Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: A. S. M. Kayes
@article{DBLP:journals/compsec/McIntoshKCNW23, author = {Timothy R. McIntosh and A. S. M. Kayes and Yi{-}Ping Phoebe Chen and Alex Ng and Paul A. Watters}, title = {Applying staged event-driven access control to combat ransomware}, journal = {Comput. Secur.}, volume = {128}, pages = {103160}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103160}, doi = {10.1016/J.COSE.2023.103160}, timestamp = {Sat, 13 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/McIntoshKCNW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/MahbubPK22, author = {Syed Mahbub and Eric Pardede and A. S. M. Kayes}, title = {Online Recruitment Fraud Detection: {A} Study on Contextual Features in Australian Job Industries}, journal = {{IEEE} Access}, volume = {10}, pages = {82776--82787}, year = {2022}, url = {https://doi.org/10.1109/ACCESS.2022.3197225}, doi = {10.1109/ACCESS.2022.3197225}, timestamp = {Mon, 26 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/MahbubPK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/MahbubPK22a, author = {Syed Mahbub and Eric Pardede and A. S. M. Kayes}, title = {{COVID-19} Rumor Detection Using Psycho-Linguistic Features}, journal = {{IEEE} Access}, volume = {10}, pages = {117530--117543}, year = {2022}, url = {https://doi.org/10.1109/ACCESS.2022.3220369}, doi = {10.1109/ACCESS.2022.3220369}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/MahbubPK22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/KayeshIWKW22, author = {Humayun Kayesh and Md. Saiful Islam and Junhu Wang and A. S. M. Kayes and Paul A. Watters}, title = {A deep learning model for mining and detecting causally related events in tweets}, journal = {Concurr. Comput. Pract. Exp.}, volume = {34}, number = {2}, year = {2022}, url = {https://doi.org/10.1002/cpe.5938}, doi = {10.1002/CPE.5938}, timestamp = {Fri, 21 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/concurrency/KayeshIWKW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/McIntoshKCNW22, author = {Timothy R. McIntosh and A. S. M. Kayes and Yi{-}Ping Phoebe Chen and Alex Ng and Paul A. Watters}, title = {Ransomware Mitigation in the Modern Era: {A} Comprehensive Review, Research Challenges, and Future Directions}, journal = {{ACM} Comput. Surv.}, volume = {54}, number = {9}, pages = {197:1--197:36}, year = {2022}, url = {https://doi.org/10.1145/3479393}, doi = {10.1145/3479393}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/McIntoshKCNW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/adma/HaqBGKWK22, author = {Ikram Ul Haq and Paul Black and Iqbal Gondal and Joarder Kamruzzaman and Paul A. Watters and A. S. M. Kayes}, editor = {Weitong Chen and Lina Yao and Taotao Cai and Shirui Pan and Tao Shen and Xue Li}, title = {Spam Email Categorization with {NLP} and Using Federated Deep Learning}, booktitle = {Advanced Data Mining and Applications - 18th International Conference, {ADMA} 2022, Brisbane, QLD, Australia, November 28-30, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13726}, pages = {15--27}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22137-8\_2}, doi = {10.1007/978-3-031-22137-8\_2}, timestamp = {Wed, 31 May 2023 15:58:13 +0200}, biburl = {https://dblp.org/rec/conf/adma/HaqBGKWK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/AbirACK21, author = {S. M. Abu Adnan Abir and Adnan Anwar and Jinho Choi and A. S. M. Kayes}, title = {IoT-Enabled Smart Energy Grid: Applications and Challenges}, journal = {{IEEE} Access}, volume = {9}, pages = {50961--50981}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3067331}, doi = {10.1109/ACCESS.2021.3067331}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/AbirACK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/McIntoshKCNW21, author = {Timothy R. McIntosh and A. S. M. Kayes and Yi{-}Ping Phoebe Chen and Alex Ng and Paul A. Watters}, title = {Dynamic user-centric access control for detection of ransomware attacks}, journal = {Comput. Secur.}, volume = {111}, pages = {102461}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102461}, doi = {10.1016/J.COSE.2021.102461}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/McIntoshKCNW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KalariaKRP21, author = {Rudri Kalaria and A. S. M. Kayes and Wenny Rahayu and Eric Pardede}, title = {A Secure Mutual authentication approach to fog computing environment}, journal = {Comput. Secur.