Security and privacy challenges in smart cities
暂无分享,去创建一个
Benjamin C. M. Fung | Farkhund Iqbal | Babar Shah | Trevor Braun | B. Fung | B. Shah | Farkhund Iqbal | Trevor Braun
[1] Benjamin C. M. Fung,et al. Differentially private transit data publication: a case study on the montreal transportation system , 2012, KDD.
[2] M. Sen,et al. Issues of Privacy and Security in the Role of Software in Smart Cities , 2013, 2013 International Conference on Communication Systems and Network Technologies.
[3] Vachik S. Dave,et al. Feature Selection for Classification under Anonymity Constraint , 2015, Trans. Data Priv..
[4] Agusti Solanas,et al. The pursuit of citizens' privacy: a privacy-aware smart city is possible , 2013, IEEE Communications Magazine.
[5] Jordi Sabater-Mir,et al. Review on Computational Trust and Reputation Models , 2005, Artificial Intelligence Review.
[6] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[7] S. Shankar Sastry,et al. A Taxonomy of Cyber Attacks on SCADA Systems , 2011, 2011 International Conference on Internet of Things and 4th International Conference on Cyber, Physical and Social Computing.
[8] E.J. Byres,et al. Industrial cybersecurity for power system and SCADA networks , 2005, Record of Conference Papers Industry Applications Society 52nd Annual Petroleum and Chemical Industry Conference.
[9] Benjamin C. M. Fung,et al. Anonymizing trajectory data for passenger flow analysis , 2014 .
[10] Adam D. Smith,et al. Composition attacks and auxiliary information in data privacy , 2008, KDD.
[11] Vinay M. Igure,et al. Security issues in SCADA networks , 2006, Comput. Secur..
[12] Latanya Sweeney,et al. Achieving k-Anonymity Privacy Protection Using Generalization and Suppression , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[13] John R. Goodall,et al. Visualizing Cascading Failures in Critical Cyber Infrastructures , 2007, Critical Infrastructure Protection.
[14] Carlos E. Restrepo,et al. The next step: quantifying infrastructure interdependencies to improve security , 2006, Int. J. Crit. Infrastructures.
[15] Jordi Forné,et al. Reconciling privacy and efficient utility management in smart cities , 2014, Trans. Emerg. Telecommun. Technol..
[16] Zaheer Abbas Khan,et al. Towards Cloud Based Smart Cities Data Security and Privacy Management , 2014, 2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing.
[17] Dima Alhadidi,et al. Privacy-preserving data mashup model for trading person-specific information , 2016, Electron. Commer. Res. Appl..
[18] Adel Said Elmaghraby,et al. Cyber security challenges in Smart Cities: Safety, security and privacy , 2014, Journal of advanced research.
[19] Murat Kantarcioglu,et al. Privacy-aware dynamic feature selection , 2015, 2015 IEEE 31st International Conference on Data Engineering.
[20] James P. Peerenboom,et al. Identifying, understanding, and analyzing critical infrastructure interdependencies , 2001 .
[21] Pierangela Samarati,et al. Protecting Respondents' Identities in Microdata Release , 2001, IEEE Trans. Knowl. Data Eng..
[22] M. Dohler,et al. Security and Privacy in your Smart City , 2011 .
[23] Lior Rokach,et al. Privacy-preserving data mining: A feature set partitioning approach , 2010, Inf. Sci..
[24] Benjamin C. M. Fung,et al. Service-Oriented Architecture for High-Dimensional Private Data Mashup , 2012, IEEE Transactions on Services Computing.
[25] Mansoor Ahmed,et al. Smart Cities: A Survey on Security Concerns , 2016 .
[26] Cynthia Dwork,et al. Differential Privacy , 2006, ICALP.
[27] Philip S. Yu,et al. Differentially private data release for data mining , 2011, KDD.
[28] Daniel Kifer,et al. Attacks on privacy and deFinetti's theorem , 2009, SIGMOD Conference.
[29] Benjamin C. M. Fung,et al. Secure Two-Party Differentially Private Data Release for Vertically Partitioned Data , 2014, IEEE Transactions on Dependable and Secure Computing.