An extensive study on the evolution of context-aware personalized travel recommender systems
S Renjith, A Sreekumar, M Jathavedan - Information Processing & …, 2020 - Elsevier
Ever since the beginning of civilization, travel for various causes exists as an essential part
of human life so as travel recommendations, though the early form of recommendations …
of human life so as travel recommendations, though the early form of recommendations …
Are we aware? an empirical study on the privacy and security awareness of smartphone sensors
Smartphones are equipped with a wide variety of sensors, which can pose significant
security and privacy risks if not properly protected. To assess the privacy and security risks of …
security and privacy risks if not properly protected. To assess the privacy and security risks of …
SeCoMan: A semantic-aware policy framework for developing privacy-preserving and context-aware smart applications
This paper is intended to provide a solution for developing context-aware smart applications
preserving the users' privacy in the Internet of Things (IoT). In this sense, we present a …
preserving the users' privacy in the Internet of Things (IoT). In this sense, we present a …
Knowledge management and social media: A scientometrics survey
E Zarei, A Jabbarzadeh - International Journal of Data and …, 2019 - m.growingscience.com
The purpose of this research is to study the role of the social media for knowledge sharing.
The study presents a comprehensive review of the researches associated with the effect of …
The study presents a comprehensive review of the researches associated with the effect of …
Context sensitive access control in smart home environments
S Dutta, SSL Chukkapalli, M Sulgekar… - 2020 IEEE 6th Intl …, 2020 - ieeexplore.ieee.org
The rise in popularity of Internet of Things (IoT) devices has opened doors for privacy and
security breaches in Cyber-Physical systems like smart homes, smart vehicles, and smart …
security breaches in Cyber-Physical systems like smart homes, smart vehicles, and smart …
Privacy leakage in mobile computing: Tools, methods, and characteristics
The number of smartphones, tablets, sensors, and connected wearable devices are rapidly
increasing. Today, in many parts of the globe, the penetration of mobile computers has …
increasing. Today, in many parts of the globe, the penetration of mobile computers has …
Securing enterprise data on smartphones using run time information flow control
P Kodeswaran, V Nandakumar… - 2012 IEEE 13th …, 2012 - ieeexplore.ieee.org
There is an increasing penetration of smart phones within enterprises. Most smart phone
users now run both enterprise as well as personal applications simultaneously on their …
users now run both enterprise as well as personal applications simultaneously on their …
User-centric social context information management: an ontology-based approach and platform
Social context information has been used with encouraging results in developing socially
aware applications in different domains. However, users' social context information is …
aware applications in different domains. However, users' social context information is …
Privacy control in smart phones using semantically rich reasoning and context modeling
We present our ongoing work on user data and contextual privacy preservation in mobile
devices through semantic reasoning. Recent advances in context modeling, tracking and …
devices through semantic reasoning. Recent advances in context modeling, tracking and …
PRECISE: Privacy-aware recommender based on context information for cloud service environments
Context-aware systems based on location open up new possibilities to users in terms of
acquiring custom services by gathering context information, especially in systems where the …
acquiring custom services by gathering context information, especially in systems where the …