}, volume = {111}, pages = {102483}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102483}, doi = {10.1016/J.COSE.2021.102483}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/KalariaKRP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computers/IffathKRFAH21, author = {Fariha Iffath and A. S. M. Kayes and Md. Tahsin Rahman and Jannatul Ferdows and Mohammad Shamsul Arefin and Md. Sabir Hossain}, title = {Online Judging Platform Utilizing Dynamic Plagiarism Detection Facilities}, journal = {Comput.}, volume = {10}, number = {4}, pages = {47}, year = {2021}, url = {https://doi.org/10.3390/computers10040047}, doi = {10.3390/COMPUTERS10040047}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computers/IffathKRFAH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computers/RashidaIKHAH21, author = {Maliha Rashida and Kawsarul Islam and A. S. M. Kayes and Mohammad Hammoudeh and Mohammad Shamsul Arefin and Mohammad Ashfak Habib}, title = {Towards Developing a Framework to Analyze the Qualities of the University Websites}, journal = {Comput.}, volume = {10}, number = {5}, pages = {57}, year = {2021}, url = {https://doi.org/10.3390/computers10050057}, doi = {10.3390/COMPUTERS10050057}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computers/RashidaIKHAH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcomp/AlkhalifahNWK21, author = {Ayman Alkhalifah and Alex Ng and Paul A. Watters and A. S. M. Kayes}, title = {A Mechanism to Detect and Prevent Ethereum Blockchain Smart Contract Reentrancy Attacks}, journal = {Frontiers Comput. Sci.}, volume = {3}, pages = {598780}, year = {2021}, url = {https://doi.org/10.3389/fcomp.2021.598780}, doi = {10.3389/FCOMP.2021.598780}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fcomp/AlkhalifahNWK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/McIntoshWKNC21, author = {Timothy R. McIntosh and Paul A. Watters and A. S. M. Kayes and Alex Ng and Yi{-}Ping Phoebe Chen}, title = {Enforcing situation-aware access control to build malware-resilient file systems}, journal = {Future Gener. Comput. Syst.}, volume = {115}, pages = {568--582}, year = {2021}, url = {https://doi.org/10.1016/j.future.2020.09.035}, doi = {10.1016/J.FUTURE.2020.09.035}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/McIntoshWKNC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsan/HammoudehWEKP21, author = {Mohammad Hammoudeh and Paul A. Watters and Gregory Epiphaniou and A. S. M. Kayes and Pedro Pinto}, title = {Special Issue "Security Threats and Countermeasures in Cyber-Physical Systems"}, journal = {J. Sens. Actuator Networks}, volume = {10}, number = {3}, pages = {54}, year = {2021}, url = {https://doi.org/10.3390/jsan10030054}, doi = {10.3390/JSAN10030054}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsan/HammoudehWEKP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/MahbubPK21, author = {Syed Mahbub and Eric Pardede and A. S. M. Kayes}, title = {Detection of Harassment Type of Cyberbullying: {A} Dictionary of Approach Words and Its Impact}, journal = {Secur. Commun. Networks}, volume = {2021}, pages = {5594175:1--5594175:12}, year = {2021}, url = {https://doi.org/10.1155/2021/5594175}, doi = {10.1155/2021/5594175}, timestamp = {Tue, 15 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/MahbubPK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/AkhterASAKZ21, author = {A. F. M. Suaib Akhter and Mohiuddin Ahmed and A. F. M. Shahen Shah and Adnan Anwar and A. S. M. Kayes and Ahmet Zengin}, title = {A Blockchain-Based Authentication Protocol for Cooperative Vehicular Ad Hoc Network}, journal = {Sensors}, volume = {21}, number = {4}, pages = {1273}, year = {2021}, url = {https://doi.org/10.3390/s21041273}, doi = {10.3390/S21041273}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/AkhterASAKZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crowncom/RahmanSAK21, author = {Saifur Rahman and Tance Suleski and Mohiuddin Ahmed and A. S. M. Kayes}, editor = {Huilong Jin and Chungang Liu and Al{-}Sakib Khan Pathan and Zubair Md. Fadlullah and Salimur Choudhury}, title = {An Investigation of Vulnerabilities in Internet of Health Things}, booktitle = {Cognitive Radio Oriented Wireless Networks and Wireless Internet - 16th {EAI} International Conference, {CROWNCOM} 2021, Virtual Event, December 11, 2021, and 14th {EAI} International Conference, WiCON 2021, Virtual Event, November 9, 