BibTeX records: A. S. M. Kayes

download as .bib file

@article{DBLP:journals/compsec/McIntoshKCNW23,
  author       = {Timothy R. McIntosh and
                  A. S. M. Kayes and
                  Yi{-}Ping Phoebe Chen and
                  Alex Ng and
                  Paul A. Watters},
  title        = {Applying staged event-driven access control to combat ransomware},
  journal      = {Comput. Secur.},
  volume       = {128},
  pages        = {103160},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103160},
  doi          = {10.1016/J.COSE.2023.103160},
  timestamp    = {Sat, 13 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/McIntoshKCNW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/MahbubPK22,
  author       = {Syed Mahbub and
                  Eric Pardede and
                  A. S. M. Kayes},
  title        = {Online Recruitment Fraud Detection: {A} Study on Contextual Features
                  in Australian Job Industries},
  journal      = {{IEEE} Access},
  volume       = {10},
  pages        = {82776--82787},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACCESS.2022.3197225},
  doi          = {10.1109/ACCESS.2022.3197225},
  timestamp    = {Mon, 26 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/MahbubPK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/MahbubPK22a,
  author       = {Syed Mahbub and
                  Eric Pardede and
                  A. S. M. Kayes},
  title        = {{COVID-19} Rumor Detection Using Psycho-Linguistic Features},
  journal      = {{IEEE} Access},
  volume       = {10},
  pages        = {117530--117543},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACCESS.2022.3220369},
  doi          = {10.1109/ACCESS.2022.3220369},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/MahbubPK22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/KayeshIWKW22,
  author       = {Humayun Kayesh and
                  Md. Saiful Islam and
                  Junhu Wang and
                  A. S. M. Kayes and
                  Paul A. Watters},
  title        = {A deep learning model for mining and detecting causally related events
                  in tweets},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {34},
  number       = {2},
  year         = {2022},
  url          = {https://doi.org/10.1002/cpe.5938},
  doi          = {10.1002/CPE.5938},
  timestamp    = {Fri, 21 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/concurrency/KayeshIWKW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/McIntoshKCNW22,
  author       = {Timothy R. McIntosh and
                  A. S. M. Kayes and
                  Yi{-}Ping Phoebe Chen and
                  Alex Ng and
                  Paul A. Watters},
  title        = {Ransomware Mitigation in the Modern Era: {A} Comprehensive Review,
                  Research Challenges, and Future Directions},
  journal      = {{ACM} Comput. Surv.},
  volume       = {54},
  number       = {9},
  pages        = {197:1--197:36},
  year         = {2022},
  url          = {https://doi.org/10.1145/3479393},
  doi          = {10.1145/3479393},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/McIntoshKCNW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/adma/HaqBGKWK22,
  author       = {Ikram Ul Haq and
                  Paul Black and
                  Iqbal Gondal and
                  Joarder Kamruzzaman and
                  Paul A. Watters and
                  A. S. M. Kayes},
  editor       = {Weitong Chen and
                  Lina Yao and
                  Taotao Cai and
                  Shirui Pan and
                  Tao Shen and
                  Xue Li},
  title        = {Spam Email Categorization with {NLP} and Using Federated Deep Learning},
  booktitle    = {Advanced Data Mining and Applications - 18th International Conference,
                  {ADMA} 2022, Brisbane, QLD, Australia, November 28-30, 2022, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13726},
  pages        = {15--27},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22137-8\_2},
  doi          = {10.1007/978-3-031-22137-8\_2},
  timestamp    = {Wed, 31 May 2023 15:58:13 +0200},
  biburl       = {https://dblp.org/rec/conf/adma/HaqBGKWK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/AbirACK21,
  author       = {S. M. Abu Adnan Abir and
                  Adnan Anwar and
                  Jinho Choi and
                  A. S. M. Kayes},
  title        = {IoT-Enabled Smart Energy Grid: Applications and Challenges},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {50961--50981},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3067331},
  doi          = {10.1109/ACCESS.2021.3067331},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/AbirACK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/McIntoshKCNW21,
  author       = {Timothy R. McIntosh and
                  A. S. M. Kayes and
                  Yi{-}Ping Phoebe Chen and
                  Alex Ng and
                  Paul A. Watters},
  title        = {Dynamic user-centric access control for detection of ransomware attacks},
  journal      = {Comput. Secur.},
  volume       = {111},
  pages        = {102461},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102461},
  doi          = {10.1016/J.COSE.2021.102461},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/McIntoshKCNW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KalariaKRP21,
  author       = {Rudri Kalaria and
                  A. S. M. Kayes and
                  Wenny Rahayu and
                  Eric Pardede},
  title        = {A Secure Mutual authentication approach to fog computing environment},
  journal      = {Comput. Secur.},
  volume       = {111},
  pages        = {102483},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102483},
