Publications
41 found
Show per page
Pavliv, Valentyna, Akbari, Nima, & 14th International Conference on the Internet of Things (IoT 2024), 172–175. https://doi.org/10.1145/3703790.3703841
. (2024). AI-powered Smart Toys: Interactive Friends or Surveillance Devices?
Pavliv, Valentyna, Akbari, Nima, & 14th International Conference on the Internet of Things (IoT 2024), 172–175. https://doi.org/10.1145/3703790.3703841
. (2024). AI-powered Smart Toys: Interactive Friends or Surveillance Devices?
Pallas, F., Koerner, K., Barbera, I., Hoepman, J.-H., Jensen, M., Narla, N. R., Samarin, N., Ulbricht, M.-R., Wagner, I., Wuyts, K., & Zimmermann, C. (2024). Privacy Engineering from Principles to Practice: A Roadmap. IEEE Security and Privacy, 22(2), 86–92. https://doi.org/10.1109/MSEC.2024.3363829
Pallas, F., Koerner, K., Barbera, I., Hoepman, J.-H., Jensen, M., Narla, N. R., Samarin, N., Ulbricht, M.-R., Wagner, I., Wuyts, K., & Zimmermann, C. (2024). Privacy Engineering from Principles to Practice: A Roadmap. IEEE Security and Privacy, 22(2), 86–92. https://doi.org/10.1109/MSEC.2024.3363829
Reisinger, Thomas, Boiten, Eerke Albert, & 2024 International Conference on Computing, Networking and Communications (ICNC). https://doi.org/10.1109/icnc59896.2024.10556130
. (2024, February 19). SEPPI: Secure and Privacy-Preserving Invitation for Unified Communication Meetings.
Reisinger, Thomas, Boiten, Eerke Albert, & 2024 International Conference on Computing, Networking and Communications (ICNC). https://doi.org/10.1109/icnc59896.2024.10556130
. (2024, February 19). SEPPI: Secure and Privacy-Preserving Invitation for Unified Communication Meetings.
Feldbusch, Julika, Pavliv, Valentyna, Akbari, Nima, & Privacy Technologies and Policy: 12th Annual Privacy Forum, APF 2024 (pp. 203–227). Springer Nature Switzerland. https://doi.org/10.1007/978-3-031-68024-3_11
. (2024). No transparency for smart toys. In Jensen, Meiko; Lauradoux, Cédric; Rannenberg, Kai (ed.),
Feldbusch, Julika, Pavliv, Valentyna, Akbari, Nima, & Privacy Technologies and Policy: 12th Annual Privacy Forum, APF 2024 (pp. 203–227). Springer Nature Switzerland. https://doi.org/10.1007/978-3-031-68024-3_11
. (2024). No transparency for smart toys. In Jensen, Meiko; Lauradoux, Cédric; Rannenberg, Kai (ed.),
10th ACM International Conference on Systems for Energy-Efficient Buildings, Cities, and Transportation, 340–346. https://doi.org/10.1145/3600100.3625377
, & Boiten, Eerke. (2023). Risks and benefits of smart toilets [Proceedings-article].
10th ACM International Conference on Systems for Energy-Efficient Buildings, Cities, and Transportation, 340–346. https://doi.org/10.1145/3600100.3625377
, & Boiten, Eerke. (2023). Risks and benefits of smart toilets [Proceedings-article].
Reisinger, Thomas, 2023 IEEE European Symposium on Security and Privacy Workshops. https://doi.org/10.1109/eurospw59978.2023.00021
, & Boiten, Eerke Albert. (2023, July 1). Unified Communication: What do Digital Activists need?
Reisinger, Thomas, 2023 IEEE European Symposium on Security and Privacy Workshops. https://doi.org/10.1109/eurospw59978.2023.00021
, & Boiten, Eerke Albert. (2023, July 1). Unified Communication: What do Digital Activists need?