2021, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {427}, pages = {296--306}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-98002-3\_22}, doi = {10.1007/978-3-030-98002-3\_22}, timestamp = {Fri, 01 Apr 2022 14:10:55 +0200}, biburl = {https://dblp.org/rec/conf/crowncom/RahmanSAK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/TuKRN20, author = {Doan Quang Tu and A. S. M. Kayes and Wenny Rahayu and Kinh Nguyen}, title = {Integration of IoT Streaming Data With Efficient Indexing and Storage Optimization}, journal = {{IEEE} Access}, volume = {8}, pages = {47456--47467}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.2980006}, doi = {10.1109/ACCESS.2020.2980006}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/TuKRN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/AnwarLGSKS20, author = {Tarique Anwar and Kewen Liao and Angelic Goyal and Timos Sellis and A. S. M. Kayes and Haifeng Shen}, title = {Inferring Location Types With Geo-Social-Temporal Pattern Mining}, journal = {{IEEE} Access}, volume = {8}, pages = {154789--154799}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.3018997}, doi = {10.1109/ACCESS.2020.3018997}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/AnwarLGSKS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ais/SarkerKFII20, author = {Iqbal H. Sarker and A. S. M. Kayes and Md. Hasan Furhad and Mohammad Mainul Islam and Md. Shohidul Islam}, title = {{E-MIIM:} an ensemble-learning-based context-aware mobile telephony model for intelligent interruption management}, journal = {{AI} Soc.}, volume = {35}, number = {2}, pages = {459--467}, year = {2020}, url = {https://doi.org/10.1007/s00146-019-00898-8}, doi = {10.1007/S00146-019-00898-8}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ais/SarkerKFII20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/SarkerCHKW20, author = {Iqbal H. Sarker and Alan Colman and Jun Han and A. S. M. Kayes and Paul A. Watters}, title = {CalBehav: {A} Machine Learning-Based Personalized Calendar Behavioral Model Using Time-Series Smartphone Data}, journal = {Comput. J.}, volume = {63}, number = {7}, pages = {1109--1123}, year = {2020}, url = {https://doi.org/10.1093/comjnl/bxz117}, doi = {10.1093/COMJNL/BXZ117}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/SarkerCHKW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/complexity/RahmanAHHK20, author = {Md. Rashadur Rahman and Mohammad Shamsul Arefin and Md. Billal Hossain and Mohammad Ashfak Habib and A. S. M. Kayes}, title = {Towards a Framework for Acquisition and Analysis of Speeches to Identify Suspicious Contents through Machine Learning}, journal = {Complex.}, volume = {2020}, pages = {5639787:1--5639787:14}, year = {2020}, url = {https://doi.org/10.1155/2020/5639787}, doi = {10.1155/2020/5639787}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/complexity/RahmanAHHK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computing/TuKRN20, author = {Doan Quang Tu and A. S. M. Kayes and Wenny Rahayu and Kinh Nguyen}, title = {IoT streaming data integration from multiple sources}, journal = {Computing}, volume = {102}, number = {10}, pages = {2299--2329}, year = {2020}, url = {https://doi.org/10.1007/s00607-020-00830-9}, doi = {10.1007/S00607-020-00830-9}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computing/TuKRN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/KayesRWADC20, author = {A. S. M. Kayes and Wenny Rahayu and Paul A. Watters and Mamoun Alazab and Tharam S. Dillon and Elizabeth Chang}, title = {Achieving security scalability and flexibility using Fog-Based Context-Aware Access Control}, journal = {Future Gener. Comput. Syst.}, volume = {107}, pages = {307--323}, year = {2020}, url = {https://doi.org/10.1016/j.future.2020.02.001}, doi = {10.1016/J.FUTURE.2020.02.