|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 60 occurrences of 49 keywords
|
|
|
Results
Found 90 publication records. Showing 86 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
75 | Ken Layng |
Non-technical keys to keeping your personally identifiable information PII risk mitigation project on track. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGUCCS ![In: Proceedings of the ACM SIGUCCS Fall Conference on User Services 2009, St. Louis, Missouri, USA, October 11-14, 2009, pp. 223-228, 2009, ACM, 978-1-60558-477-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
PII, non-technical, management, efficiency, encryption, project, risks, strategy, sensitive, scanning, data, team, remediation, mitigate |
73 | Larry Korba, Yunli Wang, Liqiang Geng, Ronggong Song, George Yee, Andrew S. Patrick, Scott Buffett, Hongyu Liu, Yonghua You |
Private Data Discovery for Privacy Compliance in Collaborative Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CDVE ![In: Cooperative Design, Visualization, and Engineering, 5th International Conference, CDVE 2008, Calvià, Mallorca, Spain, September 21-25, 2008, Proceedings, pp. 142-150, 2008, Springer, 978-3-540-88010-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
machine learning, privacy, text mining, compliance, Collaborative computing, privacy management, personally identifiable information |
55 | Shenoda Guirguis, Alok Pareek |
BronzeGate: real-time transactional data obfuscation for GoldenGate. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDBT ![In: EDBT 2010, 13th International Conference on Extending Database Technology, Lausanne, Switzerland, March 22-26, 2010, Proceedings, pp. 645-650, 2010, ACM, 978-1-60558-945-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
data obfuscation, real-time transactional data management, security, privacy, usability, masking |
55 | Balachander Krishnamurthy, Craig E. Wills |
On the leakage of personally identifiable information via online social networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSN ![In: Proceedings of the 2nd ACM Workshop on Online Social Networks, WOSN 2009, Barcelona, Spain, August 17, 2009, pp. 7-12, 2009, ACM, 978-1-60558-445-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
privacy, online social networks, personally identifiable information |
55 | Enyue Lu, S. Q. Zheng 0001 |
A Parallel Iterative Improvement Stable Matching Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HiPC ![In: High Performance Computing - HiPC 2003, 10th International Conference, Hyderabad, India, December 17-20, 2003, Proceedings, pp. 55-65, 2003, Springer, 3-540-20626-4. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
53 | Eidan J. Rosado |
PII-Codex: a Python library for PII detection, categorization, and severity assessment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Open Source Softw. ![In: J. Open Source Softw. 8(87), pp. 5402, July 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
53 | Ajinkya Deshmukh, Saumya Banthia, Anantha Sharma |
Life of PII - A PII Obfuscation Transformer. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2305.09550, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
40 | Tomi Kokkonen, Nils Ehrenberg, Polaris Koi, Pii Telakivi, Tuomas Vesterinen |
Beyond Robot Therapy: Embodied AI, Mental Healthcare, and Value Sensitive Design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Robophilosophy ![In: Social Robots in Social Institutions - Proceedings of Robophilosophy 2022, Helsinki, Finland, August 16-19, 2022, pp. 683-687, 2022, IOS Press, 978-1-64368-374-4. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
40 | Pii Telakivi |
The Robotic Home: New Tools or Extended Cognitive Agency? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Robophilosophy ![In: Social Robots in Social Institutions - Proceedings of Robophilosophy 2022, Helsinki, Finland, August 16-19, 2022, pp. 695-701, 2022, IOS Press, 978-1-64368-374-4. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
40 | Jose Oscar Fajardo, Fidel Liberal, Ioannis Giannoulakis, Emmanouil Kafetzakis, Vincenzo Pii, Irena Trajkovska, Thomas Michael Bohnert, Leonardo Goratti, Roberto Riggio, Javier Garcia Lloreda, Pouria Sayyad Khodashenas, Michele Paolino, Pavel Bliznakov, Jordi Pérez-Romero, Claudio Meani, Ioannis P. Chochliouros, Maria Belesioti |
