Zobrazeno 1 - 9
of 9
pro vyhledávání: '"Prajit Kumar Das"'
Autor:
Prajit Kumar Das, Sai Sree Laya Chukkapalli, Sofia Dutta, Madhura Sulgekar, Anupam Joshi, Swathi Krithivasan
Publikováno v:
BigDataSecurity/HPSC/IDS
2020 IEEE 6th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing, (HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS), 25-27 May 2020, Baltimore, MD, USA, U
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::491d5dc2fa1eb98567a73f763e2d28de
Mobile Application Development, Usability and Security, Sougata Mukherjea (Ed.)
Contemporary smartphones are capable of generating and transmitting large amounts of data about their users. Recent advances in collaborative context modeling combin
Contemporary smartphones are capable of generating and transmitting large amounts of data about their users. Recent advances in collaborative context modeling combin
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::b01bdae9006e6dad2be69311c2492839
https://doi.org/10.4018/978-1-5225-8897-9.ch020
https://doi.org/10.4018/978-1-5225-8897-9.ch020
Publikováno v:
CIC
3rd IEEE International Conference on Collaboration and Internet Computing
Context-sensitive access control has been a research topic within mobile computing for more than a decade. Much of the work has focused on modeling context and representin
Context-sensitive access control has been a research topic within mobile computing for more than a decade. Much of the work has focused on modeling context and representin
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::907dc0152211a44e03f1618168dc3fd7
Publikováno v:
INFOCOM Workshops
System calls provide an interface to the services made available by an operating system. As a result, any functionality provided by a software application eventually reduces to a set of fixed system calls. Since system calls have been used in literat
International Symposium on Foundations of Open Source Intelligence and Security Informatics
In order to secure vital personal and organizational system we require timely intelligence on cybersecurity threats and vulnerabilities. Intelligence abo
In order to secure vital personal and organizational system we require timely intelligence on cybersecurity threats and vulnerabilities. Intelligence abo
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::e9c59c24e76a57e4d66ec00a8978dfd6
Publikováno v:
CIC
2nd IEEE International Conference on Collaboration and Internet Computing (CIC 2016), Pittsburgh, PA, USA, November 1-3, 2016
As of 2016, there are more mobile devices than humans on earth. Today, mobile devices are a critical part of our lives
As of 2016, there are more mobile devices than humans on earth. Today, mobile devices are a critical part of our lives
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::80e60d4271bc9ba3ba6cc8d24cc3b762
Autor:
Sandeep Narayanan, Tim Finin, Nitin Kumar Sharma, Karuna Pande Joshi, Prajit Kumar Das, Anupam Joshi
Publikováno v:
SMARTCOMP
2016 IEEE International Conference on Smart Computing (SMARTCOMP)
According to recent media reports, there has been a surge in the number of devices that are being connected to the Internet. The Internet of Things (IoT), also referred to as Cybe
According to recent media reports, there has been a surge in the number of devices that are being connected to the Internet. The Internet of Things (IoT), also referred to as Cybe
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::255284e83652901720a665617c3443af
Publikováno v:
MobiSys
Proceedings of the 12th Annual International Conference on Mobile Systems, Applications, and Services
FaceBlock takes regular pictures taken by your smartphone or Google Glass as input and converts them into Privacy-Aware Pictures. These picture
FaceBlock takes regular pictures taken by your smartphone or Google Glass as input and converts them into Privacy-Aware Pictures. These picture
Publikováno v:
ACM SIGMOBILE Mobile Computing and Communications Review. 17:34-35
SIGMOBILE Mob. Comput. Commun. Rev.
Modern smartphones are capable of gathering massive amounts of data about a user and her context. While this data is mostly utilized for providing services that are better suited to the user, user data and con
Modern smartphones are capable of gathering massive amounts of data about a user and her context. While this data is mostly utilized for providing services that are better suited to the user, user data and con