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/KayesRWADC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fi/RoyAKHA20, author = {Animesh Chandra Roy and Mohammad Shamsul Arefin and A. S. M. Kayes and Mohammad Hammoudeh and Khandakar Ahmed}, title = {An Empirical Recommendation Framework to Support Location-Based Services}, journal = {Future Internet}, volume = {12}, number = {9}, pages = {154}, year = {2020}, url = {https://doi.org/10.3390/fi12090154}, doi = {10.3390/FI12090154}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fi/RoyAKHA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/firstmonday/Kayes0WNK20, author = {A. S. M. Kayes and Md. Saiful Islam and Paul A. Watters and Alex Ng and Humayun Kayesh}, title = {Automated measurement of attitudes towards social distancing using social media: {A} {COVID-19} case study}, journal = {First Monday}, volume = {25}, number = {11}, year = {2020}, url = {https://doi.org/10.5210/fm.v25i11.10599}, doi = {10.5210/FM.V25I11.10599}, timestamp = {Thu, 25 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/firstmonday/Kayes0WNK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotm/HammoudehPBEBKA20, author = {Mohammad Hammoudeh and John Pimlott and Sana Belguith and Gregory Epiphaniou and Thar Baker and A. S. M. Kayes and Bamidele Adebisi and Ahc{\`{e}}ne Bounceur}, title = {Network Traffic Analysis for Threat Detection in the Internet of Things}, journal = {{IEEE} Internet Things Mag.}, volume = {3}, number = {4}, pages = {40--45}, year = {2020}, url = {https://doi.org/10.1109/IOTM.0001.2000015}, doi = {10.1109/IOTM.0001.2000015}, timestamp = {Tue, 08 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotm/HammoudehPBEBKA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jbd/SarkerKBAWN20, author = {Iqbal H. Sarker and A. S. M. Kayes and Shahriar Badsha and Hamed AlQahtani and Paul A. Watters and Alex Ng}, title = {Cybersecurity data science: an overview from machine learning perspective}, journal = {J. Big Data}, volume = {7}, number = {1}, pages = {41}, year = {2020}, url = {https://doi.org/10.1186/s40537-020-00318-5}, doi = {10.1186/S40537-020-00318-5}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jbd/SarkerKBAWN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/SarkerK20, author = {Iqbal H. Sarker and A. S. M. Kayes}, title = {ABC-RuleMiner: User behavioral rule-based machine learning method for context-aware intelligent services}, journal = {J. Netw. Comput. Appl.}, volume = {168}, pages = {102762}, year = {2020}, url = {https://doi.org/10.1016/j.jnca.2020.102762}, doi = {10.1016/J.JNCA.2020.102762}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/SarkerK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/KayesKSIWNHBK20, author = {A. S. M. Kayes and Rudri Kalaria and Iqbal H. Sarker and Md. Saiful Islam and Paul A. Watters and Alex Ng and Mohammad Hammoudeh and Shahriar Badsha and Indika Kumara}, title = {A Survey of Context-Aware Access Control Mechanisms for Cloud and Fog Networks: Taxonomy and Open Research Issues}, journal = {Sensors}, volume = {20}, number = {9}, pages = {2464}, year = {2020}, url = {https://doi.org/10.3390/s20092464}, doi = {10.3390/S20092464}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/KayesKSIWNHBK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/HasanABIKI20, author = {Khalid Hasan and Khandakar Ahmed and Kamanashis Biswas and Md. Saiful Islam and A. S. M. Kayes and S. M. Riazul Islam}, title = {Control Plane Optimisation for an SDN-Based {WBAN} Framework to Support Healthcare Applications}, journal = {Sensors}, volume = {20}, number = {15}, pages = {4200}, year = {2020}, url = {https://doi.org/10.3390/s20154200}, doi = {10.3390/S20154200}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/HasanABIKI20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/ChowdhuryKWSN20, author = {Mohammad Jabed Morshed Chowdhury and A. S. M. Kayes and Paul A. Watters and Patrick Scolyer{-}Gray and Alex Ng}, title = {Patient Controlled, Privacy Preserving IoT Healthcare Data Sharing Framework}, booktitle = {53rd Hawaii International Conference on System Sciences, {HICSS} 2020, Maui, Hawaii, USA, January 7-10, 2020}, pages = {1--11}, publisher = {ScholarSpace}, year = {2020}, url = {https://hdl.handle.net/10125/64195}, timestamp = {Wed, 04 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hicss/ChowdhuryKWSN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciot3/KudvaNBSK20, author = {Sowmya Kudva and Renat Norderhaug and Shahriar Badsha and Shamik Sengupta and A. S. M. Kayes}, title = {{PEBERS:} Practical Ethereum Blockchain based Efficient Ride Hailing Service}, booktitle = {{IEEE} International Conference on Informatics, IoT, and Enabling Technologies, ICIoT 2020, Doha, Qatar, February 2-5, 2020}, pages = {422--428}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ICIoT48696.2020.9089473}, doi = {10.1109/ICIOT48696.2020.9089473}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iciot3/KudvaNBSK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciot3/KayesHBWNMI20, author = {A. S. M. Kayes and Mohammad Hammoudeh and Shahriar Badsha and Paul A. Watters and Alex Ng and Fatma Mohammed and Mofakharul Islam}, title = {Responsibility Attribution Against Data Breaches}, booktitle = {{IEEE} International Conference on Informatics, IoT, and Enabling Technologies, ICIoT 2020, Doha, Qatar, February 2-5, 2020}, pages = {498--503}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ICIoT48696.2020.9089466}, doi = {10.1109/ICIOT48696.2020.9089466}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iciot3/KayesHBWNMI20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icira/AlamTTBSK20, author = {Tauhidul Alam and Jarrett Taylor and Jonathan Taylor and Shahriar Badsha and Abdur Rahman Bin Shahid and A. S. M. Kayes}, editor = {Chee Seng Chan and Hong Liu and Xiangyang Zhu and Chern Hong Lim and Xinjun Liu and Lianqing Liu and Kam Meng Goh}, title = {Leveraging Blockchain for Spoof-Resilient Robot Networks}, booktitle = {Intelligent Robotics and Applications - 13th International Conference, {ICIRA} 2020, Kuala Lumpur, Malaysia, November 5-7, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12595}, pages = {207--216}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-66645-3\_18}, doi = {10.1007/978-3-030-66645-3\_18}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icira/AlamTTBSK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcnn/Kayesh0WAKW20, author = {Humayun Kayesh and Md. Saiful Islam and Junhu Wang and Shikha Anirban and A. S. M. Kayes and Paul A. Watters}, title = {Answering Binary Causal Questions: {A} Transfer Learning Based Approach}, booktitle = {2020 International Joint Conference on Neural Networks, {IJCNN} 2020, Glasgow, United Kingdom, July 19-24, 2020}, pages = {1--9}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/IJCNN48605.2020.9207662}, doi = {10.1109/IJCNN48605.2020.9207662}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ijcnn/Kayesh0WAKW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MohammedKPR20, author = {Fatma Mohammed and A. S. M. Kayes and Eric Pardede and Wenny Rahayu}, editor = {Guojun Wang and Ryan K. L. Ko and Md. Zakirul Alam Bhuiyan and Yi Pan}, title = {A Framework for Measuring IoT Data Quality Based on Freshness Metrics}, booktitle = {19th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020, Guangzhou, China, December 29, 2020 - January 1, 2021}, pages = {1242--1249}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00167}, doi = {10.1109/TRUSTCOM50675.2020.00167}, timestamp = {Fri, 30 Apr 2021 12:35:40 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/MohammedKPR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ChowdhuryFBCKAW19, author = {Mohammad Jabed Morshed Chowdhury and Md. Sadek Ferdous and Kamanashis Biswas and Niaz Chowdhury and A. S. M. Kayes and Mamoun Alazab and Paul A. Watters}, title = {A Comparative Analysis of Distributed Ledger Technology Platforms}, journal = {{IEEE} Access}, volume = {7}, pages = {167930--167943}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2953729}, doi = {10.1109/ACCESS.2019.2953729}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/ChowdhuryFBCKAW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/KayesHRDIC19, author = {A. S. M. Kayes and Jun Han and Wenny Rahayu and Tharam S. Dillon and Md. Saiful Islam and Alan Colman}, title = {A Policy Model and Framework for Context-Aware Access Control to Information Resources{\textdagger}}, journal = {Comput. J.}, volume = {62}, number = {5}, pages = {670--705}, year = {2019}, url = {https://doi.org/10.1093/comjnl/bxy065}, doi = {10.1093/COMJNL/BXY065}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/KayesHRDIC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computing/KayesRD19, author = {A. S. M. Kayes and Wenny Rahayu and Tharam S. Dillon}, title = {Critical situation management utilizing IoT-based data resources through dynamic contextual role modeling and activation}, journal = {Computing}, volume = {101}, number = {7}, pages = {743--772}, year = {2019}, url = {https://doi.org/10.1007/s00607-018-0654-1}, doi = {10.1007/S00607-018-0654-1}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computing/KayesRD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/KayesRDCH19, author = {A. S. M. Kayes and Wenny Rahayu and Tharam S. Dillon and Elizabeth Chang and Jun Han}, title = {Context-aware access control with imprecise context characterization for cloud-based data resources}, journal = {Future Gener. Comput. Syst.