Introducing Mobile Edge Computing Capabilities through Distributed 5G Cloud Enabled Small Cells. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mob. Networks Appl. ![In: Mob. Networks Appl. 21(4), pp. 564-574, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
40 | Massimiliano Donati, Sergio Saponara, Luca Fanucci, Walter Errico, Annamaria Colonna, Giuseppe Piscopiello, Giovanni Tuccio, Franco Bigongiari, Maximilian Odendahl, Rainer Leupers, Antonio Spada, Vincenzo Pii, Elena Cordiviola, Francesco Nuzzolo, Frederic Reiter |
A New Space Digital Signal Processor Design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ApplePies ![In: Applications in Electronics Pervading Industry, Environment and Society - APPLEPIES 2013, Rome, Italy, March 7-8, 2013, pp. 51-60, 2013, Springer, 978-3-319-04369-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
40 | Novella Buonaccorsi, Claudio Cicconetti, Raffaella Mambrini, Vincenzo Pii |
Experience on the demonstration of the ETSI M2M architecture release 1. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Future Network & Mobile Summit ![In: 2012 Future Network & Mobile Summit, Berlin, Germany, July 4-6, 2012, pp. 1-7, 2012, IEEE, 978-1-4673-0320-0. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
40 | Nandakishore Kushalnagar, Gabriel Montenegro, Christian Peter Pii Schumacher |
IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs): Overview, Assumptions, Problem Statement, and Goals. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 4919, pp. 1-12, August 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
40 | Charlotte Pii Lunau |
Three Practical Experiences of Using Reflection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECOOP Workshops ![In: Object-Oriented Technology, ECOOP'98 Workshop Reader, ECOOP'98 Workshops, Demos, and Posters, Brussels, Belgium, July 20-24, 1998, Proceedings, pp. 392-393, 1998, Springer, 3-540-65460-7. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
40 | Charlotte Pii Lunau |
Is Composition of Metaobjects = Aspect Oriented Programming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECOOP Workshops ![In: Object-Oriented Technology, ECOOP'98 Workshop Reader, ECOOP'98 Workshops, Demos, and Posters, Brussels, Belgium, July 20-24, 1998, Proceedings, pp. 442, 1998, Springer, 3-540-65460-7. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
40 | Charlotte Pii Lunau |
A Reflective Architecture for Process Control Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECOOP ![In: ECOOP'97 - Object-Oriented Programming, 11th European Conference, Jyväskylä, Finland, June 9-13, 1997, Proceedings, pp. 170-189, 1997, Springer, 3-540-63089-9. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
Adaptability, Reflection, Composability |
36 | Yi Zheng, Yongming Chen, Patrick C. K. Hung |
Privacy Access Control Model with Location Constraints for XML Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDE Workshops ![In: Proceedings of the 23rd International Conference on Data Engineering Workshops, ICDE 2007, 15-20 April 2007, Istanbul, Turkey, pp. 371-378, 2007, IEEE Computer Society, 978-1-4244-0831-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
36 | Wynand van Staden, Martin S. Olivier |
SQL's revoke with a view on privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAICSIT ![In: Proceedings of the 2007 Annual Conference of the South African Institute of Computer Scientists and Information Technologists on IT Research in Developing Countries, SAICSIT 2007, Port Elizabeth, South Africa, October 2-3, 2007, pp. 181-188, 2007, ACM, 978-1-59593-775-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
compound purposes, purpose binding, privacy, access control, SQL |
36 | Tariq Ehsan Elahi, Siani Pearson |
Privacy Assurance: Bridging the Gap Between Preference and Practice. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustBus ![In: Trust, Privacy and Security in Digital Business, 4th International Conference, TrustBus 2007, Regensburg, Germany, September 3-7, 2007, Proceedings, pp. 65-74, 2007, Springer, 978-3-540-74408-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
36 | Wynand van Staden, Martin S. Olivier |
Using Purpose Lattices to Facilitate Customisation of Privacy Agreements. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustBus ![In: Trust, Privacy and Security in Digital Business, 4th International Conference, TrustBus 2007, Regensburg, Germany, September 3-7, 2007, Proceedings, pp. 201-209, 2007, Springer, 978-3-540-74408-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