  doi          = {10.1016/J.COSE.2021.102483},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KalariaKRP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computers/IffathKRFAH21,
  author       = {Fariha Iffath and
                  A. S. M. Kayes and
                  Md. Tahsin Rahman and
                  Jannatul Ferdows and
                  Mohammad Shamsul Arefin and
                  Md. Sabir Hossain},
  title        = {Online Judging Platform Utilizing Dynamic Plagiarism Detection Facilities},
  journal      = {Comput.},
  volume       = {10},
  number       = {4},
  pages        = {47},
  year         = {2021},
  url          = {https://doi.org/10.3390/computers10040047},
  doi          = {10.3390/COMPUTERS10040047},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computers/IffathKRFAH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computers/RashidaIKHAH21,
  author       = {Maliha Rashida and
                  Kawsarul Islam and
                  A. S. M. Kayes and
                  Mohammad Hammoudeh and
                  Mohammad Shamsul Arefin and
                  Mohammad Ashfak Habib},
  title        = {Towards Developing a Framework to Analyze the Qualities of the University
                  Websites},
  journal      = {Comput.},
  volume       = {10},
  number       = {5},
  pages        = {57},
  year         = {2021},
  url          = {https://doi.org/10.3390/computers10050057},
  doi          = {10.3390/COMPUTERS10050057},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computers/RashidaIKHAH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcomp/AlkhalifahNWK21,
  author       = {Ayman Alkhalifah and
                  Alex Ng and
                  Paul A. Watters and
                  A. S. M. Kayes},
  title        = {A Mechanism to Detect and Prevent Ethereum Blockchain Smart Contract
                  Reentrancy Attacks},
  journal      = {Frontiers Comput. Sci.},
  volume       = {3},
  pages        = {598780},
  year         = {2021},
  url          = {https://doi.org/10.3389/fcomp.2021.598780},
  doi          = {10.3389/FCOMP.2021.598780},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fcomp/AlkhalifahNWK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/McIntoshWKNC21,
  author       = {Timothy R. McIntosh and
                  Paul A. Watters and
                  A. S. M. Kayes and
                  Alex Ng and
                  Yi{-}Ping Phoebe Chen},
  title        = {Enforcing situation-aware access control to build malware-resilient
                  file systems},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {115},
  pages        = {568--582},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.future.2020.09.035},
  doi          = {10.1016/J.FUTURE.2020.09.035},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/McIntoshWKNC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsan/HammoudehWEKP21,
  author       = {Mohammad Hammoudeh and
                  Paul A. Watters and
                  Gregory Epiphaniou and
                  A. S. M. Kayes and
                  Pedro Pinto},
  title        = {Special Issue "Security Threats and Countermeasures in Cyber-Physical
                  Systems"},
  journal      = {J. Sens. Actuator Networks},
  volume       = {10},
  number       = {3},
  pages        = {54},
  year         = {2021},
  url          = {https://doi.org/10.3390/jsan10030054},
  doi          = {10.3390/JSAN10030054},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsan/HammoudehWEKP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/MahbubPK21,
  author       = {Syed Mahbub and
                  Eric Pardede and
                  A. S. M. Kayes},
  title        = {Detection of Harassment Type of Cyberbullying: {A} Dictionary of Approach
                  Words and Its Impact},
  journal      = {Secur. Commun. Networks},
  volume       = {2021},
  pages        = {5594175:1--5594175:12},
  year         = {2021},
  url          = {https://doi.org/10.1155/2021/5594175},
  doi          = {10.1155/2021/5594175},
  timestamp    = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/MahbubPK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/AkhterASAKZ21,
  author       = {A. F. M. Suaib Akhter and
                  Mohiuddin Ahmed and
                  A. F. M. Shahen Shah and
                  Adnan Anwar and
                  A. S. M. Kayes and
                  Ahmet Zengin},
  title        = {A Blockchain-Based Authentication Protocol for Cooperative Vehicular
                  Ad Hoc Network},
  journal      = {Sensors},
  volume       = {21},
  number       = {4},
  pages        = {1273},
  year         = {2021},
  url          = {https://doi.org/10.3390/s21041273},
  doi          = {10.3390/S21041273},
  timestamp    = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/AkhterASAKZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crowncom/RahmanSAK21,
  author       = {Saifur Rahman and
                  Tance Suleski and
                  Mohiuddin Ahmed and
                  A. S. M. Kayes},
  editor       = {Huilong Jin and
                  Chungang Liu and
                  Al{-}Sakib Khan Pathan and
                  Zubair Md. Fadlullah and
                  Salimur Choudhury},
  title        = {An Investigation of Vulnerabilities in Internet of Health Things},
  booktitle    = {Cognitive Radio Oriented Wireless Networks and Wireless Internet -
                  16th {EAI} International Conference, {CROWNCOM} 2021, Virtual Event,
                  December 11, 2021, and 14th {EAI} International Conference, WiCON
                  2021, Virtual Event, November 9, 2021, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {427},
