Login / Signup
Sensitivity analysis and countermeasures for transformation-based location obfuscation.
L. Gonzalez
Mayra Zurbarán
Pedro M. Wightman
Daladier Jabba
Miguel Jimeno
Eduardo E. Zurek
Published in:
ICCST (2014)
Keyphrases
</>
sensitivity analysis
countermeasures
information security
data transformation
managerial insights
influence diagrams
variational inequalities
reverse engineering
decision variables
power analysis
cyber attacks
data mining
probabilistic model
static analysis
rural areas