researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
Links
Filter by Year
OR
AND
NOT
1
2019
2020
Filter by Tag
Filter by Author
[+]
OR
AND
NOT
1
Abdullah Al Omar
Amelec Viloria
Aniello Castiglione
Carlos Vargas Mercado
Guojun Wang 0001
Haroon Elahi
Honghao Wu
Hugo Hernández Palma
Jianer Chen
Md. Zakirul Alam Bhuiyan
Michele Nappi
MingChu Li
Omar Bonerge Pineda Lezama
Qutaibah M. Malluhi
Shaikh Arifuzzaman
Shudong Li
Shujun Li
Xiaobo Wu
Ying Ma
Yuanfang Chen
Filter by Top terms
[+]
OR
AND
NOT
1
analysis
applications
attacks
big
cloud
data
dependability
detection
electric
feature
grid
network
networks
power
privacy
security
sensor
system
systems
using
DependSys (dependsys)
Editions
Publications
Viewing Publication 1 - 59 from 59
2020
6th IEEE International Conference on Dependability in Sensor, Cloud and Big Data Systems and Applications, DependSys 2020, Nadi, Fiji, December 14-16, 2020
IEEE,
2020.
[doi]
An Ensemble Feature Selection Method for IoT IDS
Alaa Alhowaide
,
Izzat Alsmadi
,
Jian Tang
.
dependsys 2020
:
41-48
[doi]
Free Chain: Enabling Freedom of Expression through Public Blockchains
Israa Alsarsour
,
Qutaibah M. Malluhi
,
Yongge Wang
.
dependsys 2020
:
33-40
[doi]
Investigating Root Causes of Authentication Failures Using a SAML and OIDC Observatory
Jim Basney
,
Phuong Cao
,
Terry Fleury
.
dependsys 2020
:
119-126
[doi]
Real-Time Fault Detection and Diagnosis of CPS Faults in DEVS
Joseph Boi-Ukeme
,
Cristina Ruiz Martin
,
Gabriel A. Wainer
.
dependsys 2020
:
57-64
[doi]
Physical Fingerprinting of Ultrasonic Sensors and Applications to Sensor Security
Eric Cheek
,
Dhimant Khuttan
,
Raghu Changalvala
,
Hafiz Malik
.
dependsys 2020
:
65-72
[doi]
HBD-Authority: Streaming Access Control Model for Hadoop
Congwei Chen
,
Marwa A. Elsayed
,
Mohammad Zulkernine
.
dependsys 2020
:
16-25
[doi]
A New Chain Code for Bi-Level Image Compression Using an Agent-Based Model of Echolocation in Dolphins
Khaldoon Dhou
,
Christopher Cruzen
.
dependsys 2020
:
87-91
[doi]
A novel approach for predictive maintenance combining GAF encoding strategies and deep networks
Antonino Ferraro
,
Antonio Galli
,
Vincenzo Moscato
,
Giancarlo Sperlì
.
dependsys 2020
:
127-132
[doi]
Implementing a solution for monitoring SLA violations in Cloud
Andreea Floricu
,
Razvan Buzatu
,
Catalin Negru
,
Florin Pop
,
Aniello Castiglione
.
dependsys 2020
:
80-86
[doi]
Privacy Preservation of Aggregated Data Using Virtual Battery in the Smart Grid
Fawaz Kserawi
,
Qutaibah M. Malluhi
.
dependsys 2020
:
106-111
[doi]
An attack tree template based on feature diagram hierarchy
Rajesh Kumar
.
dependsys 2020
:
92-97
[doi]
A secret sharing scheme based on game theory and BP neural network
Qiuxian Li
,
Quanxing Zhou
,
Qixin Pan
,
Lingyun Wang
,
Hongfa Ding
.
dependsys 2020
:
26-32
[doi]
Dependable Wildlife DTN: Wearable Animal Resource Optimization for Sustainable Long-Term Monitoring
Keijiro Nakagawa
,
Daisuké Shimotoku
,
Junya Kawase
,
Hill Hiroki Kobayashi
.
dependsys 2020
:
49-56
[doi]
LoRaWAN v1.1 Security: Are We in the Clear Yet?