  pages        = {296--306},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-98002-3\_22},
  doi          = {10.1007/978-3-030-98002-3\_22},
  timestamp    = {Fri, 01 Apr 2022 14:10:55 +0200},
  biburl       = {https://dblp.org/rec/conf/crowncom/RahmanSAK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/TuKRN20,
  author       = {Doan Quang Tu and
                  A. S. M. Kayes and
                  Wenny Rahayu and
                  Kinh Nguyen},
  title        = {Integration of IoT Streaming Data With Efficient Indexing and Storage
                  Optimization},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {47456--47467},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.2980006},
  doi          = {10.1109/ACCESS.2020.2980006},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/TuKRN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/AnwarLGSKS20,
  author       = {Tarique Anwar and
                  Kewen Liao and
                  Angelic Goyal and
                  Timos Sellis and
                  A. S. M. Kayes and
                  Haifeng Shen},
  title        = {Inferring Location Types With Geo-Social-Temporal Pattern Mining},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {154789--154799},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.3018997},
  doi          = {10.1109/ACCESS.2020.3018997},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/AnwarLGSKS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ais/SarkerKFII20,
  author       = {Iqbal H. Sarker and
                  A. S. M. Kayes and
                  Md. Hasan Furhad and
                  Mohammad Mainul Islam and
                  Md. Shohidul Islam},
  title        = {{E-MIIM:} an ensemble-learning-based context-aware mobile telephony
                  model for intelligent interruption management},
  journal      = {{AI} Soc.},
  volume       = {35},
  number       = {2},
  pages        = {459--467},
  year         = {2020},
  url          = {https://doi.org/10.1007/s00146-019-00898-8},
  doi          = {10.1007/S00146-019-00898-8},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ais/SarkerKFII20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/SarkerCHKW20,
  author       = {Iqbal H. Sarker and
                  Alan Colman and
                  Jun Han and
                  A. S. M. Kayes and
                  Paul A. Watters},
  title        = {CalBehav: {A} Machine Learning-Based Personalized Calendar Behavioral
                  Model Using Time-Series Smartphone Data},
  journal      = {Comput. J.},
  volume       = {63},
  number       = {7},
  pages        = {1109--1123},
  year         = {2020},
  url          = {https://doi.org/10.1093/comjnl/bxz117},
  doi          = {10.1093/COMJNL/BXZ117},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/SarkerCHKW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/complexity/RahmanAHHK20,
  author       = {Md. Rashadur Rahman and
                  Mohammad Shamsul Arefin and
                  Md. Billal Hossain and
                  Mohammad Ashfak Habib and
                  A. S. M. Kayes},
  title        = {Towards a Framework for Acquisition and Analysis of Speeches to Identify
                  Suspicious Contents through Machine Learning},
  journal      = {Complex.},
  volume       = {2020},
  pages        = {5639787:1--5639787:14},
  year         = {2020},
  url          = {https://doi.org/10.1155/2020/5639787},
  doi          = {10.1155/2020/5639787},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/complexity/RahmanAHHK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computing/TuKRN20,
  author       = {Doan Quang Tu and
                  A. S. M. Kayes and
                  Wenny Rahayu and
                  Kinh Nguyen},
  title        = {IoT streaming data integration from multiple sources},
  journal      = {Computing},
  volume       = {102},
  number       = {10},
  pages        = {2299--2329},
  year         = {2020},
  url          = {https://doi.org/10.1007/s00607-020-00830-9},
  doi          = {10.1007/S00607-020-00830-9},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/computing/TuKRN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/KayesRWADC20,
  author       = {A. S. M. Kayes and
                  Wenny Rahayu and
                  Paul A. Watters and
                  Mamoun Alazab and
                  Tharam S. Dillon and
                  Elizabeth Chang},
  title        = {Achieving security scalability and flexibility using Fog-Based Context-Aware
                  Access Control},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {107},
  pages        = {307--323},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.future.2020.02.001},
  doi          = {10.1016/J.FUTURE.2020.02.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/KayesRWADC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fi/RoyAKHA20,
  author       = {Animesh Chandra Roy and
                  Mohammad Shamsul Arefin and
                  A. S. M. Kayes and
                  Mohammad Hammoudeh and
                  Khandakar Ahmed},
  title        = {An Empirical Recommendation Framework to Support Location-Based Services},
  journal      = {Future Internet},
  volume       = {12},
  number       = {9},
  pages        = {154},
  year         = {2020},
  url          = {https://doi.org/10.3390/fi12090154},
  doi          = {10.3390/FI12090154},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fi/RoyAKHA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/firstmonday/Kayes0WNK20,
  author       = {A. S. M. Kayes and
                  Md. Saiful Islam and
                  Paul A. Watters and
                  Alex Ng and
