Trust and Privacy in Digital Business最新文献

筛选
英文 中文
Protecting Android Apps Against Reverse Engineering by the Use of the Native Code 通过使用本机代码保护Android应用程序免受逆向工程
Trust and Privacy in Digital Business Pub Date : 2015-09-01 DOI: 10.1007/978-3-319-22906-5_8
Mykola Protsenko, Tilo Müller
{"title":"Protecting Android Apps Against Reverse Engineering by the Use of the Native Code","authors":"Mykola Protsenko, Tilo Müller","doi":"10.1007/978-3-319-22906-5_8","DOIUrl":"https://doi.org/10.1007/978-3-319-22906-5_8","url":null,"abstract":"","PeriodicalId":171055,"journal":{"name":"Trust and Privacy in Digital Business","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122255313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Designing Privacy-Aware Systems in the Cloud 在云中设计隐私感知系统
Trust and Privacy in Digital Business Pub Date : 2015-09-01 DOI: 10.1007/978-3-319-22906-5_9
Christos Kalloniatis
{"title":"Designing Privacy-Aware Systems in the Cloud","authors":"Christos Kalloniatis","doi":"10.1007/978-3-319-22906-5_9","DOIUrl":"https://doi.org/10.1007/978-3-319-22906-5_9","url":null,"abstract":"","PeriodicalId":171055,"journal":{"name":"Trust and Privacy in Digital Business","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129099007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
On the Efficacy of Static Features to Detect Malicious Applications in Android Android中静态特性检测恶意应用的有效性研究
Trust and Privacy in Digital Business Pub Date : 2015-09-01 DOI: 10.1007/978-3-319-22906-5_7
D. Geneiatakis, R. Satta, I. N. Fovino, R. Neisse
{"title":"On the Efficacy of Static Features to Detect Malicious Applications in Android","authors":"D. Geneiatakis, R. Satta, I. N. Fovino, R. Neisse","doi":"10.1007/978-3-319-22906-5_7","DOIUrl":"https://doi.org/10.1007/978-3-319-22906-5_7","url":null,"abstract":"","PeriodicalId":171055,"journal":{"name":"Trust and Privacy in Digital Business","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132562877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
VISIO: A Visual Approach for Singularity Detection in Recommendation Systems 推荐系统中奇异点检测的可视化方法
Trust and Privacy in Digital Business Pub Date : 2015-09-01 DOI: 10.1007/978-3-319-22906-5_3
A. Colantonio, R. D. Pietro, M. Petrocchi, A. Spognardi
{"title":"VISIO: A Visual Approach for Singularity Detection in Recommendation Systems","authors":"A. Colantonio, R. D. Pietro, M. Petrocchi, A. Spognardi","doi":"10.1007/978-3-319-22906-5_3","DOIUrl":"https://doi.org/10.1007/978-3-319-22906-5_3","url":null,"abstract":"","PeriodicalId":171055,"journal":{"name":"Trust and Privacy in Digital Business","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126867907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Security, Privacy and Usability - A Survey of Users' Perceptions and Attitudes 安全,隐私和可用性-用户的看法和态度的调查
Trust and Privacy in Digital Business Pub Date : 2015-09-01 DOI: 10.1007/978-3-319-22906-5_12
A. A. Abdulwahid, N. Clarke, I. Stengel, S. Furnell, C. Reich
{"title":"Security, Privacy and Usability - A Survey of Users' Perceptions and Attitudes","authors":"A. A. Abdulwahid, N. Clarke, I. Stengel, S. Furnell, C. Reich","doi":"10.1007/978-3-319-22906-5_12","DOIUrl":"https://doi.org/10.1007/978-3-319-22906-5_12","url":null,"abstract":"","PeriodicalId":171055,"journal":{"name":"Trust and Privacy in Digital Business","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133618513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A Taxonomy of Requirements for the Privacy Goal Transparency 隐私目标透明度的需求分类
Trust and Privacy in Digital Business Pub Date : 2015-09-01 DOI: 10.1007/978-3-319-22906-5_15
Rene Meis, Roman Wirtz, M. Heisel
{"title":"A Taxonomy of Requirements for the Privacy Goal Transparency","authors":"Rene Meis, Roman Wirtz, M. Heisel","doi":"10.1007/978-3-319-22906-5_15","DOIUrl":"https://doi.org/10.1007/978-3-319-22906-5_15","url":null,"abstract":"","PeriodicalId":171055,"journal":{"name":"Trust and Privacy in Digital Business","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114956929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Dynamic Deployment and Monitoring of Security Policies 安全策略的动态部署和监控
Trust and Privacy in Digital Business Pub Date : 2015-09-01 DOI: 10.1007/978-3-319-22906-5_14
J. Horcas, M. Pinto, L. Fuentes, Wissam Mallouli, Edgardo Montes de Oca
{"title":"Dynamic Deployment and Monitoring of Security Policies","authors":"J. Horcas, M. Pinto, L. Fuentes, Wissam Mallouli, Edgardo Montes de Oca","doi":"10.1007/978-3-319-22906-5_14","DOIUrl":"https://doi.org/10.1007/978-3-319-22906-5_14","url":null,"abstract":"","PeriodicalId":171055,"journal":{"name":"Trust and Privacy in Digital Business","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125160217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Privacy Preserving Framework for Big Data in e-Government Environments 电子政务环境下的大数据隐私保护框架
Trust and Privacy in Digital Business Pub Date : 2015-09-01 DOI: 10.1007/978-3-319-22906-5_16
Prokopios Drogkaris, Aristomenis Gritzalis
{"title":"A Privacy Preserving Framework for Big Data in e-Government Environments","authors":"Prokopios Drogkaris, Aristomenis Gritzalis","doi":"10.1007/978-3-319-22906-5_16","DOIUrl":"https://doi.org/10.1007/978-3-319-22906-5_16","url":null,"abstract":"","PeriodicalId":171055,"journal":{"name":"Trust and Privacy in Digital Business","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127923963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
The Design of a Configurable Reputation Service 一个可配置的信誉服务的设计
Trust and Privacy in Digital Business Pub Date : 2015-09-01 DOI: 10.1007/978-3-319-22906-5_5
C. Hillebrand, M. Coetzee
{"title":"The Design of a Configurable Reputation Service","authors":"C. Hillebrand, M. Coetzee","doi":"10.1007/978-3-319-22906-5_5","DOIUrl":"https://doi.org/10.1007/978-3-319-22906-5_5","url":null,"abstract":"","PeriodicalId":171055,"journal":{"name":"Trust and Privacy in Digital Business","volume":"228 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132187265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Hidden in Plain Sight. SDP-Based Covert Channel for Botnet Communication 隐藏在显而易见的地方。基于sdp的僵尸网络通信隐蔽通道
Trust and Privacy in Digital Business Pub Date : 2015-09-01 DOI: 10.1007/978-3-319-22906-5_4
Zisis Tsiatsikas, M. Anagnostopoulos, G. Kambourakis, Sozon Lambrou, D. Geneiatakis
{"title":"Hidden in Plain Sight. SDP-Based Covert Channel for Botnet Communication","authors":"Zisis Tsiatsikas, M. Anagnostopoulos, G. Kambourakis, Sozon Lambrou, D. Geneiatakis","doi":"10.1007/978-3-319-22906-5_4","DOIUrl":"https://doi.org/10.1007/978-3-319-22906-5_4","url":null,"abstract":"","PeriodicalId":171055,"journal":{"name":"Trust and Privacy in Digital Business","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128629829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信