ACM Transactions on Privacy and Security, 26(3), 32. https://doi.org/10.1145/3590152
. (2023). Privacy Policies Across the Ages: Content of Privacy Policies 1996-2021.
ACM Transactions on Privacy and Security, 26(3), 32. https://doi.org/10.1145/3590152
. (2023). Privacy Policies Across the Ages: Content of Privacy Policies 1996-2021.
Loft, Paul, He, Ying, Yevseyeva, Iryna, & Computers and Security, 122, 102877. https://doi.org/10.1016/j.cose.2022.102877
. (2022). CAESAR8: An agile enterprise architecture approach to managing information security risks.
Loft, Paul, He, Ying, Yevseyeva, Iryna, & Computers and Security, 122, 102877. https://doi.org/10.1016/j.cose.2022.102877
. (2022). CAESAR8: An agile enterprise architecture approach to managing information security risks.
Reisinger, Thomas, ACM Computing Surveys, 55(3), 55. https://doi.org/10.1145/3498335
, & Boiten, Eerke Albert. (2022). Security and Privacy in Unified Communication.
Reisinger, Thomas, ACM Computing Surveys, 55(3), 55. https://doi.org/10.1145/3498335
, & Boiten, Eerke Albert. (2022). Security and Privacy in Unified Communication.
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Vol. 13555 LNCS (pp. 3–23). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-3-031-17146-8_1
. (2022). A Machine Learning Approach to Detect Differential Treatment of Anonymous Users. In Atluri, Vijayalakshmi and Di Pietro, Roberto and Jensen, Christian D. and Meng, Weizhi (Ed.),
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Vol. 13555 LNCS (pp. 3–23). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-3-031-17146-8_1
. (2022). A Machine Learning Approach to Detect Differential Treatment of Anonymous Users. In Atluri, Vijayalakshmi and Di Pietro, Roberto and Jensen, Christian D. and Meng, Weizhi (Ed.),
Auditing Corporate Surveillance Systems: Research Methods for Greater Transparency. Cambridge University Press. https://doi.org/10.1017/9781108946940
. (2022).
Auditing Corporate Surveillance Systems: Research Methods for Greater Transparency. Cambridge University Press. https://doi.org/10.1017/9781108946940
. (2022).
Longitudinal Corpus of Privacy Policies [Data Set] [Zenodo]. https://doi.org/10.5281/zenodo.5841139
. (2022, January 1).
Longitudinal Corpus of Privacy Policies [Data Set] [Zenodo]. https://doi.org/10.5281/zenodo.5841139
. (2022, January 1).
Privacy Policies Across the Ages: Content and Readability of Privacy Policies 1996-2021. http://arxiv.org/abs/2201.08739
. (2022, January 1).
Privacy Policies Across the Ages: Content and Readability of Privacy Policies 1996-2021. http://arxiv.org/abs/2201.08739
. (2022, January 1).
Zhao, Yuchen, & IEEE Transactions on Dependable and Secure Computing, 19(1), 259–274. https://doi.org/10.1109/TDSC.2020.2980271
. (2022). Using Metrics Suites to Improve the Measurement of Privacy in Graphs.
Zhao, Yuchen, & IEEE Transactions on Dependable and Secure Computing, 19(1), 259–274. https://doi.org/10.1109/TDSC.2020.2980271
. (2022). Using Metrics Suites to Improve the Measurement of Privacy in Graphs.
Loft, Paul, He, Ying, Janicke, Helge, & Enterprise Information Systems, 15(4), 448–473. https://doi.org/10.1080/17517575.2019.1605000
. (2021). Dying of a hundred good symptoms: why good security can still fail - a literature review and analysis.
Loft, Paul, He, Ying, Janicke, Helge, & Enterprise Information Systems, 15(4), 448–473. https://doi.org/10.1080/17517575.2019.1605000
. (2021). Dying of a hundred good symptoms: why good security can still fail - a literature review and analysis.
ACM Transactions on Privacy and Security, 24(2), Article 12 (February 2021), 35 pages. https://doi.org/10.1145/3439405
, & Yevseyeva, Iryna. (2021). Designing Strong Privacy Metrics Suites Using Evolutionary Optimization.
