Mostrando 7 resultados de: 7
Filtros aplicados
Publisher
Engineering Applications of Artificial Intelligence(2)
Computer Standards and Interfaces(1)
Expert Systems with Applications(1)
IEEE Access(1)
Proceedings of the International ISCRAM Conference(1)
Área temáticas
Ciencias de la computación(6)
Programación informática, programas, datos, seguridad(2)
Biblioteconomía y Documentación informatica(1)
Ciencias sociales(1)
Área de conocimiento
Ciencias de la computación(2)
Comunicación(2)
Optimización matemática(2)
Algoritmo(1)
Aprendizaje automático(1)
A collaborative protocol for anonymous reporting in vehicular ad hoc networks
ArticleAbstract: Vehicular ad hoc networks (VANETs) have emerged to leverage the power of modern communication technoPalabras claves:Anonymous reporting, Anonymous-communication systems, Crowds protocol, Multi-hop routing, Vehicular ad hoc networksAutores:Forné J., Luis Felipe Urquiza-Aguiar, Mónica Aguilar Igartua, Pallares-Segarra E., Parra-Arnau J., Rebollo-Monedero D., Tripp-Barba C.Fuentes:googlescopusAnonymizing cybersecurity data in critical infrastructures: The CIPSec approach
Conference ObjectAbstract: Cybersecurity logs are permanently generated by network devices to describe security incidents. WithPalabras claves:CIPSEC, Critical infrastructures, data anonymization, privacy, Security logsAutores:Burgos R.T., Forné J., José Estrada-Jiménez, Rebollo-Monedero D., Rodríguez R.D., Rodríguez-Hoyos A., Romero A.Á.Fuentes:googlescopusDoes k-Anonymous Microaggregation Affect Machine-Learned Macrotrends?
ArticleAbstract: In the era of big data, the availability of massive amounts of information makes privacy protectionPalabras claves:k-anonymity, large-scale databases, Machine learning, Microaggregation, privacyAutores:Forné J., José Estrada-Jiménez, Parra-Arnau J., Rebollo-Monedero D., Rodríguez-Hoyos A.Fuentes:googlescopusThe Fast Maximum Distance to Average Vector (F-MDAV): An algorithm for k-anonymous microaggregation in big data
ArticleAbstract: The massive exploitation of tons of data is currently guiding critical decisions in domains such asPalabras claves:BIG DATA, Data privacy, k-anonymous microaggregation, MDAV, SpeedupAutores:Forné J., José Estrada-Jiménez, Mohamad Mezher A., Parra-Arnau J., Rebollo-Monedero D., Rodríguez-Hoyos A.Fuentes:googlescopusOn collaborative anonymous communications in lossy networks
ArticleAbstract: Message encryption does not prevent eavesdroppers from unveiling who is communicating with whom, whePalabras claves:Anonymous communications, Crowds, Lossy, wireless and vehicular networks, Quality of serviceAutores:Forné J., Luis Felipe Urquiza-Aguiar, Mónica Aguilar Igartua, Pallares-Segarra E., Parra-Arnau J., Rebollo-Monedero D., Tripp-Barba C.Fuentes:scopusMathematically optimized, recursive prepartitioning strategies for k-anonymous microaggregation of large-scale datasets
ArticleAbstract: The technical contents of this work fall within the statistical disclosure control (SDC) field, whicPalabras claves:Data privacy, k-anonymity, Large-scale datasets, Microaggregation, Optimized prepartitioning, Statistical disclosure controlAutores:Forné J., José Estrada-Jiménez, Mohamad Mezher A., Pallares-Segarra E., Rebollo-Monedero D., Rodríguez-Hoyos A.Fuentes:googlescopusPreserving empirical data utility in k-anonymous microaggregation via linear discriminant analysis
ArticleAbstract: Today's countless benefits of exploiting data come with a hefty price in terms of privacy. k-AnonymoPalabras claves:Data privacy, Data utility, Lda, Microaggregation, Statistical disclosure controlAutores:Forné J., José Estrada-Jiménez, Luis Felipe Urquiza-Aguiar, Rebollo-Monedero D., Rodríguez-Hoyos A.Fuentes:googlescopus