2017 European Intelligence and Security Informatics Conference (EISIC) 2017
DOI: 10.1109/eisic.2017.17
|View full text |Cite
|
Sign up to set email alerts
|

IoT Data Profiles: The Routines of Your Life Reveals Who You Are

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
5
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 10 publications
0
5
0
Order By: Relevance
“…In [1], the authors presented a study on the identification of users from the data profiles that are generated by their devices. The authors collected information about when, where, and how users use their networked devices to obtain time and event profiles.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…In [1], the authors presented a study on the identification of users from the data profiles that are generated by their devices. The authors collected information about when, where, and how users use their networked devices to obtain time and event profiles.…”
Section: Related Workmentioning
confidence: 99%
“…When considering access technologies in the environment, the author of [4] introduces a dynamic process in the decision to grant access to users in the environment. The solution that is presented in [1] stands out for using communication between IoT devices to identify user profiles. In this article, we propose an approach that differs from the others by managing the privacy profile in smart environments with a system that allows for the evolution of the user profile in different scenarios.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Even in cases where consumers agree to the collection of data for a specific application, it is difficult for them to perceive the number of ways that data may be used in the future. The work of [4] investigates the possibilities to recognise a user based on when they communicate, what kind of applications they use, the type of devices they are surrounded by and their geographical location.…”
Section: Introductionmentioning
confidence: 99%