Uploads
Contact
/
Login
Upload
Search Results for 'Context Based Detection Of Privacy Violation'
Confronting and Reporting a Violation
myesha-ticknor
Mitigating IoT-based Cyberattacks on the Smart Grid
alida-meadow
Location Privacy Protection for Location-based Services
olivia-moreira
Object recognition (part 2)
kittie-lecroy
Traffic Signal Detection
danika-pritchard
ALARM-NET: Wireless Sensor Networks for Assisted-Living
liane-varnes
Edge-Detection and Wavelet Transform
liane-varnes
Automatic Detection of Spamming and Phishing
conchita-marotz
Deceiving the Deceived: Some Fundamentals for Deception and Detection
tawny-fly
TIPPERS ( T estbed for
tatiana-dople
Data Mining Anomaly/Outlier Detection
cheryl-pisano
Community Detection and Graph-based Clustering
lois-ondreau
On the Node Clone Detection
kittie-lecroy
Non Profit and Faith Based Agencies, and the role of Inform
yoshiko-marsland
Anomalous Payload Based Worm Detection
yoshiko-marsland
Commonly Confused Words
pamella-moone
Feature extraction for change detection
luanne-stotts
Intruders
olivia-moreira
As defined in the Generally Accepted Privacy Principles, “privacy” refers to the
pamella-moone
Surveillance of unusual events in the context of influenza
calandra-battersby
W3C Government Linked Data Working Group
mitsue-stanley
Location Privacy
pamella-moone
Botnet: Classification, Attacks, Detection, Tracing,
ellena-manuel
Radio Tomographic Imaging for Fall Detection
kittie-lecroy
1
2
3
4
5
6
7
8
9