}, volume = {93}, pages = {237--255}, year = {2019}, url = {https://doi.org/10.1016/j.future.2018.10.036}, doi = {10.1016/J.FUTURE.2018.10.036}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/KayesRDCH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/firstmonday/WattersSKC19, author = {Paul A. Watters and Patrick Scolyer{-}Gray and A. S. M. Kayes and Mohammad Jabed Morshed Chowdhury}, title = {This would work perfectly if it weren't for all the humans: Two factor authentication in late modern societies}, journal = {First Monday}, volume = {24}, number = {7}, year = {2019}, url = {https://doi.org/10.5210/fm.v24i7.10095}, doi = {10.5210/FM.V24I7.10095}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/firstmonday/WattersSKC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijwgs/MahbubPKR19, author = {Syed Mahbub and Eric Pardede and A. S. M. Kayes and Wenny Rahayu}, title = {Controlling astroturfing on the internet: a survey on detection techniques and research challenges}, journal = {Int. J. Web Grid Serv.}, volume = {15}, number = {2}, pages = {139--158}, year = {2019}, url = {https://doi.org/10.1504/IJWGS.2019.099561}, doi = {10.1504/IJWGS.2019.099561}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijwgs/MahbubPKR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jbd/SarkerKW19, author = {Iqbal H. Sarker and A. S. M. Kayes and Paul A. Watters}, title = {Effectiveness analysis of machine learning classification models for predicting personalized context-aware smartphone usage}, journal = {J. Big Data}, volume = {6}, pages = {57}, year = {2019}, url = {https://doi.org/10.1186/s40537-019-0219-y}, doi = {10.1186/S40537-019-0219-Y}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jbd/SarkerKW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/TuKRN19, author = {Doan Quang Tu and A. S. M. Kayes and Wenny Rahayu and Kinh Nguyen}, editor = {Leonard Barolli and Makoto Takizawa and Fatos Xhafa and Tomoya Enokido}, title = {{ISDI:} {A} New Window-Based Framework for Integrating IoT Streaming Data from Multiple Sources}, booktitle = {Advanced Information Networking and Applications - Proceedings of the 33rd International Conference on Advanced Information Networking and Applications, {AINA} 2019, Matsue, Japan, March 27-29, 2019}, series = {Advances in Intelligent Systems and Computing}, volume = {926}, pages = {498--511}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-15032-7\_42}, doi = {10.1007/978-3-030-15032-7\_42}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/TuKRN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cloudcom/ChowdhuryFBCKWN19, author = {Mohammad Jabed Morshed Chowdhury and Md. Sadek Ferdous and Kamanashis Biswas and Niaz Chowdhury and A. S. M. Kayes and Paul A. Watters and Alex Ng}, title = {Trust Modeling for Blockchain-Based Wearable Data Market}, booktitle = {2019 {IEEE} International Conference on Cloud Computing Technology and Science (CloudCom), Sydney, Australia, December 11-13, 2019}, pages = {411--417}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CloudCom.2019.00070}, doi = {10.1109/CLOUDCOM.2019.00070}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cloudcom/ChowdhuryFBCKWN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1909-04724, author = {Iqbal H. Sarker and Alan Colman and Jun Han and A. S. M. Kayes and Paul A. Watters}, title = {CalBehav: {A} Machine Learning based Personalized Calendar Behavioral Model using Time-Series Smartphone Data}, journal = {CoRR}, volume = {abs/1909.04724}, year = {2019}, url = {http://arxiv.org/abs/1909.04724}, eprinttype = {arXiv}, eprint = {1909.04724}, timestamp = {Fri, 06 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1909-04724.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1909-11029, author = {Iqbal H. Sarker and A. S. M. Kayes and Md. Hasan Furhad and Mohammad Mainul Islam and Md. Shohidul Islam}, title = {{E-MIIM:} An Ensemble Learning based Context-Aware Mobile Telephony Model for Intelligent Interruption Management}, journal = {CoRR}, volume = {abs/1909.11029}, year = {2019}, url = {http://arxiv.org/abs/1909.11029}, eprinttype = {arXiv}, eprint = {1909.11029}, timestamp = {Sat, 22 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1909-11029.