ACM Transactions on Privacy and Security, 24(2), Article 12 (February 2021), 35 pages. https://doi.org/10.1145/3439405
, & Yevseyeva, Iryna. (2021). Designing Strong Privacy Metrics Suites Using Evolutionary Optimization.
Encyclopedia of Cryptography, Security and Privacy (pp. 1–3). Springer. https://doi.org/10.1007/978-3-642-27739-9_1736-1
. (2021). Location Semantics. In Jajodia, Sushil and Samarati, Pierangela and Yung, Moti (Ed.),
Encyclopedia of Cryptography, Security and Privacy (pp. 1–3). Springer. https://doi.org/10.1007/978-3-642-27739-9_1736-1
. (2021). Location Semantics. In Jajodia, Sushil and Samarati, Pierangela and Yung, Moti (Ed.),
Encyclopedia of Cryptography, Security and Privacy (pp. 1–4). Springer. https://doi.org/10.1007/978-3-642-27739-9_1530-1
. (2021). Measuring Location Privacy. In Jajodia, Sushil and Samarati, Pierangela and Yung, Moti (Ed.),
Encyclopedia of Cryptography, Security and Privacy (pp. 1–4). Springer. https://doi.org/10.1007/978-3-642-27739-9_1530-1
. (2021). Measuring Location Privacy. In Jajodia, Sushil and Samarati, Pierangela and Yung, Moti (Ed.),
Encyclopedia of Cryptography, Security and Privacy (pp. 1–5). Springer. https://doi.org/10.1007/978-3-642-27739-9_1543-1
, & Eckhoff, David. (2021). Privacy Metrics. In Jajodia, Sushil and Samarati, Pierangela and Yung, Moti (Ed.),
Encyclopedia of Cryptography, Security and Privacy (pp. 1–5). Springer. https://doi.org/10.1007/978-3-642-27739-9_1543-1
, & Eckhoff, David. (2021). Privacy Metrics. In Jajodia, Sushil and Samarati, Pierangela and Yung, Moti (Ed.),
Del Alamo, J. M., Such, J., Wagner, I., & Ramokapane, M. (2020). Preface on the International Workshop on Privacy Engineering 2020 (IWPE′20). Proceedings - 5th IEEE European Symposium on Security and Privacy Workshops, Euro S and PW 2020. https://doi.org/10.1109/EuroSPW51379.2020.00046
Del Alamo, J. M., Such, J., Wagner, I., & Ramokapane, M. (2020). Preface on the International Workshop on Privacy Engineering 2020 (IWPE′20). Proceedings - 5th IEEE European Symposium on Security and Privacy Workshops, Euro S and PW 2020. https://doi.org/10.1109/EuroSPW51379.2020.00046
Fairclough, Simon M., Giannetti, Cinzia, Colorimetric sensor for pH monitoring of liquid samples using bubble wrap and mobile phone camera. https://doi.org/10.1109/FLEPS49123.2020.9239445
, & Shakeel, Hamza. (2020, August 16).
Fairclough, Simon M., Giannetti, Cinzia, Colorimetric sensor for pH monitoring of liquid samples using bubble wrap and mobile phone camera. https://doi.org/10.1109/FLEPS49123.2020.9239445
, & Shakeel, Hamza. (2020, August 16).
Mothi, Dinesh, Janicke, Helge, & Forensic Science International: Digital Investigation, 33, 200904. https://doi.org/10.1016/j.fsidi.2020.200904
. (2020). A novel principle to validate digital forensic models.
Mothi, Dinesh, Janicke, Helge, & Forensic Science International: Digital Investigation, 33, 200904. https://doi.org/10.1016/j.fsidi.2020.200904
. (2020). A novel principle to validate digital forensic models.
Www `20, 315–316. https://doi.org/10.1145/3366424.3383116
. (2020). Methods of Corporate Surveillance: A Primer on Experimental Transparency Research.
