Leaking data from enterprise networks using a compromised smartwatch device.
Shachar SiboniAsaf ShabtaiYuval EloviciPublished in: SAC (2018)
Keyphrases
- data collection
- data analysis
- synthetic data
- data processing
- data quality
- data sets
- data structure
- prior knowledge
- data sources
- database
- statistical analysis
- data acquisition
- application domains
- computer systems
- small number
- image data
- training data
- measurement data
- input data
- sensitive information
- complex data
- databases
- noisy data
- raw data
- third party
- statistical methods
- network structure
- probability distribution
- sensor data
- missing data
- data points
- high dimensional data