@inproceedings{doerfel2012publication, abstract = {We present an analysis of the publication and citation networks of all previous editions of the three conferences most relevant to the FCA community: ICFCA, ICCS and CLA. Using data mining methods from FCA and graph analysis, we investigate patterns and communities among authors, we identify and visualize influential publications and authors, and we give a statistical summary of the conferences’ history. }, address = {Berlin/Heidelberg}, author = {Doerfel, Stephan and Jäschke, Robert and Stumme, Gerd}, booktitle = {ICFCA 2012}, editor = {Domenach, F. and Ignatov, D.I. and Poelmans, J.}, interhash = {f34f31e8dd1e07b1b0a5ab688f10084a}, intrahash = {0ac1296af204a499490bf61a48d03e48}, pages = {77--95}, publisher = {Springer}, series = {Lecture Notes in Artificial Intelligence}, title = {Publication Analysis of the Formal Concept Analysis Community}, url = {https://www.kde.cs.uni-kassel.de/pub/pdf/doerfel2012publication.pdf}, volume = 7278, year = 2012 } @inproceedings{doerfel2012publication, abstract = {We present an analysis of the publication and citation networks of all previous editions of the three conferences most relevant to the FCA community: ICFCA, ICCS and CLA. Using data mining methods from FCA and graph analysis, we investigate patterns and communities among authors, we identify and visualize influential publications and authors, and we give a statistical summary of the conferences’ history. }, address = {Berlin/Heidelberg}, author = {Doerfel, Stephan and Jäschke, Robert and Stumme, Gerd}, booktitle = {ICFCA 2012}, editor = {Domenach, F. and Ignatov, D.I. and Poelmans, J.}, interhash = {f34f31e8dd1e07b1b0a5ab688f10084a}, intrahash = {0ac1296af204a499490bf61a48d03e48}, pages = {77--95}, publisher = {Springer}, series = {Lecture Notes in Artificial Intelligence}, title = {Publication Analysis of the Formal Concept Analysis Community}, url = {https://www.kde.cs.uni-kassel.de/pub/pdf/doerfel2012publication.pdf}, volume = 7278, year = 2012 } @inproceedings{srinivasan2008protecting, abstract = {In this paper, we first present a new privacy leak in residential wireless ubiquitous computing systems, and then we propose guidelines for designing future systems to prevent this problem. We show that we can observe private activities in the home such as cooking, showering, toileting, and sleeping by eavesdropping on the wireless transmissions of sensors in a home, even when all of the transmissions are encrypted. We call this the Fingerprint and Timing-based Snooping (FATS) attack. This attack can already be carried out on millions of homes today, and may become more important as ubiquitous computing environments such as smart homes and assisted living facilities become more prevalent. In this paper, we demonstrate and evaluate the FATS attack on eight different homes containing wireless sensors. We also propose and evaluate a set of privacy preserving design guidelines for future wireless ubiquitous systems and show how these guidelines can be used in a hybrid fashion to prevent against the FATS attack with low implementation costs.}, address = {New York, NY, USA}, author = {Srinivasan, Vijay and Stankovic, John and Whitehouse, Kamin}, booktitle = {UbiComp '08: Proceedings of the 10th international conference on Ubiquitous computing}, doi = {10.1145/1409635.1409663}, interhash = {493934da14b0afdda73bdb91c145351c}, intrahash = {0efc5c0ef9a17c35402c654ff76247b0}, isbn = {978-1-60558-136-1}, location = {Seoul, Korea}, pages = {202--211}, publisher = {ACM}, title = {Protecting your daily in-home activity information from a wireless snooping attack}, url = {http://portal.acm.org/citation.cfm?id=1409663}, year = 2008 }