36 | Tuomas Aura, Thomas A. Kuhn, Michael Roe |
Scanning electronic documents for personally identifiable information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2006 ACM Workshop on Privacy in the Electronic Society, WPES 2006, Alexandria, VA, USA, October 30, 2006, pp. 41-50, 2006, ACM, 1-59593-556-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
privacy, metadata, personally identifiable information |
36 | Sebastian Clauß |
A Framework for Quantification of Linkability Within a Privacy-Enhancing Identity Management System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ETRICS ![In: Emerging Trends in Information and Communication Security, International Conference, ETRICS 2006, Freiburg, Germany, June 6-9, 2006, Proceedings, pp. 191-205, 2006, Springer, 3-540-34640-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
36 | David Byer, Colin Depradine |
Autonomous collaborative web agents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISICT ![In: Proceedings of the Intenational Symposium on Information and Communication Technologies, Las Vegas, Nevada, USA, June 16-18, 2004, pp. 92-96, 2004, Trinity College Dublin, 1-59593-170-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
java, internet, software agents, cooperative agents |
30 | Naotaka Kato, Kazunori Matsushita, Makoto Arisawa |
A Utility for Showing Program Integrated Information Changes between Versions in a Translation Verification Test. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISUC ![In: ISUC 2008, Second International Symposium on Universal Communication, Osaka, Japan, 15-16 December 2008, pp. 330-337, 2008, IEEE Computer Society, 978-0-7695-3433-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Translation Verification Test, Program Integrated Information, PII, TVT, GUI, Translation |
29 | Pelin Angin, Bharat K. Bhargava, Rohit Ranchal, Noopur Singh, Mark Linderman, Lotfi Ben Othmane, Leszek Lilien |
An Entity-Centric Approach for Privacy and Identity Management in Cloud Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SRDS ![In: 29th IEEE Symposium on Reliable Distributed Systems (SRDS 2010), New Delhi, Punjab, India, October 31 - November 3, 2010, pp. 177-183, 2010, IEEE Computer Society, 978-0-7695-4250-8. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
active bundles, identity management (IDM), personally identifiable information (PII), anonymous identification, zero-knowledge proofs (ZKP), security, privacy, cloud computing, privacy-enhancing technologies (PET) |
29 | Hsu-Hui Lee, Mark Stamp 0001 |
P3P privacy enhancing agent. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SWS ![In: Proceedings of the 3rd ACM Workshop On Secure Web Services, SWS 2006, Alexandria, VA, USA, November 3, 2006, pp. 109-110, 2006, ACM, 1-59593-546-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
personal identifiable information (PII), platform for privacy preference (P3P), ontology, privacy, software agent |
27 | Tobias Weber |
Update 2.5 to "Takin: An open-source software for experiment planning, visualisation, and data analysis", (PII: S2352711016300152). ![Search on Bibsonomy](Pics/bibsonomy.png) |
SoftwareX ![In: SoftwareX 23, pp. 101471, July 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Ángel Merino, José González Cabañas, Ángel Cuevas, Rubén Cuevas |
Analysis and implementation of nanotargeting on LinkedIn based on publicly available non-PII. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2310.10155, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Ha Dao, Quoc-Huy Vo, Tien-Huy Pham, Kensuke Fukuda |
I Never Trust My University for This! Investigating Student PII Leakage at Vietnamese Universities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Inf. Syst. ![In: IEICE Trans. Inf. Syst. 106(12), pp. 2048-2056, December 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Rishika Kohli, Shreyas Chatterjee, Shaifu Gupta, Manoj Singh Gaur |
Tracking PII ex-filtration: Exploring decision tree and neural network with explainable AI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ANTS ![In: IEEE International Conference on Advanced Networks and Telecommunications Systems, ANTS 2023, Jaipur, India, December 17-20, 2023, pp. 183-188, 2023, IEEE, 979-8-3503-0767-2. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Md. Rakibul Islam, Anne V. D. M. Kayem, Christoph Meinel |