                  Humayun Kayesh},
  title        = {Automated measurement of attitudes towards social distancing using
                  social media: {A} {COVID-19} case study},
  journal      = {First Monday},
  volume       = {25},
  number       = {11},
  year         = {2020},
  url          = {https://doi.org/10.5210/fm.v25i11.10599},
  doi          = {10.5210/FM.V25I11.10599},
  timestamp    = {Thu, 25 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/firstmonday/Kayes0WNK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotm/HammoudehPBEBKA20,
  author       = {Mohammad Hammoudeh and
                  John Pimlott and
                  Sana Belguith and
                  Gregory Epiphaniou and
                  Thar Baker and
                  A. S. M. Kayes and
                  Bamidele Adebisi and
                  Ahc{\`{e}}ne Bounceur},
  title        = {Network Traffic Analysis for Threat Detection in the Internet of Things},
  journal      = {{IEEE} Internet Things Mag.},
  volume       = {3},
  number       = {4},
  pages        = {40--45},
  year         = {2020},
  url          = {https://doi.org/10.1109/IOTM.0001.2000015},
  doi          = {10.1109/IOTM.0001.2000015},
  timestamp    = {Tue, 08 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotm/HammoudehPBEBKA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jbd/SarkerKBAWN20,
  author       = {Iqbal H. Sarker and
                  A. S. M. Kayes and
                  Shahriar Badsha and
                  Hamed AlQahtani and
                  Paul A. Watters and
                  Alex Ng},
  title        = {Cybersecurity data science: an overview from machine learning perspective},
  journal      = {J. Big Data},
  volume       = {7},
  number       = {1},
  pages        = {41},
  year         = {2020},
  url          = {https://doi.org/10.1186/s40537-020-00318-5},
  doi          = {10.1186/S40537-020-00318-5},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jbd/SarkerKBAWN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/SarkerK20,
  author       = {Iqbal H. Sarker and
                  A. S. M. Kayes},
  title        = {ABC-RuleMiner: User behavioral rule-based machine learning method
                  for context-aware intelligent services},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {168},
  pages        = {102762},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jnca.2020.102762},
  doi          = {10.1016/J.JNCA.2020.102762},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/SarkerK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/KayesKSIWNHBK20,
  author       = {A. S. M. Kayes and
                  Rudri Kalaria and
                  Iqbal H. Sarker and
                  Md. Saiful Islam and
                  Paul A. Watters and
                  Alex Ng and
                  Mohammad Hammoudeh and
                  Shahriar Badsha and
                  Indika Kumara},
  title        = {A Survey of Context-Aware Access Control Mechanisms for Cloud and
                  Fog Networks: Taxonomy and Open Research Issues},
  journal      = {Sensors},
  volume       = {20},
  number       = {9},
  pages        = {2464},
  year         = {2020},
  url          = {https://doi.org/10.3390/s20092464},
  doi          = {10.3390/S20092464},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/KayesKSIWNHBK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/HasanABIKI20,
  author       = {Khalid Hasan and
                  Khandakar Ahmed and
                  Kamanashis Biswas and
                  Md. Saiful Islam and
                  A. S. M. Kayes and
                  S. M. Riazul Islam},
  title        = {Control Plane Optimisation for an SDN-Based {WBAN} Framework to Support
                  Healthcare Applications},
  journal      = {Sensors},
  volume       = {20},
  number       = {15},
  pages        = {4200},
  year         = {2020},
  url          = {https://doi.org/10.3390/s20154200},
  doi          = {10.3390/S20154200},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/HasanABIKI20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/ChowdhuryKWSN20,
  author       = {Mohammad Jabed Morshed Chowdhury and
                  A. S. M. Kayes and
                  Paul A. Watters and
                  Patrick Scolyer{-}Gray and
                  Alex Ng},
  title        = {Patient Controlled, Privacy Preserving IoT Healthcare Data Sharing
                  Framework},
  booktitle    = {53rd Hawaii International Conference on System Sciences, {HICSS} 2020,
                  Maui, Hawaii, USA, January 7-10, 2020},
  pages        = {1--11},
  publisher    = {ScholarSpace},
  year         = {2020},
  url          = {https://hdl.handle.net/10125/64195},
  timestamp    = {Wed, 04 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hicss/ChowdhuryKWSN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciot3/KudvaNBSK20,
  author       = {Sowmya Kudva and
                  Renat Norderhaug and
                  Shahriar Badsha and
                  Shamik Sengupta and
                  A. S. M. Kayes},
  title        = {{PEBERS:} Practical Ethereum Blockchain based Efficient Ride Hailing
                  Service},
  booktitle    = {{IEEE} International Conference on Informatics, IoT, and Enabling
                  Technologies, ICIoT 2020, Doha, Qatar, February 2-5, 2020},
  pages        = {422--428},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ICIoT48696.2020.9089473},
  doi          = {10.1109/ICIOT48696.2020.9089473},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iciot3/KudvaNBSK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciot3/KayesHBWNMI20,
  author       = {A. S. M. Kayes and
                  Mohammad Hammoudeh and
