Found: 6
Select item for more details and to access through your institution.
Vulnerabilities of Decentralized Additive Reputation Systems Regarding the Privacy of Individual Votes.
- Published in:
- Wireless Personal Communications, 2012, v. 66, n. 3, p. 559, doi. 10.1007/s11277-012-0734-z
- By:
- Publication type:
- Article
Towards Robustifying Image Classifiers against the Perils of Adversarial Attacks on Artificial Intelligence Systems.
- Published in:
- Sensors (14248220), 2022, v. 22, n. 18, p. 6905, doi. 10.3390/s22186905
- By:
- Publication type:
- Article
Arbitrary Code Injection through Self-propagating Worms in Von Neumann Architecture Devices.
- Published in:
- Computer Journal, 2010, v. 53, n. 10, p. 1576, doi. 10.1093/comjnl/bxq009
- By:
- Publication type:
- Article
People-centric sensing in assistive healthcare: Privacy challenges and directions.
- Published in:
- Security & Communication Networks, 2011, v. 4, n. 11, p. 1295, doi. 10.1002/sec.313
- By:
- Publication type:
- Article
Information and Future Internet Security, Trust and Privacy.
- Published in:
- Future Internet, 2022, v. 14, n. 12, p. 372, doi. 10.3390/fi14120372
- By:
- Publication type:
- Article
A Perfect Match: Converging and Automating Privacy and Security Impact Assessment On-the-Fly.
- Published in:
- Future Internet, 2021, v. 13, n. 2, p. 30, doi. 10.3390/fi13020030
- By:
- Publication type:
- Article