We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 41-60 of 5,708 results
  1. Leak Detection in Water Distribution Networks via Pressure Analysis Using a Machine Learning Ensemble

    Water distribution networks (WDNs) are vital infrastructure which serve as a means for public utilities to deliver potable water to consumers....
    Vivencio C. Fuentes, Jhoanna Rhodette I. Pedrasa in Society with Future: Smart and Liveable Cities
    Conference paper 2020
  2. Lib2Desc: automatic generation of security-centric Android app descriptions using third-party libraries

    Android app developers are expected to specify the use of dangerous permissions in their app descriptions. The absence of such data indicates...

    Beyza Cevik, Nur Altiparmak, ... Sevil Sen in International Journal of Information Security
    Article 04 August 2022
  3. BTFuzzer: A Profile-Based Fuzzing Framework for Bluetooth Protocols

    Bluetooth vulnerabilities have become increasingly popular in recent years due to, in part, the remote exploitability of Bluetooth. Unfortunately, in...
    Min Jang, Yuna Hwang, ... Hyoungshick Kim in Information Security and Cryptology – ICISC 2023
    Conference paper 2024
  4. Construction of Power System Communication Network Based on Edge Computing

    In order to overcome the problem of network congestion in the traditional cloud computing mode of power system, the author introduces edge computing...
    Shina Xu, Wenjuan Liang, ... Yuanbin Yao in Proceedings of Innovative Computing 2024, Vol. 2
    Conference paper 2024
  5. A study of accelerometer signal decay in small pipelines

    Accelerometers are a powerful tool when it comes to leak detection, especially in small pipelines. The increase in accelerometer research related to...

    Samer El-Zahab, Ibrahim Jazzar, Tarek Zayed in Signal, Image and Video Processing
    Article 05 October 2021
  6. PPLS: a privacy-preserving location-sharing scheme in mobile online social networks

    The recent proliferation of mobile devices has given rise to mobile online social networks (mOSNs), an emerging network paradigm that uses social...

    Chang Xu, Xuan **e, ... Mohsen Guizani in Science China Information Sciences
    Article 10 February 2020
  7. Atmospheric Dispersion Prediction for Toxic Gas Clouds by Using Machine Learning Approaches

    The to the frequent industrial accidents of chemical origin present today, some tools can predict atmospheric dispersion considering meteorological...
    Maria Ines Valle Rada, Bethsy Guerrero Granados, ... Miguel Ángel Jimeno Paba in Smart Technologies, Systems and Applications
    Conference paper 2023
  8. Value-utilized taint propagation: toward precise detection of apps’ information flows across Android API calls

    Android security researchers utilize taint analysis to uncover apps’ bugs and policy-violating behaviors. However, the investigations are unsafe...

    Hiroki Inayoshi, Shohei Kakei, ... Shoichi Saito in International Journal of Information Security
    Article 06 August 2022
  9. Intercept and Inject: DNS Response Manipulation in the Wild

    DNS is a protocol responsible for translating human-readable domain names into IP addresses. Despite being essential for many Internet services to...
    Yevheniya Nosyk, Qasim Lone, ... Maciej Korczyński in Passive and Active Measurement
    Conference paper 2023
  10. Listening Between the Bits: Privacy Leaks in Audio Fingerprints

    Audio content recognition is an emerging technology that forms the basis for mobile services, such as automatic song recognition, second-screen...
    Moritz Pfister, Robert Michael, ... Daniel Arp in Detection of Intrusions and Malware, and Vulnerability Assessment
    Conference paper 2024
  11. Survey of Techniques on Data Leakage Protection and Methods to address the Insider threat

    Data leakage is a problem that companies and organizations face every day around the world. Mainly the data leak caused by the internal threat posed...

    Isabel Herrera Montano, José Javier García Aranda, ... Joel J. P. C. Rodrigues in Cluster Computing
    Article Open access 14 July 2022
  12. Proving SIFA protection of masked redundant circuits

    Implementation attacks like side-channel and fault attacks pose a considerable threat to cryptographic devices that are physically accessible by an...

    Vedad Hadžić, Robert Primas, Roderick Bloem in Innovations in Systems and Software Engineering
    Article Open access 30 May 2022
  13. Location Independence

    In the not too distant past, most programs ran on a single computer. After the proliferation of JavaScript in the web browser, apps on mobile phones,...
    Michael L. Perry in The Art of Immutable Architecture
    Chapter 2020
  14. A Novel Location Privacy Protection Scheme with Generative Adversarial Network

    With the booming development of technology and location tracking, location-based services (LBSs) are widely used in mobile phone applications....
    Wenxi Wang, Weilong Zhang, ... Yuan Tian in Big Data and Security
    Conference paper 2020
  15. Privacy Concerns in Smart Indoor Environments in the Internet of Everything Era: A Smart University Campus Case Study

    In the Internet of Everything era, indoor environment provides multiple benefits across different domains to their occupants such as improving their...
    Andria Procopiou, Eliana Stavrou in Internet of Everything
    Conference paper 2024
  16. AI-enabled Underground Water Pipe non -destructive Inspection

    A study conducted by the World Bank indicated that the global annual economic losses from the water leakage are estimated at US$ 14.6 billion. For...

    Georgios-Fotios Angelis, Dimitrios Chorozoglou, ... Dimitrios Tzovaras in Multimedia Tools and Applications
    Article 13 July 2023
  17. A practical privacy-preserving nearest neighbor searching method over encrypted spatial data

    To realize the great flexibility and cost savings for providing location-based service, data owners are incentivized to migrate their data to cloud...

    **g Zhang, Chuanwen Li in The Journal of Supercomputing
    Article 04 April 2023
  18. Segmentations-Leak: Membership Inference Attacks and Defenses in Semantic Image Segmentation

    Today’s success of state of the art methods for semantic segmentation is driven by large datasets. Data is considered an important asset that needs...
    Yang He, Shadi Rahimian, ... Mario Fritz in Computer Vision – ECCV 2020
    Conference paper 2020
  19. Supporting secure dynamic alert zones using searchable encryption and graph embedding

    Location-based alerts have gained increasing popularity in recent years, whether in the context of healthcare (e.g., COVID-19 contact tracing),...

    Sina Shaham, Gabriel Ghinita, Cyrus Shahabi in The VLDB Journal
    Article Open access 18 July 2023
  20. An Innovative and Reliable Water Leak Detection Service Supported by Data-Intensive Remote Sensing Processing

    The WADI project (Water-tightness Airborne Detection Implementation), integrated within the H2020 initiative, is develo** an airborne water leak...
    Ricardo Martins, Alberto Azevedo, ... Alexandra Carvalho in Computational Science – ICCS 2019
    Conference paper 2019
Did you find what you were looking for? Share feedback.