Login / Signup

Shadow attacks on users' anonymity in pervasive computing environments.

Daniele RiboniLinda PareschiClaudio Bettini
Published in: Pervasive Mob. Comput. (2008)
Keyphrases
  • malicious users
  • pervasive computing environments
  • security risks
  • user interaction
  • end users
  • artificial intelligence
  • recommender systems
  • computational intelligence