Sumesh J. Philip
,
James M. McQuillan
,
Oluwatoba Adegbite
.
dependsys 2020
:
112-118
[doi]
A scalable Blockchain based system for super resolution images manipulation
Antonio Rapuano
,
Gerardo Iovane
,
Marta Chinnici
.
dependsys 2020
:
8-15
[doi]
Cognitive Privacy: AI-enabled Privacy using EEG Signals in the Internet of Things
Francesco Schiliro
,
Nour Moustafa
,
Amin Beheshti
.
dependsys 2020
:
73-79
[doi]
Network Virtualization: Proof of Concept for Remote Management of Multi-Tenant Infrastructure
Stephen Ugwuanyi
,
Rameez Asif
,
James Irvine
.
dependsys 2020
:
98-105
[doi]
Modeling and Analysis of Malware Propagation for Cluster-based Wireless Sensor Networks
Xuejin Zhu
,
Jie Huang
,
Chunyang Qi
,
Xiaowen Wang
.
dependsys 2020
:
1-7
[doi]
2019
Dependability in Sensor, Cloud, and Big Data Systems and Applications - 5th International Conference, DependSys 2019, Guangzhou, China, November 12-15, 2019, Proceedings
Guojun Wang 0001
,
Md. Zakirul Alam Bhuiyan
,
Sabrina De Capitani di Vimercati
,
Yizhi Ren
, editors,
Volume 1123 of
Communications in Computer and Information Science
, Springer,
2019.
[doi]
Medical Image Segmentation by Combining Adaptive Artificial Bee Colony and Wavelet Packet Decomposition
Muhammad Arif 0006
,
Guojun Wang 0001
,
Oana Geman
,
Jianer Chen
.
dependsys 2019
:
158-169
[doi]
Recommender System for Decentralized Cloud Manufacturing
Karim Alinani
,
Deshun Liu
,
Dong Zhou
,
Guojun Wang 0001
.
dependsys 2019
:
170-179
[doi]
Nowhere Metamorphic Malware Can Hide - A Biological Evolution Inspired Detection Scheme
Kehinde O. Babaagba
,
Zhiyuan Tan 0001
,
Emma Hart
.
dependsys 2019
:
369-382
[doi]
Design and Evaluation of a Quorum-Based Hierarchical Dissemination Algorithm for Critical Event Data in Massive IoTs
Ihn-Han Bae
.
dependsys 2019
:
462-476
[doi]
Gait Analysis for Gender Classification in Forensics
Paola Barra
,
Carmen Bisogni
,
Michele Nappi
,
David Freire-Obregón
,
Modesto Castrillón Santana
.
dependsys 2019
:
180-190
[doi]
QoS Based Clustering for Vehicular Networks in Smart Cities
Soumia Bellaouar
,
Mohamed Guerroumi
,
Samira Moussaoui
.
dependsys 2019
:
67-79
[doi]
Dependable Person Recognition by Means of Local Descriptors of Dynamic Facial Features
Aniello Castiglione
,
Giampiero Grazioli
,
Simone Iengo
,
Michele Nappi
,
Stefano Ricciardi
.
dependsys 2019
:
247-261
[doi]
Towards the Design of a Covert Channel by Using Web Tracking Technologies
Aniello Castiglione
,
Michele Nappi
,
Chiara Pero
.
dependsys 2019
:
231-246
[doi]
Assessing the Dependability of Apache Spark System: Streaming Analytics on Large-Scale Ocean Data
Janak Dahal
,
Elias Ioup
,
Shaikh Arifuzzaman
,
Mahdi Abdelguerfi
.
dependsys 2019
:
131-144
[doi]
CodeeGAN: Code Generation via Adversarial Training
Youqiang Deng
,
Cai Fu
,
Yang Li
.