Enabling PII Discovery in Textual Data via Outlier Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA (2) ![In: Database and Expert Systems Applications - 34th International Conference, DEXA 2023, Penang, Malaysia, August 28-30, 2023, Proceedings, Part II, pp. 209-216, 2023, Springer, 978-3-031-39820-9. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
27 | George Hamilton, Medina Williams, Tahir M. Khan |
Securing Personally Identifiable Information (PII) in Personal Financial Statements. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FICC (2) ![In: Advances in Information and Communication - Proceedings of the 2023 Future of Information and Communication Conference (FICC), Volume 2, San Francisco, CA, USA, 2-3 March 2023., pp. 709-728, 2023, Springer, 978-3-031-28072-6. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Jaikishan Jaikumar, Mohana, Pavankumar Suresh |
Privacy-Preserving Personal Identifiable Information (PII) Label Detection Using Machine Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCCNT ![In: 14th International Conference on Computing Communication and Networking Technologies, ICCCNT 2023, Delhi, India, July 6-8, 2023, pp. 1-5, 2023, IEEE, 979-8-3503-3509-5. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Ángel Merino, José González Cabañas, Ángel Cuevas, Rubén Cuevas |
Poster: Analysis of User Uniqueness on LinkedIn Based on Publicly Available Non-PII. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMC ![In: Proceedings of the 2023 ACM on Internet Measurement Conference, IMC 2023, Montreal, QC, Canada, October 24-26, 2023, pp. 726-727, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Yu-Chih Wei, Tzu-Yin Liao, Wei-Chen Wu |
Using machine learning to detect PII from attributes and supporting activities of information assets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Supercomput. ![In: J. Supercomput. 78(7), pp. 9392-9413, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
27 | Courtney Mansfield, Amandalynne Paullada, Kristen Howell |
Behind the Mask: Demographic bias in name detection for PII masking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2205.04505, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
27 | Qiying Dong, Ding Wang 0002, Yaosheng Shen, Chunfu Jia |
PII-PSM: A New Targeted Password Strength Meter Using Personally Identifiable Information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: Security and Privacy in Communication Networks - 18th EAI International Conference, SecureComm 2022, Virtual Event, October 2022, Proceedings, pp. 648-669, 2022, Springer, 978-3-031-25537-3. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
27 | Courtney Mansfield, Amandalynne Paullada, Kristen Howell |
Behind the Mask: Demographic bias in name detection for PII masking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LT-EDI ![In: Proceedings of the Second Workshop on Language Technology for Equality, Diversity and Inclusion, LT-EDI 2022, Dublin, Ireland, May 27, 2022, pp. 76-89, 2022, Association for Computational Linguistics, 978-1-955917-43-8. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
27 | Dennis Roellke |
Detection, Triage, and Attribution of PII Phishing Sites ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2022 |
DOI RDF |
|
27 | Alexander G. Demidov, B. Lakshitha A. Perera, Michael E. Fortunato, Sibo Lin, Coray M. Colina |
Update 1.1 to "pysimm: A python package for simulation of molecular systems", (PII: S2352711016300395). ![Search on Bibsonomy](Pics/bibsonomy.png) |
SoftwareX ![In: SoftwareX 15, pp. 100749, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
27 | Tobias Weber |
Update 2.0 to "Takin: An open-source software for experiment planning, visualisation, and data analysis", (PII: S2352711016300152). ![Search on Bibsonomy](Pics/bibsonomy.png) |
SoftwareX ![In: SoftwareX 14, pp. 100667, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
27 | Aleksandr Yurievich Yurin, Nikita Olegovich Dorodnykh, Olga Anatolievna Nikolaychuk |
Update (4.2020.0303) to "Personal Knowledge Base Designer: Software for expert systems prototyping", (PII: S2352711019303334). ![Search on Bibsonomy](Pics/bibsonomy.png) |
SoftwareX ![In: SoftwareX 16, pp. 100825, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
27 | Joseph C. Ferguson, Federico Semeraro, John M. Thornton, Francesco Panerai, Arnaud Borner, Nagi N. Mansour |