Www `20, 315–316. https://doi.org/10.1145/3366424.3383116
. (2020). Methods of Corporate Surveillance: A Primer on Experimental Transparency Research.
Ferra, Fenia, Security and Privacy, 3(2), e101. https://doi.org/10.1002/spy2.101
, Boiten, Eerke, Hadlington, Lee, Psychoula, Ismini, & Snape, Richard. (2020). Challenges in Assessing Privacy Impact: Tales from the Front Lines.
Ferra, Fenia, Security and Privacy, 3(2), e101. https://doi.org/10.1002/spy2.101
, Boiten, Eerke, Hadlington, Lee, Psychoula, Ismini, & Snape, Richard. (2020). Challenges in Assessing Privacy Impact: Tales from the Front Lines.
Privacy Metrics Suites for Genomic Privacy, Vehicular Communications Privacy, and Graph Privacy (Version 1.0.0) [Data Set] [Zenodo]. https://doi.org/10.5281/zenodo.3350563
, & Yevseyeva, Iryna. (2020, January 1).
Privacy Metrics Suites for Genomic Privacy, Vehicular Communications Privacy, and Graph Privacy (Version 1.0.0) [Data Set] [Zenodo]. https://doi.org/10.5281/zenodo.3350563
, & Yevseyeva, Iryna. (2020, January 1).
Zeng, Wen, Bashir, Reem, Wood, Trevor, Siewe, Francois, Janicke, Helge, & EAI Endorsed Transactions on Cloud Systems, 6(18), 1–11. https://doi.org/10.4108/eai.13-7-2018.165236
. (2020). How Location-Aware Access Control Affects User Privacy and Security in Cloud Computing Systems.
Zeng, Wen, Bashir, Reem, Wood, Trevor, Siewe, Francois, Janicke, Helge, & EAI Endorsed Transactions on Cloud Systems, 6(18), 1–11. https://doi.org/10.4108/eai.13-7-2018.165236
. (2020). How Location-Aware Access Control Affects User Privacy and Security in Cloud Computing Systems.
ACM Computing Surveys, 51(3), 57:1–57:38. https://doi.org/10.1145/3168389
, & Eckhoff, David. (2019). Technical privacy metrics: A systematic survey.
ACM Computing Surveys, 51(3), 57:1–57:38. https://doi.org/10.1145/3168389
, & Eckhoff, David. (2019). Technical privacy metrics: A systematic survey.
Muhammad, Musa Abubakar, Ayesh, Aladdin, & Icfnds `19. https://doi.org/10.1145/3341325.3342004
. (2019, July 1). Behavior-based outlier detection for network access control systems.
Muhammad, Musa Abubakar, Ayesh, Aladdin, & Icfnds `19. https://doi.org/10.1145/3341325.3342004
. (2019, July 1). Behavior-based outlier detection for network access control systems.
Zhao, Yuchen, & IEEE Transactions on Mobile Computing, 18(2), 390–403. https://doi.org/10.1109/TMC.2018.2830359
. (2019). On the Strength of Privacy Metrics for Vehicular Communication.
Zhao, Yuchen, & IEEE Transactions on Mobile Computing, 18(2), 390–403. https://doi.org/10.1109/TMC.2018.2830359
. (2019). On the Strength of Privacy Metrics for Vehicular Communication.
Zhao, Yuchen, & POSTER: Evaluating privacy metrics for graph anonymization and de-anonymization. 817–819. https://doi.org/10.1145/3196494.3201586
. (2018).
Zhao, Yuchen, & POSTER: Evaluating privacy metrics for graph anonymization and de-anonymization. 817–819. https://doi.org/10.1145/3196494.3201586
. (2018).
Eckhoff, David, & IEEE Communications Surveys and Tutorials, 20(1), 489–516. https://doi.org/10.1109/COMST.2017.2748998
. (2018). Privacy in the Smart City - Applications, Technologies, Challenges, and Solutions.