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/KayesRD18, author = {A. S. M. Kayes and J. Wenny Rahayu and Tharam S. Dillon}, editor = {Leonard Barolli and Makoto Takizawa and Tomoya Enokido and Marek R. Ogiela and Lidia Ogiela and Nadeem Javaid}, title = {An Ontology-Based Approach to Dynamic Contextual Role for Pervasive Access Control}, booktitle = {32nd {IEEE} International Conference on Advanced Information Networking and Applications, {AINA} 2018, Krakow, Poland, May 16-18, 2018}, pages = {601--608}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/AINA.2018.00093}, doi = {10.1109/AINA.2018.00093}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/KayesRD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/KayesRDC18, author = {A. S. M. Kayes and J. Wenny Rahayu and Tharam S. Dillon and Elizabeth Chang}, title = {Accessing Data from Multiple Sources Through Context-Aware Access Control}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {551--559}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00084}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00084}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/KayesRDC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wise/KayesRDMPC18, author = {A. S. M. Kayes and J. Wenny Rahayu and Tharam S. Dillon and Syed Mahbub and Eric Pardede and Elizabeth Chang}, editor = {Hakim Hacid and Wojciech Cellary and Hua Wang and Hye{-}Young Paik and Rui Zhou}, title = {Dynamic Transitions of States for Context-Sensitive Access Control Decision}, booktitle = {Web Information Systems Engineering - {WISE} 2018 - 19th International Conference, Dubai, United Arab Emirates, November 12-15, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11233}, pages = {127--142}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-02922-7\_9}, doi = {10.1007/978-3-030-02922-7\_9}, timestamp = {Sun, 25 Oct 2020 22:33:15 +0100}, biburl = {https://dblp.org/rec/conf/wise/KayesRDMPC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/otm/KayesRDCH17, author = {A. S. M. Kayes and J. Wenny Rahayu and Tharam S. Dillon and Elizabeth Chang and Jun Han}, editor = {Herv{\'{e}} Panetto and Christophe Debruyne and Walid Gaaloul and Mike P. Papazoglou and Adrian Paschke and Claudio Agostino Ardagna and Robert Meersman}, title = {Context-Aware Access Control with Imprecise Context Characterization Through a Combined Fuzzy Logic and Ontology-Based Approach}, booktitle = {On the Move to Meaningful Internet Systems. {OTM} 2017 Conferences - Confederated International Conferences: CoopIS, C{\&}TC, and {ODBASE} 2017, Rhodes, Greece, October 23-27, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10573}, pages = {132--153}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-69462-7\_10}, doi = {10.1007/978-3-319-69462-7\_10}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/otm/KayesRDCH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/KayesHRIC17, author = {A. S. M. Kayes and Jun Han and J. Wenny Rahayu and Md. Saiful Islam and Alan W. Colman}, title = {A Policy Model and Framework for Context-Aware Access Control to Information Resources}, journal = {CoRR}, volume = {abs/1703.02162}, year = {2017}, url = {http://arxiv.org/abs/1703.02162}, eprinttype = {arXiv}, eprint = {1703.02162}, timestamp = {Mon, 27 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/KayesHRIC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/KayesHC15, author = {A. S. M. Kayes and Jun Han and Alan Colman}, title = {OntCAAC: An Ontology-Based Approach to Context-Aware Access Control for Software Services}, journal = {Comput. J.}, volume = {58}, number = {11}, pages = {3000--3034}, year = {2015}, url = {https://doi.org/10.1093/comjnl/bxv034}, doi = {10.1093/COMJNL/BXV034}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/KayesHC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/is/KayesHC15, author = {A. S. M. Kayes and Jun Han and Alan W. Colman}, title = {An ontological framework for situation-aware access control of software services}, journal = {Inf. Syst.