Zobrazeno 1 - 10
of 62
pro vyhledávání: '"Aksu, Hidayet"'
Autor:
Aksu, Hidayet, Ghazi, Badih, Kamath, Pritish, Kumar, Ravi, Manurangsi, Pasin, Sealfon, Adam, Varadarajan, Avinash V
The Privacy Sandbox Attribution Reporting API has been recently deployed by Google Chrome to support the basic advertising functionality of attribution reporting (aka conversion measurement) after deprecation of third-party cookies. The API implement
Externí odkaz:
http://arxiv.org/abs/2311.13586
Cyber-Physical Systems (CPS) play a significant role in our critical infrastructure networks from power-distribution to utility networks. The emerging smart-grid concept is a compelling critical CPS infrastructure that relies on two-way communication
Externí odkaz:
http://arxiv.org/abs/1912.00533
Autor:
Sikder, Amit Kumar, Babun, Leonardo, Celik, Z. Berkay, Acar, Abbas, Aksu, Hidayet, McDaniel, Patrick, Kirda, Engin, Uluagac, A. Selcuk
In a smart home system, multiple users have access to multiple devices, typically through a dedicated app installed on a mobile device. Traditional access control mechanisms consider one unique trusted user that controls the access to the devices. Ho
Externí odkaz:
http://arxiv.org/abs/1911.10186
Sensors (e.g., light, gyroscope, accelerometer) and sensing-enabled applications on a smart device make the applications more user-friendly and efficient. However, the current permission-based sensor management systems of smart devices only focus on
Externí odkaz:
http://arxiv.org/abs/1910.11138
Our everyday lives are expanding fast with the introduction of new Smart Home Systems (SHSs). Today, a myriad of SHS devices and applications are widely available to users and have already started to re-define our modern lives. Smart home users utili
Externí odkaz:
http://arxiv.org/abs/1910.03750
The ubiquitous nature of the IoT devices has brought serious security implications to its users. A lot of consumer IoT devices have little to no security implementation at all, thus risking user's privacy and making them target of mass cyber-attacks.
Externí odkaz:
http://arxiv.org/abs/1812.05558
Publikováno v:
IEEE Transactions on Sustainable Computing, 2018
With wearable devices such as smartwatches on the rise in the consumer electronics market, securing these wearables is vital. However, the current security mechanisms only focus on validating the user not the device itself. Indeed, wearables can be (
Externí odkaz:
http://arxiv.org/abs/1809.10387
Autor:
Acar, Abbas, Fereidooni, Hossein, Abera, Tigist, Sikder, Amit Kumar, Miettinen, Markus, Aksu, Hidayet, Conti, Mauro, Sadeghi, Ahmad-Reza, Uluagac, Selcuk
A myriad of IoT devices such as bulbs, switches, speakers in a smart home environment allow users to easily control the physical world around them and facilitate their living styles through the sensors already embedded in these devices. Sensor data c
Externí odkaz:
http://arxiv.org/abs/1808.02741
The smart grid concept has transformed the traditional power grid into a massive cyber-physical system that depends on advanced two-way communication infrastructure to integrate a myriad of different smart devices. While the introduction of the cyber
Externí odkaz:
http://arxiv.org/abs/1804.05106
One-time login process in conventional authentication systems does not guarantee that the identified user is the actual user throughout the session. However, it is necessary to re-verify the user identity periodically throughout a login session witho
Externí odkaz:
http://arxiv.org/abs/1802.10417