The authors review current and potential technologies that could help older adults remain active in society — in particular, those who can't leave their home re... Read More »
Because current cyber-physical system (CPS) honeypots fail to sufficiently simulate behavior that's necessary to project complete authenticity, the HoneyPhy fra... Read More »
Since traditional traffic analysis approaches don't work for mobile traffic, the author discusses the challenges in mobile traffic analysis and presents techniq... Read More »
Zero-rating plans conflict with net neutrality: will free data services privilege a small minority of content providers or provide valuable access to informatio... Read More »
Existing bot-detection solutions balance proof of human identity with unobtrusiveness in users' workflows. Cognitive modeling and natural interaction might prov... Read More »
Developing and implementing a frugal Internet of Things can improve the monitoring and management of small-scale farms, improving the prospects for food securit... Read More »
User intentions behind Web search queries are provided to a machine learning algorithm that learns from these examples and then can classify unseen user queries... Read More »
Kieron O'Hara details a privacy framework of seven levels to help citizens think about when privacy violations are problematic, and why this differs across cult... Read More »