


default search action
BigDataSecurity/HPSC/IDS 2020, Baltimore, MD, USA
- 6th IEEE International Conference on Big Data Security on Cloud, IEEE International Conference on High Performance and Smart Computing, and IEEE International Conference on Intelligent Data and Security, BigDataSecurity/HPSC/IDS 2020, Baltimore, MD, USA, May 25-27, 2020. IEEE 2020, ISBN 978-1-7281-6873-9

- Adithya Bandi, Karuna P. Joshi, Varish Mulwad:

Affinity Propagation Initialisation Based Proximity Clustering For Labeling in Natural Language Based Big Data Systems. 1-7 - Bhavani Thuraisingham:

Multi-Generational Database Inference Controllers. 8-12 - Yundan Liang, Zhengdong Ren, Jiawei Liao, Peipei Jin, Yu Huang, Guangxian Lv, Yiming Lu:

Research on Maintenance Strategy of Distribution Network based on Monte Carlo Tree. 13-18 - Dongxiao Jiang, Chenggang Li, Lixin Ma, Xiaoyu Ji, Yanjiao Chen, Bo Li:

ABInfer: A Novel Field Boundaries inference Approach for Protocol Reverse Engineering. 19-23 - Qian Wang, Jinan Sun, Chen Wang, Shikun Zhang, Sisi Xuanyuan, Bin Zheng:

Access Control Vulnerabilities Detection for Web Application Components. 24-28 - Sai Sree Laya Chukkapalli, Aritran Piplai, Sudip Mittal, Maanak Gupta, Anupam Joshi

:
A Smart-Farming Ontology for Attribute Based Access Control. 29-34 - Sofia Dutta, Sai Sree Laya Chukkapalli, Madhura Sulgekar, Swathi Krithivasan, Prajit Kumar Das, Anupam Joshi

:
Context Sensitive Access Control in Smart Home Environments. 35-41 - Weipeng Cao, Pengfei Yang, Zhong Ming, Shubin Cai, Jiyong Zhang

:
An Improved Fuzziness based Random Vector Functional Link Network for Liver Disease Detection. 42-48 - Aritran Piplai, Sai Sree Laya Chukkapalli, Anupam Joshi

:
NAttack! Adversarial Attacks to bypass a GAN based classifier trained to detect Network intrusion. 49-54 - Aidong Xu, Lin Chen, Xiaoyun Kuang, Huahui Lv, Hang Yang, Yixin Jiang, Bo Li:

A Hybrid Deep Learning Model for Malicious Behavior Detection. 55-59 - Lin Chen, Aidong Xu, Xiaoyun Kuang, Huahui Lv, Hang Yang, Yiwei Yang, Bo Li:

Detecting Advanced Attacks Based On Linux Logs. 60-64 - Prasanthi Sreekumari:

Malware Detection Techniques Based on Deep Learning. 65-70 - Wenxuan Pan, Meikang Qiu:

Application of Blockchain in Asset-Backed Securitization. 71-76 - Yihang Wei:

Blockchain-based Data Traceability Platform Architecture for Supply Chain Management. 77-85 - Abhishek Mahindrakar, Karuna Pande Joshi:

Automating GDPR Compliance using Policy Integrated Blockchain. 86-93 - Meikang Qiu, Han Qiu:

Review on Image Processing Based Adversarial Example Defenses in Computer Vision. 94-99 - Zhuoyi Wang, Yigong Wang, Bo Dong, Pracheta Sahoo, Kevin W. Hamlen, Latifur Khan

:
Adaptive Margin Based Deep Adversarial Metric Learning. 100-108 - Yongzhi Wang, Chengli Xing, Jinan Sun, Shikun Zhang, Sisi Xuanyuan, Long Zhang:

Solving the Dependency Conflict of Java Components: A Comparative Empirical Analysis. 109-114 - Jennifer Sleeman, Tim Finin

, Milton Halem:
Temporal Understanding of Cybersecurity Threats. 115-121 - Xinxin Liu, Hua Huang, Hao Wu:

Intelligent generation algorithm of ceramic decorative pattern. 122-126 - Ali Azari, Josephine M. Namayanja, Navneet Kaur, Vasundhara Misal, Suraksha Shukla:

Imbalanced Learning in Massive Phishing Datasets. 127-132 - Wenhui Hu, Long Zhang, Xueyang Liu, Yu Huang, Minghui Zhang, Liang Xing:

Research on Automatic Generation and Analysis Technology of Network Attack Graph. 133-139 - Aidong Xu, Lin Chen, Yixin Jiang, Huahui Lv, Hang Yang, Bo Li:

Finding Gold in the Sand: Identifying Anomaly Indicators Though Huge Amount Security Logs. 140-144 - Dharitri Tripathy, Rudrarajsinh Gohil, Talal Halabi

:
Detecting SQL Injection Attacks in Cloud SaaS using Machine Learning. 145-150 - Vrushang Patel, Seungho Choe

, Talal Halabi
:
Predicting Future Malware Attacks on Cloud Systems using Machine Learning. 151-156 - Jian Li, Hao Jiang

, Wei Jiang, Jing Wu, Wen Du:
SDN-based Stateful Firewall for Cloud. 157-161 - James Kok Konjaang

, Lina Xu:
Cost Optimised Heuristic Algorithm (COHA) for Scientific Workflow Scheduling in IaaS Cloud Environment. 162-168 - Zahir Alsulaimawi

:
Gaussian Privacy Protector for Online Data Communication in a Public World. 169-173 - Yunqing Hong, Si Xu:

A Navigation Satellite Selection Method Based on optimized DPSO Algorithm. 174-179 - Xueying Yang, Zhonghua Lu

, Meikang Qiu, Yonghong Hu:
A Parallel Integer Relative Robust Mean-RCVaR Model for Portfolio optimization. 180-185 - Disheng Pan, Xizi Zheng, Weijie Liu, Mengya Li, Meng Ma, Ying Zhou

, Li Yang, Ping Wang:
Multi-label Classification for Clinical Text with Feature-level Attention. 186-191 - Sathish A. P. Kumar, Michael A. Brown:

A Reflective Neural Network Based Learning Framework for Intelligent Physical Systems. 192-197 - Deepti Gupta

, Smriti Bhatt, Maanak Gupta, Olumide Kayode, Ali Saman Tosun:
Access Control Model for Google Cloud IoT. 198-208 - Timilehin David Sobola, Pavol Zavarsky, Sergey Butakov:

Experimental Study of ModSecurity Web Application Firewalls. 209-213 - Muhammad Ali Fauzi

, Bian Yang, Edlira Martiri
:
PassGAN Based Honeywords System for Machine-Generated Passwords Database. 214-220 - Ronald Doku

, Danda B. Rawat
:
IFLBC: On the Edge Intelligence Using Federated Learning Blockchain Network. 221-226 - Sushant Sharma, Pavol Zavarsky, Sergey Butakov:

Machine Learning based Intrusion Detection System for Web-Based Attacks. 227-230 - Victor Ajiri, Sergey Butakov, Pavol Zavarsky:

Detection Efficiency of Static Analyzers against Obfuscated Android Malware. 231-234 - Krishna Gondaliya, Sergey Butakov, Pavol Zavarsky:

SLA as a mechanism to manage risks related to chatbot services. 235-240 - Osborn N. Nyasore, Pavol Zavarsky, Bobby Swar, Raphael Naiyeju, Shubham Dabra:

Deep Packet Inspection in Industrial Automation Control System to Mitigate Attacks Exploiting Modbus/TCP Vulnerabilities. 241-245 - Sayeed Salam, Lamisah Khan, Amir El-Ghamry, Patrick T. Brandt

, Jennifer S. Holmes, Vito D'Orazio, Javier Osorio:
Automatic Event Coding Framework for Spanish Political News Articles. 246-253 - Ou Ruan, Xiongbo Huang, Hao Mao:

An Efficient Private Set Intersection Protocol for the Cloud Computing Environments. 254-259 - Andrii Kashliev:

Storage and Querying of Large Provenance Graphs Using NoSQL DSE. 260-262 - Julie L. Harvey, Sathish A. P. Kumar:

A Survey of Intelligent Transportation Systems Security: Challenges and Solutions. 263-268

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