Update 3.0 to "PuMA: The Porous Microstructure Analysis software", (PII: S2352711018300281). ![Search on Bibsonomy](Pics/bibsonomy.png) |
SoftwareX ![In: SoftwareX 15, pp. 100775, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
27 | Yizhi Liu, Fang Yu Lin, Mohammadreza Ebrahimi, Weifeng Li 0002, Hsinchun Chen |
Automated PII Extraction from Social Media for Raising Privacy Awareness: A Deep Transfer Learning Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2111.09415, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
27 | José González Cabañas, Ángel Cuevas, Rubén Cuevas, Juan López-Fernández, David García 0001 |
Unique on Facebook: Formulation and Evidence of (Nano)targeting Individual Users with non-PII Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2110.06636, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
27 | Ha Dao, Kensuke Fukuda |
Alternative to third-party cookies: investigating persistent PII leakage-based web tracking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoNEXT ![In: CoNEXT '21: The 17th International Conference on emerging Networking EXperiments and Technologies, Virtual Event, Munich, Germany, December 7 - 10, 2021, pp. 223-229, 2021, ACM, 978-1-4503-9098-9. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
27 | Somchart Fugkeaw, Nichakorn Kuasomboon, Pathitta Panakitkul |
DBIM: An Efficient and Resilient PII Data Breach Incident Management System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KST ![In: 13th International Conference on Knowledge and Smart Technology, KST 2021, Bangsaen, Chonburi, Thailand, January 21-24, 2021, pp. 237-242, 2021, IEEE, 978-1-7281-7602-4. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
27 | Somchart Fugkeaw, Ananya Chaturasrivilai, Pitchayapa Tasungnoen, Weerapat Techaudomthaworn |
AP2I: Adaptive PII Scanning and Consent Discovery System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KST ![In: 13th International Conference on Knowledge and Smart Technology, KST 2021, Bangsaen, Chonburi, Thailand, January 21-24, 2021, pp. 231-236, 2021, IEEE, 978-1-7281-7602-4. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
27 | Yizhi Liu, Fang Yu Lin, Mohammadreza Ebrahimi, Weifeng Li 0002, Hsinchun Chen |
Automated PII Extraction from Social Media for Raising Privacy Awareness: A Deep Transfer Learning Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: IEEE International Conference on Intelligence and Security Informatics, ISI 2021, San Antonio, TX, USA, November 2-3, 2021, pp. 1-6, 2021, IEEE, 978-1-6654-3838-4. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
27 | José González Cabañas, Ángel Cuevas, Rubén Cuevas, Juan López-Fernández, David García 0001 |
Unique on Facebook: formulation and evidence of (nano)targeting individual users with non-PII data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Internet Measurement Conference ![In: IMC '21: ACM Internet Measurement Conference, Virtual Event, USA, November 2-4, 2021, pp. 464-479, 2021, ACM, 978-1-4503-9129-0. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
27 | Sumaiya Binte Bashar, Mohammad Samawat Ullah, Rawnak Rahman Mim, Alfarrah Islam Sraboni |
An Analysis of Incentive Model (PII) to Maximize the Beneficiary Outreach by Ensuring Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCA ![In: ICCA 2020: International Conference on Computing Advancements, Dhaka, Bangladesh, January 10-12, 2020, pp. 16:1-16:4, 2020, ACM, 978-1-4503-7778-2. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
27 | Giridhari Venkatadri, Elena Lucherini, Piotr Sapiezynski, Alan Mislove |
Investigating sources of PII used in Facebook's targeted advertising. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Proc. Priv. Enhancing Technol. ![In: Proc. Priv. Enhancing Technol. 2019(1), pp. 227-244, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
27 | Cheryl Booth, Shuyuan Mary Ho |
The Privacy Paradox in HCI: Calculus Behavior in Disclosing PII Online. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HCI (24) ![In: HCI in Business, Government and Organizations. Information Systems and Analytics - 6th International Conference, HCIBGO 2019, Held as Part of the 21st HCI International Conference, HCII 2019, Orlando, FL, USA, July 26-31, 2019, Proceedings, Part II, pp. 163-177, 2019, Springer, 978-3-030-22337-3. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
