Login / Signup
Shadow attacks on users' anonymity in pervasive computing environments.
Daniele Riboni
Linda Pareschi
Claudio Bettini
Published in:
Pervasive Mob. Comput. (2008)
Keyphrases
</>
malicious users
pervasive computing environments
security risks
user interaction
end users
artificial intelligence
recommender systems
computational intelligence