References of "Brust, Matthias R. 50025542"
     in
Bookmark and Share    
Full Text
Peer Reviewed
See detailTechnical report on data protection and privacy in smart ICT: Internet of Things: Gap analysis between scientific research and technical standardisation: Gap analysis Internet of Things
Samir Labib, Nader UL; Brust, Matthias R. UL; Danoy, Grégoire UL et al

in Technical report on data protection and privacy in smart ICT (2019), 1

With the emergence of new digital trends like the Internet of Things (IoT), more industry actors and technical committees pursue research in utilizing such technologies as they promise better and ... [more ▼]

With the emergence of new digital trends like the Internet of Things (IoT), more industry actors and technical committees pursue research in utilizing such technologies as they promise better and optimized management, improved energy efficiency and better quality living by facilitating a magnitude of value-added services. However, as communication, sensing and actuation become increasingly sophisticated, such promising data-driven IoT systems generate, process, and exchange larger amounts of data, some of which is privacy-sensitive and security-critical. The sustained increase in number of connected devices, catalyzed by IoT, affirms the importance of addressing data protection, privacy and security challenges, as indices of trust, to achieve market acceptance. This consequently, emphasizes the need of a solid technical and regulatory foundation to ensure trustworthiness within the IoT ecosystem. The goal of this study is to first introduce the concept of trustworthiness in IoT with its main pillars, data protection, privacy and security, and then analyze developments in research and standardization for each of these. The study presents a gap analysis on data protection, privacy and security between research and standardization, throughout which the use case of Unmanned Aerial Vehicles (UAVs) is referred to, as a promising value-added service example of mobile IoT devices. The study concludes with suggestions for future research and standardization in order to address the identified gaps. [less ▲]

Detailed reference viewed: 79 (14 UL)
Full Text
Peer Reviewed
See detailA Game Theoretic Analysis of the Twitter Follow-Unfollow Mechanism
Chen, Jundong; Hossain, Md Shafaeat; Brust, Matthias R. UL et al

in International Conference on Decision and Game Theory for Security (2018)

Twitter users often crave more followers to increase their social popularity. While a variety of factors have been shown to attract the followers, very little work has been done to analyze the mechanism ... [more ▼]

Twitter users often crave more followers to increase their social popularity. While a variety of factors have been shown to attract the followers, very little work has been done to analyze the mechanism how Twitter users follow or unfollow each other. In this paper, we apply game theory to modeling the follow-unfollow mechanism on Twitter. We first present a two-player game which is based on the Prisoner’s Dilemma, and subsequently evaluate the payoffs when the two players adopt different strategies. To allow two players to play multiple rounds of the game, we propose a multi-stage game model. We design a Twitter bot analyzer which follows or unfollows other Twitter users by adopting the strategies from the multi-stage game. We develop an algorithm which enables the Twitter bot analyzer to automatically collect and analyze the data. The results from analyzing the data collected in our experiment show that the follow-back ratios for both of the Twitter bots are very low, which are 0.76% and 0.86%. This means that most of the Twitter users do not cooperate and only want to be followed instead of following others. Our results also exhibit the effect of different strategies on the follow-back followers and on the non-following followers as well. [less ▲]

Detailed reference viewed: 127 (0 UL)