27 | Amine Mrabet, Mehdi Bentounsi, Patrice Darmon |
SecP2I A Secure Multi-party Discovery of Personally Identifiable Information (PII) in Structured and Semi-structured Datasets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE BigData ![In: 2019 IEEE International Conference on Big Data (IEEE BigData), Los Angeles, CA, USA, December 9-12, 2019, pp. 5028-5033, 2019, IEEE, 978-1-7281-0858-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
27 | Jingjing Ren, Martina Lindorfer, Daniel J. Dubois, Ashwin Rao, David R. Choffnes, Narseo Vallina-Rodriguez |
Bug Fixes, Improvements, ... and Privacy Leaks - A Longitudinal Study of PII Leaks Across Android App Versions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NDSS ![In: 25th Annual Network and Distributed System Security Symposium, NDSS 2018, San Diego, California, USA, February 18-21, 2018, 2018, The Internet Society. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
27 | Richard Marciano, William Underwood, Mohammad Hanaee, Connor Mullane, Aakanksha Singh, Zayden Tethong |
Automating the Detection of Personally Identifiable Information (PII) in Japanese-American WWII Incarceration Camp Records. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE BigData ![In: IEEE International Conference on Big Data (IEEE BigData 2018), Seattle, WA, USA, December 10-13, 2018, pp. 2725-2732, 2018, IEEE, 978-1-5386-5035-6. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
27 | Giridhari Venkatadri, Athanasios Andreou, Yabing Liu, Alan Mislove, Krishna P. Gummadi, Patrick Loiseau, Oana Goga |
Privacy Risks with Facebook's PII-Based Targeting: Auditing a Data Broker's Advertising Interface. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Symposium on Security and Privacy ![In: 2018 IEEE Symposium on Security and Privacy, SP 2018, Proceedings, 21-23 May 2018, San Francisco, California, USA, pp. 89-107, 2018, IEEE Computer Society, 978-1-5386-4353-2. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
27 | Tobias Weber |
Update 1.5 to "Takin: An open-source software for experiment planning, visualisation, and data analysis", (PII: S2352711016300152). ![Search on Bibsonomy](Pics/bibsonomy.png) |
SoftwareX ![In: SoftwareX 6, pp. 148-149, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
27 | Nishant Vishwamitra, Yifang Li, Kevin Wang, Hongxin Hu, Kelly Caine, Gail-Joon Ahn |
Towards PII-based Multiparty Access Control for Photo Sharing in Online Social Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, SACMAT 2017, Indianapolis, IN, USA, June 21-23, 2017, pp. 155-166, 2017, ACM, 978-1-4503-4702-0. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
27 | Oleksii Starov, Phillipa Gill, Nick Nikiforakis |
Are You Sure You Want to Contact Us? Quantifying the Leakage of PII via Website Contact Forms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Proc. Priv. Enhancing Technol. ![In: Proc. Priv. Enhancing Technol. 2016(1), pp. 20-33, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
27 | Jingjing Ren, Ashwin Rao, Martina Lindorfer, Arnaud Legout, David R. Choffnes |
Demo: ReCon: Revealing and Controlling PII Leaks in Mobile Network Traffic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiSys (Companion Volume) ![In: Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services Companion, Singapore, Singapore, June 25-30, 2016, pp. 117, 2016, ACM, 978-1-4503-4416-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
27 | Jingjing Ren, Ashwin Rao, Martina Lindorfer, Arnaud Legout, David R. Choffnes |
ReCon: Revealing and Controlling PII Leaks in Mobile Network Traffic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiSys ![In: Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services, MobiSys 2016, Singapore, June 26-30, 2016, pp. 361-374, 2016, ACM, 978-1-4503-4269-8. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
27 | Hal Berghel |
PII, the FTC, Car Dealers, and You. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 47(5), pp. 102-106, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
27 | Ignus P. Swart, Barry Irwin, Marthie Grobler |
On the viability of pro-active automated PII breach detection: A South African case study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAICSIT ![In: Southern African Institute for Computer Scientist and Information Technologists Annual Conference 2014, SAICSIT '14, Centurion, South Africa, September 29 - October 1, 2014, pp. 251, 2014, ACM, 978-1-4503-3246-0. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
