Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Privacy software

Privacy software is software built to protect the privacy of its users. The software typically works in conjunction with Internet usage to control or… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2020
2020
In recent years, smart contracts have suffered major exploits, cost- ing millions of dollars. Unlike traditional programs, smart… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
2019
2019
Recent studies have demonstrated that reinforcement learning (RL) agents are susceptible to adversarial manipulation, similar to… Expand
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 4
2018
2018
Despite the wide use of machine learning in adversarial settings including computer security, recent studies have demonstrated… Expand
  • figure 1
  • figure 3
  • figure 2
  • figure 4
  • figure 5
2018
2018
In thedigitalera,organization-wide informationsecurity riskassessmenthasgained importance because it can impact… Expand
2017
2017
Abstract E-mail Header Injection vulnerability is a class of vulnerability that can occur in web applications that use user input… Expand
2016
2016
Programmers’ lack of knowledge and ability in secure development threatens everyone who uses mobile apps. There’s no consensus on… Expand
  • figure 1
  • table 1
  • figure 2
  • table 2
  • table 3
Highly Cited
2007
Highly Cited
2007
The polularity of social networking websites such as Facebook and the subsequent levels and depth of online disclosures have… Expand
2007
2007
Revision with unchanged content. Privacy has become a significant issue in 21st century society. Businesses, technologists… Expand
2003
2003
User interface designers frequently face the challenge of making software configuration options accessible to users. In this… Expand
  • figure 1
1995
1995
From the Publisher: The Computer Privacy Handbook gives you the practical tools to reassert your privacy. You'll find out who is… Expand