usdot-its-jpo-data-portal / privacy-protection-applicationLinks
Privacy Protection Application (PPA): Code and instructions for building two tools for processing vehicle trip, or trajectory, data to protect driver privacy by hiding potentially sensitive locations. These tools were developed to process large databases of trips generated during connected vehicle pilot studies, but they could be used on any typ…
☆13Updated 6 years ago
Alternatives and similar repositories for privacy-protection-application
Users that are interested in privacy-protection-application are comparing it to the libraries listed below
Sorting:
- Collection of data sources that can be used to provide context to security events☆25Updated 10 years ago
- ☆10Updated 4 years ago
- aka GENESIDS: Reads and parses rules using a "snort like" syntax and generates and sends packets that trigger events in signature based I…☆22Updated 6 years ago
- PoC of an SGX enclave performing symmetric reencryption☆49Updated 9 years ago
- ☆37Updated 10 years ago
- UCLANesl - NIST Differential Privacy Challenge (Match 3)☆25Updated 6 years ago
- A decentralized privacy-preserving data sharing tool☆31Updated 3 years ago
- OPNids GUI, API and systems backend☆34Updated 6 years ago
- OpenDXL Broker is an open source version of a Data Exchange Layer (DXL) broker☆14Updated last year
- cve-search is a tool to import CVE (Common Vulnerabilities and Exposures) and CPE (Common Platform Enumeration) into a MongoDB to facilit…☆25Updated 8 years ago
- Cyber Threat Intelligence Feeds☆68Updated last year
- Implementing use-based privacy for ubiquitous computing.☆17Updated 2 months ago
- ☆25Updated 7 years ago
- The stratosphere testing framework is mean to help in the researching and verification of the behavioral models used by the Stratoshpere …☆50Updated 7 years ago
- The growing network connectivity witnessed in Supervisory Control and Data Acquisition (SCADA) systems raises cyber security concerns for…☆20Updated 7 years ago
- A collection of resources for security data☆41Updated 7 years ago
- With the hope that someone finds the data useful, we used to periodically publish an archive of almost all of the non-sensitive vulnerabi…☆96Updated last year
- Sanitising your documents, one threat at a time. — Content Disarm & Reconstruction Software☆156Updated last year
- Security and Privacy Assurance Research Test and Assessment (SPARTA) tool suite☆37Updated 8 years ago
- The public repository of the Loopix mix system☆72Updated 7 years ago
- ☆38Updated 3 years ago
- MulVAL: A logic-based, data-driven enterprise network security analyzer - Originally developed at Kansas State University, updated for Cy…☆35Updated last year
- The OpenDXL Ontology project is focused on the development of an open and interoperable cybersecurity messaging format for use with the O…☆76Updated 4 years ago
- CybOX Schemas and Schema Development☆43Updated 8 years ago
- OASIS TC Open Repository: Validator for STIX 2.0 JSON normative requirements and best practices☆55Updated last month
- A Tool for Complex and Scalable Data Access Policy Enforcement☆96Updated 4 years ago
- OASIS TC Open Repository: STIX Enhancement Proposals (SEPs) https://github.com/oasis-open/cti-sep-repository☆16Updated 2 years ago
- OASIS Cyber Threat Intelligence (CTI) TC Open Repository: Convert STIX 1.2 XML to STIX 2.x JSON☆51Updated last year
- Identifies unexpected and prohibited certificate authority certificates on Windows systems. #nsacyber☆114Updated 9 years ago
- DomainTools Official Python API☆84Updated last week