Survey of security and privacy issues of internet of things

T Borgohain, U Kumar, S Sanyal - arXiv preprint arXiv:1501.02211, 2015 - arxiv.org
This paper is a general survey of all the security issues existing in the Internet of Things (IoT)
along with an analysis of the privacy issues that an end-user may face as a consequence of …

Dynamics of dyads in social networks: Assortative, relational, and proximity mechanisms

MT Rivera, SB Soderstrom, B Uzzi - annual Review of Sociology, 2010 - annualreviews.org
Embeddedness in social networks is increasingly seen as a root cause of human
achievement, social stratification, and actor behavior. In this article, we review sociological …

Small but slow world: How network topology and burstiness slow down spreading

M Karsai, M Kivelä, RK Pan, K Kaski, J Kertész… - Physical Review E …, 2011 - APS
While communication networks show the small-world property of short paths, the spreading
dynamics in them turns out slow. Here, the time evolution of information propagation is …

Opportunistic IoT: Exploring the harmonious interaction between human and the internet of things

B Guo, D Zhang, Z Wang, Z Yu, X Zhou - Journal of Network and Computer …, 2013 - Elsevier
The traditional view of Internet of Things (IoT) attempts to connect all the physical objects to
build a global, infrastructure-based IoT. In this paper, however, we will present opportunistic …

Social fMRI: Investigating and shaping social mechanisms in the real world

N Aharony, W Pan, C Ip, I Khayal, A Pentland - Pervasive and mobile …, 2011 - Elsevier
We introduce the Friends and Family study, a longitudinal living laboratory in a residential
community. In this study, we employ a ubiquitous computing approach, Social Functional …

Mobile data offloading through opportunistic communications and social participation

B Han, P Hui, VSA Kumar, MV Marathe… - … on mobile computing, 2011 - ieeexplore.ieee.org
3G networks are currently overloaded, due to the increasing popularity of various
applications for smartphones. Offloading mobile data traffic through opportunistic …

Screenomics: A Framework to Capture and Analyze Personal Life Experiences and the Ways that Technology Shapes Them

B Reeves, N Ram, TN Robinson… - Human–Computer …, 2021 - Taylor & Francis
Digital experiences capture an increasingly large part of life, making them a preferred, if not
required, method to describe and theorize about human behavior. Digital media also shape …

Analyzing and modeling real-world phenomena with complex networks: a survey of applications

LF Costa, ON Oliveira Jr, G Travieso… - Advances in …, 2011 - Taylor & Francis
The success of new scientific areas can be assessed by their potential in contributing to new
theoretical approaches and in applications to real-world problems. Complex networks have …

Authentication of smartphone users using behavioral biometrics

A Alzubaidi, J Kalita - IEEE Communications Surveys & …, 2016 - ieeexplore.ieee.org
Smartphones and tablets have become ubiquitous in our daily lives. Smartphones, in
particular, have become more than personal assistants. These devices have provided new …

Combining disparate data sources for improved poverty prediction and mapping

N Pokhriyal, DC Jacques - Proceedings of the National …, 2017 - National Acad Sciences
More than 330 million people are still living in extreme poverty in Africa. Timely, accurate,
and spatially fine-grained baseline data are essential to determining policy in favor of …