dependsys 2019
:
18-30
[doi]
AI and Its Risks in Android Smartphones: A Case of Google Smart Assistant
Haroon Elahi
,
Guojun Wang 0001
,
Tao Peng
,
Jianer Chen
.
dependsys 2019
:
341-355
[doi]
DHS-Voting: A Distributed Homomorphic Signcryption E-Voting
Xingyue Fan
,
Ting Wu
,
Qiuhua Zheng
,
Yuanfang Chen
,
Xiaodong Xiao
.
dependsys 2019
:
40-53
[doi]
Comparative Analysis on Raster, Spiral, Hilbert, and Peano Mapping Pattern of Fragile Watermarking to Address the Authentication Issue in Healthcare System
Syifak Izhar Hisham
,
Mohamad Nazmi Nasir
,
Nasrul Hadi Johari
.
dependsys 2019
:
477-486
[doi]
A New Intrusion Detection Model Based on GRU and Salient Feature Approach
Jian Hou
,
Fangai Liu
,
Xuqiang Zhuang
.
dependsys 2019
:
405-415
[doi]
Application of Internet of Things and GIS in Power Grid Emergency Command System
Daning Huang
,
Huihe Chen
,
Shiyong Huang
,
Yuchang Lin
,
Ying Ma
.
dependsys 2019
:
304-313
[doi]
On the Assessment of Security and Performance Bugs in Chromium Open-Source Project
Joseph Imseis
,
Costain Nachuma
,
Shaikh Arifuzzaman
,
Md. Zakirul Alam Bhuiyan
.
dependsys 2019
:
145-157
[doi]
A Socio-Technical and Co-evolutionary Framework for Reducing Human-Related Risks in Cyber Security and Cybercrime Ecosystems
Tasmina Islam
,
Ingolf Becker
,
Rebecca Posner
,
Paul Ekblom
,
Michael McGuire
,
Hervé Borrion
,
Shujun Li
.
dependsys 2019
:
277-293
[doi]
Electric Power Grid Invulnerability Under Intentional Edge-Based Attacks
Yixia Li
,
Shudong Li
,
Yanshan Chen
,
Peiyan He
,
Xiaobo Wu
,
Weihong Han
.
dependsys 2019
:
454-461
[doi]
Optimal Personalized DDoS Attacks Detection Strategy in Network Systems
MingChu Li
,
Xian Yang
,
Yuanfang Chen
,
Md. Zakirul Alam Bhuiyan
.
dependsys 2019
:
327-340
[doi]
Transportation and Charging Schedule for Autonomous Electric Vehicle Riding-Sharing System Considering Battery Degradation
MingChu Li
,
Tingting Tang
,
Yuanfang Chen
,
Md. Zakirul Alam Bhuiyan
.
dependsys 2019
:
203-216
[doi]
A Light-Weight Framework for Pre-submission Vetting of Android Applications in App Stores
Boya Li
,
Guojun Wang 0001
,
Haroon Elahi
,
Guihua Duan
.
dependsys 2019
:
356-368
[doi]
From Data Disclosure to Privacy Nudges: A Privacy-Aware and User-Centric Personal Data Management Framework
Yang Lu
,
Shujun Li
,
Athina Ioannou
,
Iis Tussyadiah
.
dependsys 2019
:
262-276
[doi]
Towards Privacy-preserving Recommender System with Blockchains
Abdullah Al Omar
,
Rabeya Bosri
,
Mohammad Shahriar Rahman
,
Nasima Begum
,
Md. Zakirul Alam Bhuiyan
.
dependsys 2019
:
106-118
[doi]
Searchable Attribute-Based Encryption Protocol with Hidden Keywords in Cloud
Fang Qi
,
Xing Chang
,
Zhe Tang
,
Wenbo Wang
.
dependsys 2019
:
80-92
[doi]
Information Consumption Patterns from Big Data
Jesús Silva
,
Ligia Romero
,
Claudia Fernández
,
Darwin Solano
,
Nataly Orellano Llinás
,
Carlos Vargas Mercado
,
Jazmín Flórez Guzmán
,
Ernesto Steffens Sanabria
.
