Exploració per autor "Rebollo-Monedero, David"
Ara es mostren els items 1-5 de 5
-
Anonymizing cybersecurity data in critical infrastructures: the CIPSEC approach
Rodríguez Hoyos, Ana Fernanda; Estrada Jiménez, José Antonio; Rebollo-Monedero, David; Forné Muñoz, Jorge; Trapero Burgos, Rubén; Álvarez Romero, Antonio (ISCRAM, 2019)
Text en actes de congrés
Accés obertCybersecurity logs are permanently generated by network devices to describe security incidents. With modern computing technology, such logs can be exploited to counter threats in real time or before they gain a foothold. ... -
Efficient k-anonymous microaggregation of multivariate numerical data via principal component analysis
Rebollo-Monedero, David; Mezher, Ahmad Mohamad; Casanova, Xavier; Forné Muñoz, Jorge; Soriano Ibáñez, Miguel (2019-07-09)
Article
Accés obertk-Anonymous microaggregation is a widespread technique to address the problem of protecting the privacy of the respondents involved beyond the mere suppression of their identifiers, in applications where preserving the ... -
Mathematically optimized, recursive prepartitioning strategies for k-anonymous microaggregation of large-scale datasets
Pallarès Segarra, Esteve; Rebollo-Monedero, David; Rodríguez Hoyos, Ana Fernanda; Estrada Jiménez, José Antonio; Mezher, Ahmad Mohamad; Forné Muñoz, Jorge (2019-11-11)
Article
Accés obertThe technical contents of this work fall within the statistical disclosure control (SDC) field, which concerns the postprocessing of the demographic portion of the statistical results of surveys containing sensitive personal ... -
On collaborative anonymous communications in lossy networks
Rebollo-Monedero, David; Forné Muñoz, Jorge; Pallarès Segarra, Esteve; Parra-Arnau, Javier; Tripp Barba, Carolina; Urquiza Aguiar, Luis; Aguilar Igartua, Mónica (2013-05-17)
Article
Accés restringit per política de l'editorialMessage encryption does not prevent eavesdroppers from unveiling who is communicating with whom, when, or how frequently, a privacy risk wireless networks are particularly vulnerable to. The Crowds protocol, a well-established ... -
The Fast Maximum Distance to Average Vector (F-MDAV): an algorithm for k-Anonymous microaggregation in big data
Rodríguez Hoyos, Ana Fernanda; Estrada Jiménez, José Antonio; Rebollo-Monedero, David; Mezher, Ahmad Mohamad; Parra Arnau, Javier; Forné Muñoz, Jorge (Elsevier, 2020-02-10)
Article
Accés obertThe massive exploitation of tons of data is currently guiding critical decisions in domains such as economics or health. But serious privacy risks arise since personal data is commonly involved. k-Anonymous microaggregation ...