                  Shahriar Badsha and
                  Paul A. Watters and
                  Alex Ng and
                  Fatma Mohammed and
                  Mofakharul Islam},
  title        = {Responsibility Attribution Against Data Breaches},
  booktitle    = {{IEEE} International Conference on Informatics, IoT, and Enabling
                  Technologies, ICIoT 2020, Doha, Qatar, February 2-5, 2020},
  pages        = {498--503},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ICIoT48696.2020.9089466},
  doi          = {10.1109/ICIOT48696.2020.9089466},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iciot3/KayesHBWNMI20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icira/AlamTTBSK20,
  author       = {Tauhidul Alam and
                  Jarrett Taylor and
                  Jonathan Taylor and
                  Shahriar Badsha and
                  Abdur Rahman Bin Shahid and
                  A. S. M. Kayes},
  editor       = {Chee Seng Chan and
                  Hong Liu and
                  Xiangyang Zhu and
                  Chern Hong Lim and
                  Xinjun Liu and
                  Lianqing Liu and
                  Kam Meng Goh},
  title        = {Leveraging Blockchain for Spoof-Resilient Robot Networks},
  booktitle    = {Intelligent Robotics and Applications - 13th International Conference,
                  {ICIRA} 2020, Kuala Lumpur, Malaysia, November 5-7, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12595},
  pages        = {207--216},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-66645-3\_18},
  doi          = {10.1007/978-3-030-66645-3\_18},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icira/AlamTTBSK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcnn/Kayesh0WAKW20,
  author       = {Humayun Kayesh and
                  Md. Saiful Islam and
                  Junhu Wang and
                  Shikha Anirban and
                  A. S. M. Kayes and
                  Paul A. Watters},
  title        = {Answering Binary Causal Questions: {A} Transfer Learning Based Approach},
  booktitle    = {2020 International Joint Conference on Neural Networks, {IJCNN} 2020,
                  Glasgow, United Kingdom, July 19-24, 2020},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/IJCNN48605.2020.9207662},
  doi          = {10.1109/IJCNN48605.2020.9207662},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ijcnn/Kayesh0WAKW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MohammedKPR20,
  author       = {Fatma Mohammed and
                  A. S. M. Kayes and
                  Eric Pardede and
                  Wenny Rahayu},
  editor       = {Guojun Wang and
                  Ryan K. L. Ko and
                  Md. Zakirul Alam Bhuiyan and
                  Yi Pan},
  title        = {A Framework for Measuring IoT Data Quality Based on Freshness Metrics},
  booktitle    = {19th {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2020, Guangzhou, China,
                  December 29, 2020 - January 1, 2021},
  pages        = {1242--1249},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00167},
  doi          = {10.1109/TRUSTCOM50675.2020.00167},
  timestamp    = {Fri, 30 Apr 2021 12:35:40 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/MohammedKPR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ChowdhuryFBCKAW19,
  author       = {Mohammad Jabed Morshed Chowdhury and
                  Md. Sadek Ferdous and
                  Kamanashis Biswas and
                  Niaz Chowdhury and
                  A. S. M. Kayes and
                  Mamoun Alazab and
                  Paul A. Watters},
  title        = {A Comparative Analysis of Distributed Ledger Technology Platforms},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {167930--167943},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2953729},
  doi          = {10.1109/ACCESS.2019.2953729},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/ChowdhuryFBCKAW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/KayesHRDIC19,
  author       = {A. S. M. Kayes and
                  Jun Han and
                  Wenny Rahayu and
                  Tharam S. Dillon and
                  Md. Saiful Islam and
                  Alan Colman},
  title        = {A Policy Model and Framework for Context-Aware Access Control to Information
                  Resources{\textdagger}},
  journal      = {Comput. J.},
  volume       = {62},
  number       = {5},
  pages        = {670--705},
  year         = {2019},
  url          = {https://doi.org/10.1093/comjnl/bxy065},
  doi          = {10.1093/COMJNL/BXY065},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/KayesHRDIC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computing/KayesRD19,
  author       = {A. S. M. Kayes and
                  Wenny Rahayu and
                  Tharam S. Dillon},
  title        = {Critical situation management utilizing IoT-based data resources through
                  dynamic contextual role modeling and activation},
  journal      = {Computing},
  volume       = {101},
  number       = {7},
  pages        = {743--772},
  year         = {2019},
  url          = {https://doi.org/10.1007/s00607-018-0654-1},
  doi          = {10.1007/S00607-018-0654-1},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computing/KayesRD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/KayesRDCH19,
  author       = {A. S. M. Kayes and
                  Wenny Rahayu and
                  Tharam S. Dillon and
                  Elizabeth Chang and
                  Jun Han},
  title        = {Context-aware access control with imprecise context characterization
                  for cloud-based data resources},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {93},
