[HTML][HTML] De-anonymization attack on geolocated data
S Gambs, MO Killijian, MN del Prado Cortez - Journal of Computer and …, 2014 - Elsevier
With the advent of GPS-equipped devices, a massive amount of location data is being
collected, raising the issue of the privacy risks incurred by the individuals whose movements …
collected, raising the issue of the privacy risks incurred by the individuals whose movements …
The ABC of ransomware protection
S Furnell, D Emm - Computer Fraud & Security, 2017 - Elsevier
'Your files have been encrypted!'These five words have the potential to instil alarm as the
realisation dawns that your system has fallen victim to ransomware. How it happened and …
realisation dawns that your system has fallen victim to ransomware. How it happened and …
Kernel dynamic policy programming: Applicable reinforcement learning to robot systems with high dimensional states
We propose a new value function approach for model-free reinforcement learning in Markov
decision processes involving high dimensional states that addresses the issues of …
decision processes involving high dimensional states that addresses the issues of …
Algorithms for destructive shift bribery
A Kaczmarczyk, P Faliszewski - Autonomous Agents and Multi-Agent …, 2019 - Springer
We study the complexity of Destructive Shift Bribery. In this problem, we are given an
election with a set of candidates and a set of voters (each ranking the candidates from the …
election with a set of candidates and a set of voters (each ranking the candidates from the …
Consensus-based secondary frequency control under denial-of-service attacks of distributed generations for microgrids
In this paper, Denial-of-Service (DoS) attacks on a microgrid (MG), especially on service-
provider-edge routers in the MG, are considered and analysed. To increase the tolerance of …
provider-edge routers in the MG, are considered and analysed. To increase the tolerance of …
VerifCar: a framework for modeling and model checking communicating autonomous vehicles
J Arcile, R Devillers, H Klaudel - Autonomous agents and multi-agent …, 2019 - Springer
This paper presents a framework, called VerifCar, devoted to the validation of decision
policies of communicating autonomous vehicles (CAVs). The approach focuses on the …
policies of communicating autonomous vehicles (CAVs). The approach focuses on the …
A novel trust-based false data detection method for power systems under false data injection attacks
B Xie, C Peng, M Yang, X Kong, T Zhang - Journal of the Franklin Institute, 2021 - Elsevier
This paper proposes a novel trust-based false data detection method for power systems
under false data injection attacks (FDIAs). In order to eliminate the interference posed by …
under false data injection attacks (FDIAs). In order to eliminate the interference posed by …
A methodology for modeling and measuring interdependencies of information and communications systems used for public administration and eGovernment services
A De Nicola, ML Villani, MC Brugnoli… - International Journal of …, 2016 - Elsevier
Abstract eGovernment services rely on information and communications critical
infrastructures. The management of an information and communications critical …
infrastructures. The management of an information and communications critical …
[PDF][PDF] Vehicular Communications
HM Song, J Woo, Y Chung - 2019 - researchgate.net
The implementation of electronics in modern vehicles has resulted in an increase in attacks
targeting invehicle networks; thus, attack detection models have caught the attention of the …
targeting invehicle networks; thus, attack detection models have caught the attention of the …