27 | Andrew Padilla, Martin A. Oberhofer, Ivan Milman |
Applying PII fingerprints in security incident analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AMCIS ![In: 18th Americas Conference on Information Systems, AMCIS 2012, Seattle, Washington, USA, August 9-11, 2012, 2012, Association for Information Systems, 978-0-615-66346-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
27 | Yuqian Li, Yang Liu, Zhifang Liu, Jiwei Huang, Zhen Chen |
The Power of Refresh: A Novel Mechanism for Securing Low Entropy PII. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CMC ![In: Third International Conference on Communications and Mobile Computing, CMC 2011, Qingdao, China, 18-20 April 2011, pp. 29-36, 2011, IEEE Computer Society, 978-0-7695-4357-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Rose Tinabo, Fredrick Mtenzi, Ciaran O'Driscoll, Brendan O'Shea |
Multiple Anonymisation Techniques can balance Data Usefulness and 218Protection of Personal Identifiable Information (PII). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Web Appl. ![In: Int. J. Web Appl. 1(4), pp. 218-227, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
27 | Jonathan White, Brajendra Panda |
Implementing PII honeytokens to mitigate against the threat of malicous insiders. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: IEEE International Conference on Intelligence and Security Informatics, ISI 2009, Dallas, Texas, USA, June 8-11, 2009, Proceedings, pp. 233, 2009, IEEE, 978-1-4244-4171-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
18 | Wihem Arsac, Luca Compagna, Samuel Paul Kaluvuri, Serena Elisa Ponta |
Security validation tool for business processes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 16th ACM Symposium on Access Control Models and Technologies, SACMAT 2011, Innsbruck, Austria, June 15-17, 2011, Proceedings, pp. 143-144, 2011, ACM, 978-1-4503-0688-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
18 | Christopher Staite |
Portable secure identity management for software engineering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSE (2) ![In: Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering - Volume 2, ICSE 2010, Cape Town, South Africa, 1-8 May 2010, pp. 325-326, 2010, ACM. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
18 | Susan Landau 0001, Hubert Lê Van Gông, Robin Wilton |
Achieving Privacy in a Federated Identity Management System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 13th International Conference, FC 2009, Accra Beach, Barbados, February 23-26, 2009. Revised Selected Papers, pp. 51-70, 2009, Springer. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
privacy, policy, law, federated identity management |
18 | Benjamin Arazi |
Computationally Efficient Distributed and Delegated Certification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Parallel Distributed Syst. ![In: IEEE Trans. Parallel Distributed Syst. 19(9), pp. 1167-1174, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Stuart Shapiro, Aaron Powell |
Analyzing PETs for Enterprise Operations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy Enhancing Technologies ![In: Privacy Enhancing Technologies, 8th International Symposium, PETS 2008, Leuven, Belgium, July 23-25, 2008, Proceedings, pp. 1, 2008, Springer, 978-3-540-70629-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Linda Wilbanks |
The Impact of Personally Identifiable Information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IT Prof. ![In: IT Prof. 9(4), pp. 62-64, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Jan Bergenthum, Ludger Rüschendorf |
Convex ordering criteria for Lévy processes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Adv. Data Anal. Classif. ![In: Adv. Data Anal. Classif. 1(2), pp. 143-173, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
JEL Classification G 12 |
18 | Ernesto Sánchez 0001, Giovanni Squillero |
Evolutionary Techniques Applied to Hardware Optimization Problems: Test and Verification of Advanced Processors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Advances in Evolutionary Computing for System Design ![In: Advances in Evolutionary Computing for System Design, pp. 303-326, 2007, Springer, 978-3-540-72376-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Vishal Kapoor, Pascal Poncelet, François Trousset, Maguelonne Teisseire |