  pages        = {237--255},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.future.2018.10.036},
  doi          = {10.1016/J.FUTURE.2018.10.036},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/KayesRDCH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/firstmonday/WattersSKC19,
  author       = {Paul A. Watters and
                  Patrick Scolyer{-}Gray and
                  A. S. M. Kayes and
                  Mohammad Jabed Morshed Chowdhury},
  title        = {This would work perfectly if it weren't for all the humans: Two factor
                  authentication in late modern societies},
  journal      = {First Monday},
  volume       = {24},
  number       = {7},
  year         = {2019},
  url          = {https://doi.org/10.5210/fm.v24i7.10095},
  doi          = {10.5210/FM.V24I7.10095},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/firstmonday/WattersSKC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijwgs/MahbubPKR19,
  author       = {Syed Mahbub and
                  Eric Pardede and
                  A. S. M. Kayes and
                  Wenny Rahayu},
  title        = {Controlling astroturfing on the internet: a survey on detection techniques
                  and research challenges},
  journal      = {Int. J. Web Grid Serv.},
  volume       = {15},
  number       = {2},
  pages        = {139--158},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJWGS.2019.099561},
  doi          = {10.1504/IJWGS.2019.099561},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijwgs/MahbubPKR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jbd/SarkerKW19,
  author       = {Iqbal H. Sarker and
                  A. S. M. Kayes and
                  Paul A. Watters},
  title        = {Effectiveness analysis of machine learning classification models for
                  predicting personalized context-aware smartphone usage},
  journal      = {J. Big Data},
  volume       = {6},
  pages        = {57},
  year         = {2019},
  url          = {https://doi.org/10.1186/s40537-019-0219-y},
  doi          = {10.1186/S40537-019-0219-Y},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jbd/SarkerKW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/TuKRN19,
  author       = {Doan Quang Tu and
                  A. S. M. Kayes and
                  Wenny Rahayu and
                  Kinh Nguyen},
  editor       = {Leonard Barolli and
                  Makoto Takizawa and
                  Fatos Xhafa and
                  Tomoya Enokido},
  title        = {{ISDI:} {A} New Window-Based Framework for Integrating IoT Streaming
                  Data from Multiple Sources},
  booktitle    = {Advanced Information Networking and Applications - Proceedings of
                  the 33rd International Conference on Advanced Information Networking
                  and Applications, {AINA} 2019, Matsue, Japan, March 27-29, 2019},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {926},
  pages        = {498--511},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-15032-7\_42},
  doi          = {10.1007/978-3-030-15032-7\_42},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aina/TuKRN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cloudcom/ChowdhuryFBCKWN19,
  author       = {Mohammad Jabed Morshed Chowdhury and
                  Md. Sadek Ferdous and
                  Kamanashis Biswas and
                  Niaz Chowdhury and
                  A. S. M. Kayes and
                  Paul A. Watters and
                  Alex Ng},
  title        = {Trust Modeling for Blockchain-Based Wearable Data Market},
  booktitle    = {2019 {IEEE} International Conference on Cloud Computing Technology
                  and Science (CloudCom), Sydney, Australia, December 11-13, 2019},
  pages        = {411--417},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CloudCom.2019.00070},
  doi          = {10.1109/CLOUDCOM.2019.00070},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cloudcom/ChowdhuryFBCKWN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1909-04724,
  author       = {Iqbal H. Sarker and
                  Alan Colman and
                  Jun Han and
                  A. S. M. Kayes and
                  Paul A. Watters},
  title        = {CalBehav: {A} Machine Learning based Personalized Calendar Behavioral
                  Model using Time-Series Smartphone Data},
  journal      = {CoRR},
  volume       = {abs/1909.04724},
  year         = {2019},
  url          = {http://arxiv.org/abs/1909.04724},
  eprinttype    = {arXiv},
  eprint       = {1909.04724},
  timestamp    = {Fri, 06 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1909-04724.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1909-11029,
  author       = {Iqbal H. Sarker and
                  A. S. M. Kayes and
                  Md. Hasan Furhad and
                  Mohammad Mainul Islam and
                  Md. Shohidul Islam},
  title        = {{E-MIIM:} An Ensemble Learning based Context-Aware Mobile Telephony
                  Model for Intelligent Interruption Management},
  journal      = {CoRR},
  volume       = {abs/1909.11029},
  year         = {2019},
  url          = {http://arxiv.org/abs/1909.11029},
  eprinttype    = {arXiv},
  eprint       = {1909.11029},
  timestamp    = {Sat, 22 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1909-11029.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/KayesRD18,
  author       = {A. S. M. Kayes and
                  J. Wenny Rahayu and
                  Tharam S. Dillon},
  editor       = {Leonard Barolli and
                  Makoto Takizawa and
                  Tomoya Enokido and
                  Marek R. Ogiela and
                  Lidia Ogiela and
                  Nadeem Javaid},
