial Intelligence in Cyber Security , 2020 .
[14] Ahmad-Reza Sadeghi,et al. Security and privacy challenges in industrial Internet of Things , 2015, 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC).
[15] Alex X. Liu,et al. The Insecurity of Home Digital Voice Assistants - Vulnerabilities, Attacks and Countermeasures , 2018, 2018 IEEE Conference on Communications and Network Security (CNS).