Privacy preserving sequential pattern mining in distributed databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIKM ![In: Proceedings of the 2006 ACM CIKM International Conference on Information and Knowledge Management, Arlington, Virginia, USA, November 6-11, 2006, pp. 758-767, 2006, ACM, 1-59593-433-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
privacy mining |
18 | Geoff Skinner, Song Han 0004, Elizabeth Chang 0001 |
Defining and Protecting Meta Privacy: A New Conceptual Framework Within Information Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDE Workshops ![In: Proceedings of the 22nd International Conference on Data Engineering Workshops, ICDE 2006, 3-7 April 2006, Atlanta, GA, USA, pp. 101, 2006, IEEE Computer Society, 0-7695-2571-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
18 | Paolo Ceravolo, Ernesto Damiani, Sabrina De Capitani di Vimercati, Cristiano Fugazza, Pierangela Samarati |
Advanced Metadata for Privacy-Aware Representation of Credentials. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDE Workshops ![In: Proceedings of the 21st International Conference on Data Engineering Workshops, ICDE 2005, 5-8 April 2005, Tokyo, Japan, pp. 1199, 2005, IEEE Computer Society, 0-7695-2657-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Stephen E. Levy, Carl Gutwin |
Improving understanding of website privacy policies with fine-grained policy anchors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the 14th international conference on World Wide Web, WWW 2005, Chiba, Japan, May 10-14, 2005, pp. 480-488, 2005, ACM, 1-59593-046-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
APPEL, conformance conflicts, e-commerce, privacy policies, P3P, user agents, privacy preferences |
18 | Geoff Skinner, Song Han 0004, Elizabeth Chang 0001 |
A New Conceptual Framework Within Information Privacy: Meta Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS (2) ![In: Computational Intelligence and Security, International Conference, CIS 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part II, pp. 55-61, 2005, Springer, 3-540-30819-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Geoff Skinner, Song Han 0004, Elizabeth Chang 0001 |
A Framework of Privacy Shield in Organizational Information Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICMB ![In: 2005 International Conference on Mobile Business (ICMB 2005), 11-13 July 2005, Sydney, Australia, pp. 647-650, 2005, IEEE Computer Society, 0-7695-2367-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Fulvio Corno, Ernesto Sánchez 0001, Matteo Sonza Reorda, Giovanni Squillero |
Code Generation for Functional Validation of Pipelined Microprocessors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Electron. Test. ![In: J. Electron. Test. 20(3), pp. 269-278, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
pipelined micro processors, evolutionary algorithms, functional validation, automatic test program generation |
18 | Chin-Shuang Liu, Nei-Chiung Perng, Tei-Wei Kuo |
An Implementation of Budget-Based Resource Reservation for Real-Time Linux. ![Search on Bibsonomy](Pics/bibsonomy.png) |
International Conference on Computational Science ![In: Computational Science - ICCS 2004, 4th International Conference, Kraków, Poland, June 6-9, 2004, Proceedings, Part III, pp. 226-233, 2004, Springer, 3-540-22116-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
18 | Peter Benner, Maribel Castillo, Enrique S. Quintana-Ortí |
Partial Stabilization of Large-Scale Discrete-Time Linear Control Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPP Workshops ![In: 30th International Workshops on Parallel Processing (ICPP 2001 Workshops), 3-7 September 2001, Valencia, Spain, pp. 93-98, 2001, IEEE Computer Society, 0-7695-1260-7. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
18 | Siegfried Höfinger |
Load Balancing for the Electronic Structure Program GREMLIN in a Very Heterogenous SSH-Connected WAN-Cluster of UNIX-Type Hosts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
International Conference on Computational Science (2) ![In: Computational Science - ICCS 2001, International Conference, San Francisco, CA, USA, May 28-30, 2001. Proceedings, Part II, pp. 801-810, 2001, Springer, 3-540-42233-1. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #86 of 86 (100 per page; Change: )
|
|