30 results

Deep Learning and Dempster-Shafer Theory Based Insider Threat Detection

Journal Article
Tian, Z., Shi, W., Tan, Z., Qiu, J., Sun, Y., Jiang, F., & Liu, Y. (in press)
Deep Learning and Dempster-Shafer Theory Based Insider Threat Detection. Mobile Networks and Applications, https://doi.org/10.1007/s11036-020-01656-7
Organizations' own personnel now have a greater ability than ever before to misuse their access to critical organizational assets. Insider threat detection is a key component ...

A scalable plane-based broadcast algorithm for 3D-Mesh networks

Conference Proceeding
Al-Dubai, A., Ould-Khaoua, M., & Mackenzie, L. (2002)
A scalable plane-based broadcast algorithm for 3D-Mesh networks. In Proceedings of the Eleventh Euromicro Conference on Parallel,Distributed and Network-Based Processing (Euro-PDP’03), 149-156. doi:10.1109/empdp.2003.1183581
Broadcast algorithms for wormhole–switched meshes have been widely reported in the literature. However, most of these algorithms handle broadcast in a sequential manner and do...

Building Scalable Cyber-Physical-Social Networking Infrastructure Using IoT and Low Power Sensors

Journal Article
Lenka, R. K., Rath, A. K., Tan, Z., Sharma, S., Puthal, D., Simha, N. V. R., …Tripathi, S. S. (2018)
Building Scalable Cyber-Physical-Social Networking Infrastructure Using IoT and Low Power Sensors. IEEE Access, 6, 30162-30173. https://doi.org/10.1109/ACCESS.2018.2842760
Wireless Sensors are an important component to develop the Internet of Things (IoT) Sensing infrastructure. There are enormous numbers of sensors connected with each other to ...

Mastering Delphi programming.

Book
Buchanan, W. J. (2001)
Mastering Delphi programming. Palgrave Publishers
This book provides an introduction to the use of Delphi Version 3/4 in developing programs, full of real-life applications including serial communications, internet programmin...

A social-technological alignment matrix.

Conference Proceeding
Thuemmler, C., Mival, O., Lim, A. K., Holanec, I., & Fricker, S. (2015)
A social-technological alignment matrix. In 2014 IEEE 16th International Conference on e-Health Networking, Applications and Services (Healthcom), 200-205. https://doi.org/10.1109/healthcom.2014.7001841
This paper refers to the term " implementation " as the Especially in health care this has proven to be a very critical phase Although strategies such as requirements engineer...

Integrated many-to-many multicast addressing and access control method

Conference Proceeding
Romdhani, I., & Yassin Al-Dubai, A. (2009)
Integrated many-to-many multicast addressing and access control method. In 2009 IEEE Symposium on Computers and Communications, 649-654. https://doi.org/10.1109/iscc.2009.5202288
IP multicast is an efficient method for distributing multimedia content to a large number of receivers while saving the network bandwidth and reducing processing overhead on t...

NgramPOS: A Bigram-based Linguistic and Statistical Feature Process Model for Unstructured Text Classification

Journal Article
Yazdania, S., Tan, Z., Kakavand, M., & Lau, S. (2022)
NgramPOS: A Bigram-based Linguistic and Statistical Feature Process Model for Unstructured Text Classification. Wireless Networks, 28, 1251-1261. https://doi.org/10.1007/s11276-018-01909-0
Research in financial domain has shown that sentiment aspects of stock news have a profound impact on volume trades, volatility, stock prices and firm earnings. With the ever ...

Mastering Pascal and Delphi programming.

Book
Buchanan, W. J. (1997)
Mastering Pascal and Delphi programming. Macmillan Press
This work provides an introduction to programming with Pascal and extends this to show how Borland Delphi is used to develop Microsoft Windows programs. It provides real life ...

Dynamic fine-grained access control in e-Health using: The secure SQL server system as an enabler of the future Internet

Conference Proceeding
Paulin, A., & Thuemmler, C. (2016)
Dynamic fine-grained access control in e-Health using: The secure SQL server system as an enabler of the future Internet. In 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom),, (245-248). https://doi.org/10.1109/HealthCom.2016.7749462
This paper describes the use of the Secure SQL Server system (SecSQL) – a system for dynamic fine-grained access control, in the context of e-Health. The system was used in tw...

On balancing traffic load in path-based multicast communication.

Conference Proceeding
Al-Dubai, A., Ould-Khaoua, M., El-Zayyat, K., & Mackenzie, L. (2002)
On balancing traffic load in path-based multicast communication. In SPECTS '03, 533-540
Multicast is the most primitive collective capability of any message-passing network. It is itself central to many important parallel applications in Science and Engineering b...