Eckhoff, David, & IEEE Communications Surveys and Tutorials, 20(1), 489–516. https://doi.org/10.1109/COMST.2017.2748998
. (2018). Privacy in the Smart City - Applications, Technologies, Challenges, and Solutions.
Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 11025 LNCS, 225–241. https://doi.org/10.1007/978-3-030-00305-0_17
, & Boiten, Eerke. (2018). Privacy Risk Assessment: From Art to Science, by Metrics.
Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 11025 LNCS, 225–241. https://doi.org/10.1007/978-3-030-00305-0_17
, & Boiten, Eerke. (2018). Privacy Risk Assessment: From Art to Science, by Metrics.
Measuring Privacy in Vehicular Networks. 2017-October, 183–186. https://doi.org/10.1109/LCN.2017.33
. (2017).
Measuring Privacy in Vehicular Networks. 2017-October, 183–186. https://doi.org/10.1109/LCN.2017.33
. (2017).
ACM Transactions on Privacy and Security, 20(1), 2:1–2:34. https://doi.org/10.1145/3020003
. (2017). Evaluating the Strength of Genomic Privacy Metrics.
ACM Transactions on Privacy and Security, 20(1), 2:1–2:34. https://doi.org/10.1145/3020003
. (2017). Evaluating the Strength of Genomic Privacy Metrics.
Tailor, Neel, He, Ying, & Poster: Design ideas for privacy-aware user interfaces for mobile devices. 219–220. https://doi.org/10.1145/2939918.2942420
. (2016).
Tailor, Neel, He, Ying, & Poster: Design ideas for privacy-aware user interfaces for mobile devices. 219–220. https://doi.org/10.1145/2939918.2942420
. (2016).
ACM Transactions on Computing Education, 16(3), Article No. 11. https://doi.org/10.1145/2920173
. (2016). Gender and performance in computer science.
ACM Transactions on Computing Education, 16(3), Article No. 11. https://doi.org/10.1145/2920173
. (2016). Gender and performance in computer science.
User interface design for privacy awareness in eHealth technologies. 38–43. https://doi.org/10.1109/CCNC.2016.7444728
, He, Ying, Rosenberg, Duska, & Janicke, Helge. (2016).
User interface design for privacy awareness in eHealth technologies. 38–43. https://doi.org/10.1109/CCNC.2016.7444728
, He, Ying, Rosenberg, Duska, & Janicke, Helge. (2016).
Maglaras, Leandros A., Al-Bayatti, Ali H., He, Ying, Journal of Sensor and Actuator Networks, 5(1), 3. https://doi.org/10.3390/jsan5010003
, & Janicke, Helge. (2016). Social internet of vehicles for smart cities.
Maglaras, Leandros A., Al-Bayatti, Ali H., He, Ying, Journal of Sensor and Actuator Networks, 5(1), 3. https://doi.org/10.3390/jsan5010003
, & Janicke, Helge. (2016). Social internet of vehicles for smart cities.
Genomic privacy metrics: A systematic comparison. 50–59. https://doi.org/10.1109/SPW.2015.15
. (2015).
Genomic privacy metrics: A systematic comparison. 50–59. https://doi.org/10.1109/SPW.2015.15
. (2015).
Proceedings - Winter Simulation Conference, 2015-January, 3155–3166. https://doi.org/10.1109/WSC.2014.7020152
, & Eckhoff, David. (2015). Privacy assessment in vehicular networks using simulation.
Proceedings - Winter Simulation Conference, 2015-January, 3155–3166. https://doi.org/10.1109/WSC.2014.7020152
, & Eckhoff, David. (2015). Privacy assessment in vehicular networks using simulation.
A Measurement-Based Simulation Model of a Web Cluster.
, Hielscher, Kai-Steffen Jens, & German, Reinhard. (2005, January 1).
A Measurement-Based Simulation Model of a Web Cluster.
, Hielscher, Kai-Steffen Jens, & German, Reinhard. (2005, January 1).