}, volume = {53}, pages = {253--277}, year = {2015}, url = {https://doi.org/10.1016/j.is.2015.03.011}, doi = {10.1016/J.IS.2015.03.011}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/is/KayesHC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/caise/KayesHC14, author = {A. S. M. Kayes and Jun Han and Alan Colman}, editor = {Matthias Jarke and John Mylopoulos and Christoph Quix and Colette Rolland and Yannis Manolopoulos and Haralambos Mouratidis and Jennifer Horkoff}, title = {{PO-SAAC:} {A} Purpose-Oriented Situation-Aware Access Control Framework for Software Services}, booktitle = {Advanced Information Systems Engineering - 26th International Conference, CAiSE 2014, Thessaloniki, Greece, June 16-20, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8484}, pages = {58--74}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-07881-6\_5}, doi = {10.1007/978-3-319-07881-6\_5}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/caise/KayesHC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/otm/KayesHCI14, author = {A. S. M. Kayes and Jun Han and Alan Colman and Md. Saiful Islam}, editor = {Robert Meersman and Herv{\'{e}} Panetto and Tharam S. Dillon and Michele Missikoff and Lin Liu and Oscar Pastor and Alfredo Cuzzocrea and Timos K. Sellis}, title = {RelBOSS: {A} Relationship-Aware Access Control Framework for Software Services}, booktitle = {On the Move to Meaningful Internet Systems: {OTM} 2014 Conferences - Confederated International Conferences: CoopIS, and {ODBASE} 2014, Amantea, Italy, October 27-31, 2014, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8841}, pages = {258--276}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-45563-0\_15}, doi = {10.1007/978-3-662-45563-0\_15}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/otm/KayesHCI14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/00030KLA14, author = {Md. Saiful Islam and Md. Rafiqul Islam and A. S. M. Kayes and Chengfei Liu and Irfan Altas}, editor = {Jing Tian and Jiwu Jing and Mudhakar Srivatsa}, title = {A Survey on Mining Program-Graph Features for Malware Analysis}, booktitle = {International Conference on Security and Privacy in Communication Networks - 10th International {ICST} Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part {II}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {153}, pages = {220--236}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-23802-9\_18}, doi = {10.1007/978-3-319-23802-9\_18}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/00030KLA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icsoc/KayesHC13, author = {A. S. M. Kayes and Jun Han and Alan Colman}, editor = {Alessio Lomuscio and Surya Nepal and Fabio Patrizi and Boualem Benatallah and Ivona Brandic}, title = {A Context-Aware Access Control Framework for Software Services}, booktitle = {Service-Oriented Computing - {ICSOC} 2013 Workshops - CCSA, CSB, PASCEB, SWESE, WESOA, and PhD Symposium, Berlin, Germany, December 2-5, 2013. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8377}, pages = {569--577}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-06859-6\_53}, doi = {10.1007/978-3-319-06859-6\_53}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icsoc/KayesHC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/KayesHC13, author = {A. S. M. Kayes and Jun Han and Alan Colman}, title = {A Semantic Policy Framework for Context-Aware Access Control Applications}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {753--762}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.91}, doi = {10.1109/TRUSTCOM.2013.91}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/KayesHC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wise/KayesHC13, author = {A. S. M. Kayes and Jun Han and Alan Colman}, editor = {Xuemin Lin and Yannis Manolopoulos and Divesh Srivastava and Guangyan Huang}, title = {An Ontology-Based Approach to Context-Aware Access Control for Software Services}, booktitle = {Web Information Systems Engineering - {WISE} 2013 - 14th International Conference, Nanjing, China, October 13-15, 2013, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8180}, pages = {410--420}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41230-1\_34}, doi = {10.1007/978-3-642-41230-1\_34}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wise/KayesHC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/KayesHC12, author = {A. S. M. Kayes and Jun Han and Alan W. Colman}, editor = {Willy Susilo and Yi Mu and Jennifer Seberry}, title = {{ICAF:} {A} Context-Aware Framework for Access Control}, booktitle = {Information Security and Privacy - 17th Australasian Conference, {ACISP} 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7372}, pages = {442--449}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31448-3\_34}, doi = {10.1007/978-3-642-31448-3\_34}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/KayesHC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.