default search action
1st ICDIS 2018: South Padre Island, TX, USA
- 1st International Conference on Data Intelligence and Security, ICDIS 2018, South Padre Island, TX, USA, April 8-10, 2018. IEEE 2018, ISBN 978-1-5386-5762-1
- Adam J. Brown, Todd R. Andel, Mark Yampolskiy, Jeffrey Todd McDonald:
CAN Authorization Using Message Priority Bit-Level Access Control. 1-8 - Ashkan Aleali, Mahila Dadfarnia, Paulo Shakarian:
Finding Novel Event Relationships in Temporal Data. 9-16 - Avi Ginsberg, Cui Yu:
Rapid Homoglyph Prediction and Detection. 17-23 - Carlos Pena-Caballero, Elifaleth Cantu, Jesus Rodriguez, Adolfo Gonzales, Osvaldo Castellanos, Angel A. Cantu, Megan Strait, Jae Son, Dongchul Kim:
A Multiple Radar Approach for Automatic Target Recognition of Aircraft Using Inverse Synthetic Aperture Radar. 24-31 - Christine Hines, Abdou Youssef:
Machine Learning Applied to Rotating Check Fraud Detection. 32-35 - Christoph Lipps, Andreas Weinand, Dennis Krummacker, Christoph Fischer, Hans D. Schotten:
Proof of Concept for IoT Device Authentication Based on SRAM PUFs Using ATMEGA 2560-MCU. 36-42 - Dimitrios Sisiaridis, Olivier Markowitch:
Reducing Data Complexity in Feature Extraction and Feature Selection for Big Data Security Analytics. 43-48 - Egon Kidmose, Erwin Lansing, Søren Brandbyge, Jens Myrup Pedersen:
Detection of Malicious and Abusive Domain Names. 49-56 - Elham Shaabani, Ruocheng Guo, Paulo Shakarian:
Detecting Pathogenic Social Media Accounts without Content or Network Structure. 57-64 - Enas A. Alikhashashneh, Rajeev R. Raje, James H. Hill:
Using Software Engineering Metrics to Evaluate the Quality of Static Code Analysis Tools. 65-72 - Ericsson Marin, Jana Shakarian, Paulo Shakarian:
Mining Key-Hackers on Darkweb Forums. 73-80 - Ericsson Marin, Mohammed Almukaynizi, Eric Nunes, Paulo Shakarian:
Community Finding of Malware and Exploit Vendors on Darkweb Marketplaces. 81-84 - Faruk Ahmed, Md. Sultan Mahmud, Rakib Al-Fahad, Shahinur Alam, Mohammed Yeasin:
Image Captioning for Ambient Awareness on a Sidewalk. 85-91 - Fitratullah Khan, Mahmoud Quweider, Max Torres, Clair Goldsmith, Hansheng Lei, Liyu Zhang:
Block Level Streaming Based Alternative Approach for Serving a Large Number of Workstations Securely and Uniformly. 92-98 - George Toscano, Gahangir Hossain:
Predicting the Effect of Parental Education and Income on Infant Mortality Through Statistical Learning. 99-102 - Hansheng Lei, Yamin Hu, Wenjian Luo, Cheng Chang Pan:
Mining Dependent Items. 103-109 - Hasan Turaev, Pavol Zavarsky, Bobby Swar:
Prevention of Ransomware Execution in Enterprise Environment on Windows OS: Assessment of Application Whitelisting Solutions. 110-118 - Himanshu Upadhyay, Hardik A. Gohel, Alexander Perez-Pons, Leonel E. Lagos:
Windows Virtualization Architecture For Cyber Threats Detection. 119-122 - Hugo Armando Herrera, William Robert Rivas, Sanjeev Kumar:
Evaluation of Internet Connectivity Under Distributed Denial of Service Attacks from Botnets of Varying Magnitudes. 123-126 - Husamelddin A. M. Balla, Chen Guang Sheng, Weipeng Jing:
Reliability Enhancement in Cloud Computing Via Optimized Job Scheduling Implementing Reinforcement Learning Algorithm and Queuing Theory. 127-130 - Ihab Darwish, Tarek N. Saadawi:
Attack Detection and Mitigation Techniques in Industrial Control System -Smart Grid DNP3. 131-134 - Jaime Yeckle, Bo Tang:
Detection of Electricity Theft in Customer Consumption Using Outlier Detection Algorithms. 135-140 - Jatesh Jagraj Singh, Hamman Samuel, Pavol Zavarsky:
Impact of Paranoia Levels on the Effectiveness of the ModSecurity Web Application Firewall. 141-144 - Jayachander Surbiryala, Bikash Agrawal, Chunming Rong:
Improve Security Over Multiple Cloud Service Providers for Resource Allocation. 145-148 - Jayraj Gondaliya, Savani Savani, Vivek Sheetal Dhaduvai, Gahangir Hossain:
Hybrid Security RSA Algorithm in Application of Web Service. 149-152 - Jiaping Men, Wei Wang, Jiqiang Liu, Zhen Han:
Designing Mutual Authentication Protocols in Industrial Wireless Network. 153-158 - Joel A. Dawson, Jeffrey Todd McDonald, Lee M. Hively, Todd R. Andel, Mark Yampolskiy, Charles Hubbard:
Phase Space Detection of Virtual Machine Cyber Events Through Hypervisor-Level System Call Analysis. 159-167 - Kathiravan Natarajan, Truong-Huy D. Nguyen, Mutlu Mete:
Hand Gesture Controlled Drones: An Open Source Library. 168-175 - Leonard Renners, Felix Heine, Carsten Kleiner, Gabi Dreo Rodosek:
A Feedback-Based Evaluation Approach for the Continuous Adjustment of Incident Prioritization. 176-183 - Liang Ming, Gang Zhao, Minhuan Huang, Xiaohui Kuang, Hu Li, Ming Zhang:
Security Analysis of Intelligent Transportation Systems Based on Simulation Data. 184-187 - Mahmoud Quweider, Hansheng Lei, Liyu Zhang, Fitra Khan:
Managing Big Data in Visual Retrieval Systems for DHS Applications: Combining Fourier Descriptors and Metric Space Indexing. 188-193 - Mohamed Dahmane, Samuel Foucher:
Combating Insider Threats by User Profiling from Activity Logging Data. 194-199 - Nannan Lu, Wenjian Luo, Li Ni, Hao Jiang, Weiping Ding:
Extending CDFR for Overlapping Community Detection. 200-206 - Remilekun Sobayo, Hsiang-Huang Wu, Ram L. Ray, Lijun Qian:
Integration of Convolutional Neural Network and Thermal Images into Soil Moisture Estimation. 207-210 - Rujit Raval, Alison Maskus, Benjamin Saltmiras, Morgan Dunn, Peter J. Hawrylak, John Hale:
Competitive Learning Environment for Cyber-Physical System Security Experimentation. 211-218 - Saeid Soheily-Khah, Pierre-Francois Marteau, Nicolas Béchet:
Intrusion Detection in Network Systems Through Hybrid Supervised and Unsupervised Machine Learning Process: A Case Study on the ISCX Dataset. 219-226 - Sanjay Kumar, Ari Viinikainen, Timo Hämäläinen:
A Network-Based Framework for Mobile Threat Detection. 227-233 - Saud Alashri, Jiun-Yi Tsai, Anvesh Reddy Koppela, Hasan Davulcu:
Snowball: Extracting Causal Chains from Climate Change Text Corpora. 234-241 - Shay Taylor, Tabor Kvasnicka, Thomas Shaw, Kyle Cook, Jim Arrowood, John Hale:
A Platform for Experimentation with and Measurement of Reflective Deception. 242-245 - Sourabh Shivaji Kumbhar, Young Lee, Jeong Yang:
Hybrid Encryption for Securing SharedPreferences of Android Applications. 246-249 - Sven Plaga, Melanie Niethammer, Norbert Wiedermann, Alexander Borisov:
Adding Channel Binding for an Out-of-Band OTP Authentication Protocol in an Industrial Use-Case. 250-257 - Todd R. Andel, Lindsey N. Whitehurst, Jeffrey Todd McDonald, Waleed Al-Assadi:
Enhancing Security Against Software Attacks with Reprogrammable Hardware. 258-266 - Will Nichols, Zachary Hill, Peter J. Hawrylak, John Hale, Mauricio Papa:
Automatic Generation of Attack Scripts from Attack Graphs. 267-274 - Yongzhong He, Binghui Hu, Zhen Han:
Dynamic Privacy Leakage Analysis of Android Third-Party Libraries. 275-280 - Zachary Campbell, Andrew Bray, Anna M. Ritz, Adam Groce:
Differentially Private ANOVA Testing. 281-285 - Zhigang Zhang, Chaowen Chang, Zhuo Lv, PeiSheng Han, Yutong Wang:
A Control Flow Anomaly Detection Algorithm for Industrial Control Systems. 286-293
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.