  title        = {An Ontology-Based Approach to Dynamic Contextual Role for Pervasive
                  Access Control},
  booktitle    = {32nd {IEEE} International Conference on Advanced Information Networking
                  and Applications, {AINA} 2018, Krakow, Poland, May 16-18, 2018},
  pages        = {601--608},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/AINA.2018.00093},
  doi          = {10.1109/AINA.2018.00093},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aina/KayesRD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/KayesRDC18,
  author       = {A. S. M. Kayes and
                  J. Wenny Rahayu and
                  Tharam S. Dillon and
                  Elizabeth Chang},
  title        = {Accessing Data from Multiple Sources Through Context-Aware Access
                  Control},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {551--559},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00084},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00084},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/KayesRDC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wise/KayesRDMPC18,
  author       = {A. S. M. Kayes and
                  J. Wenny Rahayu and
                  Tharam S. Dillon and
                  Syed Mahbub and
                  Eric Pardede and
                  Elizabeth Chang},
  editor       = {Hakim Hacid and
                  Wojciech Cellary and
                  Hua Wang and
                  Hye{-}Young Paik and
                  Rui Zhou},
  title        = {Dynamic Transitions of States for Context-Sensitive Access Control
                  Decision},
  booktitle    = {Web Information Systems Engineering - {WISE} 2018 - 19th International
                  Conference, Dubai, United Arab Emirates, November 12-15, 2018, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11233},
  pages        = {127--142},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-02922-7\_9},
  doi          = {10.1007/978-3-030-02922-7\_9},
  timestamp    = {Sun, 25 Oct 2020 22:33:15 +0100},
  biburl       = {https://dblp.org/rec/conf/wise/KayesRDMPC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/otm/KayesRDCH17,
  author       = {A. S. M. Kayes and
                  J. Wenny Rahayu and
                  Tharam S. Dillon and
                  Elizabeth Chang and
                  Jun Han},
  editor       = {Herv{\'{e}} Panetto and
                  Christophe Debruyne and
                  Walid Gaaloul and
                  Mike P. Papazoglou and
                  Adrian Paschke and
                  Claudio Agostino Ardagna and
                  Robert Meersman},
  title        = {Context-Aware Access Control with Imprecise Context Characterization
                  Through a Combined Fuzzy Logic and Ontology-Based Approach},
  booktitle    = {On the Move to Meaningful Internet Systems. {OTM} 2017 Conferences
                  - Confederated International Conferences: CoopIS, C{\&}TC, and
                  {ODBASE} 2017, Rhodes, Greece, October 23-27, 2017, Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10573},
  pages        = {132--153},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-69462-7\_10},
  doi          = {10.1007/978-3-319-69462-7\_10},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/otm/KayesRDCH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/KayesHRIC17,
  author       = {A. S. M. Kayes and
                  Jun Han and
                  J. Wenny Rahayu and
                  Md. Saiful Islam and
                  Alan W. Colman},
  title        = {A Policy Model and Framework for Context-Aware Access Control to Information
                  Resources},
  journal      = {CoRR},
  volume       = {abs/1703.02162},
  year         = {2017},
  url          = {http://arxiv.org/abs/1703.02162},
  eprinttype    = {arXiv},
  eprint       = {1703.02162},
  timestamp    = {Mon, 27 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/KayesHRIC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/KayesHC15,
  author       = {A. S. M. Kayes and
                  Jun Han and
                  Alan Colman},
  title        = {OntCAAC: An Ontology-Based Approach to Context-Aware Access Control
                  for Software Services},
  journal      = {Comput. J.},
  volume       = {58},
  number       = {11},
  pages        = {3000--3034},
  year         = {2015},
  url          = {https://doi.org/10.1093/comjnl/bxv034},
  doi          = {10.1093/COMJNL/BXV034},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/KayesHC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/is/KayesHC15,
  author       = {A. S. M. Kayes and
                  Jun Han and
                  Alan W. Colman},
  title        = {An ontological framework for situation-aware access control of software
                  services},
  journal      = {Inf. Syst.},
  volume       = {53},
  pages        = {253--277},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.is.2015.03.011},
  doi          = {10.1016/J.IS.2015.03.011},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/is/KayesHC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/caise/KayesHC14,
  author       = {A. S. M. Kayes and
                  Jun Han and
                  Alan Colman},
  editor       = {Matthias Jarke and
                  John Mylopoulos and
                  Christoph Quix and
                  Colette Rolland and
                  Yannis Manolopoulos and
                  Haralambos Mouratidis and
                  Jennifer Horkoff},
  title        = {{PO-SAAC:} {A} Purpose-Oriented Situation-Aware Access Control Framework
                  for Software Services},
  booktitle    = {Advanced Information Systems Engineering - 26th International Conference,