dependsys 2019
:
31-39
[doi]
Integrating Deep Learning and Bayesian Reasoning
Sin Yin Tan
,
Wooi Ping Cheah
,
Shing Chiang Tan
.
dependsys 2019
:
119-130
[doi]
Secrecy Outage Probability of Secondary System for Wireless-Powered Cognitive Radio Networks
Kun Tang
,
Shaowei Liao
,
Md. Zakirul Alam Bhuiyan
,
Wei Shi
.
dependsys 2019
:
3-17
[doi]
Towards In-Network Generalized Trustworthy Data Collection for Trustworthy Cyber-Physical Systems
Hafiz ur Rahman
,
Guojun Wang 0001
,
Md. Zakirul Alam Bhuiyan
,
Jianer Chen
.
dependsys 2019
:
54-66
[doi]
Demand Forecasting Method Using Artificial Neural Networks
Amelec Viloria
,
Luisa Fernanda Arrieta Matos
,
Mercedes Gaitán
,
Hugo Hernández Palma
,
Yasmin Flórez Guzmán
,
Luis Cabas Vásquez
,
Carlos Vargas Mercado
,
Omar Bonerge Pineda Lezama
.
dependsys 2019
:
383-391
[doi]
Analyzing and Predicting Power Consumption Profiles Using Big Data
Amelec Viloria
,
Ronald Prieto Pulido
,
Jesús García Guiliany
,
Jairo Martínez Ventura
,
Hugo Hernández Palma
,
José Jinete Torres
,
Osman Redondo Bilbao
,
Omar Bonerge Pineda Lezama
.
dependsys 2019
:
392-401
[doi]
Hybrid Cloud Computing Architecture Based on Open Source Technology
Amelec Viloria
,
Hugo Hernández Palma
,
Wilmer Cadavid Basto
,
Alexandra Perdomo Villalobos
,
Carlos Andrés Uribe de la Cruz
,
Juan de la Hoz Hernández
,
Omar Bonerge Pineda Lezama
.
dependsys 2019
:
191-200
[doi]
A Comparative Study of Two Different Spam Detection Methods
Haoyu Wang
,
Bingze Dai
,
Dequan Yang
.
dependsys 2019
:
95-105
[doi]
Research on Electronic Evidence Management System Based on Knowledge Graph
Honghao Wu
.
dependsys 2019
:
416-425
[doi]
Research on Security Supervision on Wireless Network Space in Key Sites
Honghao Wu
.
dependsys 2019
:
426-434
[doi]
Blockchain-Powered Service Migration for Uncertainty-Aware Workflows in Edge Computing
Xiaolong Xu
,
Qingfan Geng
,
Hao Cao
,
Ruichao Mo
,
Shaohua Wan
,
Lianyong Qi
,
Hao Wang
.
dependsys 2019
:
217-230
[doi]
Visualized Panoramic Display Platform for Transmission Cable Based on Space-Time Big Data
Renxin Yu
,
Qinghuang Yao
,
Tianrong Zhong
,
Wei Li
,
Ying Ma
.
dependsys 2019
:
314-323
[doi]
Mobile APP User Attribute Prediction by Heterogeneous Information Network Modeling
Hekai Zhang
,
Jibing Gong
,
Zhiyong Teng
,
Dan Wang
,
Hongfei Wang
,
Linfeng Du
,
Md. Zakirul Alam Bhuiyan
.
dependsys 2019
:
294-303
[doi]
Review of the Electric Vehicle Charging Station Location Problem
Yu Zhang
,
Xiangtao Liu
,
Tianle Zhang
,
Zhaoquan Gu
.
dependsys 2019
:
435-445
[doi]
Structural Vulnerability of Power Grid Under Malicious Node-Based Attacks
Minzhen Zheng
,
Shudong Li
,
Danna Lu
,
Wei Wang
,
Xiaobo Wu
,
Dawei Zhao
.
dependsys 2019
:
446-453
[doi]
Sign in
or
sign up
to see more results.