                  CAiSE 2014, Thessaloniki, Greece, June 16-20, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8484},
  pages        = {58--74},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-07881-6\_5},
  doi          = {10.1007/978-3-319-07881-6\_5},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/caise/KayesHC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/otm/KayesHCI14,
  author       = {A. S. M. Kayes and
                  Jun Han and
                  Alan Colman and
                  Md. Saiful Islam},
  editor       = {Robert Meersman and
                  Herv{\'{e}} Panetto and
                  Tharam S. Dillon and
                  Michele Missikoff and
                  Lin Liu and
                  Oscar Pastor and
                  Alfredo Cuzzocrea and
                  Timos K. Sellis},
  title        = {RelBOSS: {A} Relationship-Aware Access Control Framework for Software
                  Services},
  booktitle    = {On the Move to Meaningful Internet Systems: {OTM} 2014 Conferences
                  - Confederated International Conferences: CoopIS, and {ODBASE} 2014,
                  Amantea, Italy, October 27-31, 2014, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8841},
  pages        = {258--276},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-45563-0\_15},
  doi          = {10.1007/978-3-662-45563-0\_15},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/otm/KayesHCI14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/00030KLA14,
  author       = {Md. Saiful Islam and
                  Md. Rafiqul Islam and
                  A. S. M. Kayes and
                  Chengfei Liu and
                  Irfan Altas},
  editor       = {Jing Tian and
                  Jiwu Jing and
                  Mudhakar Srivatsa},
  title        = {A Survey on Mining Program-Graph Features for Malware Analysis},
  booktitle    = {International Conference on Security and Privacy in Communication
                  Networks - 10th International {ICST} Conference, SecureComm 2014,
                  Beijing, China, September 24-26, 2014, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {153},
  pages        = {220--236},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-23802-9\_18},
  doi          = {10.1007/978-3-319-23802-9\_18},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/00030KLA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icsoc/KayesHC13,
  author       = {A. S. M. Kayes and
                  Jun Han and
                  Alan Colman},
  editor       = {Alessio Lomuscio and
                  Surya Nepal and
                  Fabio Patrizi and
                  Boualem Benatallah and
                  Ivona Brandic},
  title        = {A Context-Aware Access Control Framework for Software Services},
  booktitle    = {Service-Oriented Computing - {ICSOC} 2013 Workshops - CCSA, CSB, PASCEB,
                  SWESE, WESOA, and PhD Symposium, Berlin, Germany, December 2-5, 2013.
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8377},
  pages        = {569--577},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-06859-6\_53},
  doi          = {10.1007/978-3-319-06859-6\_53},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icsoc/KayesHC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/KayesHC13,
  author       = {A. S. M. Kayes and
                  Jun Han and
                  Alan Colman},
  title        = {A Semantic Policy Framework for Context-Aware Access Control Applications},
  booktitle    = {12th {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2013 / 11th {IEEE} International
                  Symposium on Parallel and Distributed Processing with Applications,
                  {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing
                  and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013},
  pages        = {753--762},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/TrustCom.2013.91},
  doi          = {10.1109/TRUSTCOM.2013.91},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/KayesHC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wise/KayesHC13,
  author       = {A. S. M. Kayes and
                  Jun Han and
                  Alan Colman},
  editor       = {Xuemin Lin and
                  Yannis Manolopoulos and
                  Divesh Srivastava and
                  Guangyan Huang},
  title        = {An Ontology-Based Approach to Context-Aware Access Control for Software
                  Services},
  booktitle    = {Web Information Systems Engineering - {WISE} 2013 - 14th International
                  Conference, Nanjing, China, October 13-15, 2013, Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8180},
  pages        = {410--420},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41230-1\_34},
  doi          = {10.1007/978-3-642-41230-1\_34},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wise/KayesHC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/KayesHC12,
  author       = {A. S. M. Kayes and
                  Jun Han and
                  Alan W. Colman},
  editor       = {Willy Susilo and
                  Yi Mu and
                  Jennifer Seberry},
  title        = {{ICAF:} {A} Context-Aware Framework for Access Control},
  booktitle    = {Information Security and Privacy - 17th Australasian Conference, {ACISP}
                  2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7372},
  pages        = {442--449},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31448-3\_34},
  doi          = {10.1007/978-3-642-31448-3\_34},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/KayesHC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics