Impact of cyberattacks on stock performance: a comparative study
Journal Article
Tweneboah-Kodua, S., Atsu, F., & Buchanan, W. (2018)
Impact of cyberattacks on stock performance: a comparative study. Information and Computer Security, 26(5), 637-652. doi:10.1108/ics-05-2018-0060
The study uses cyberattacks announcements on 96 firms that are listed on S&P 500 over the period January 03, 2013 and December 29, 2017.
The empirical analysis was performed i...
Requirements for 5G based telemetric cardiac monitoring
Conference Proceeding
Thuemmler, C., Hindricks, G., Rolffs, C., Buchanan, W., & Bollmann, A. (2018)
Requirements for 5G based telemetric cardiac monitoring. In 2018 14th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)https://doi.org/10.1109/WiMOB.2018.8589139
Several white papers have been published on general requirements for 5G in the health vertical. As 5G research and implementation continue more detailed real world information...
Decentralized dynamic understanding of hidden relations in complex networks
Journal Article
Mocanu, D. C., Exarchakos, G., & Liotta, A. (2018)
Decentralized dynamic understanding of hidden relations in complex networks. Scientific Reports, 8(1), https://doi.org/10.1038/s41598-018-19356-4
Almost all the natural or human made systems can be understood and controlled using complex networks. This is a difficult problem due to the very large number of elements in s...
The efficacy of Euler diagrams and linear diagrams for visualizing set cardinality using proportions and numbers
Journal Article
Stapleton, G., Chapman, P., Rodgers, P., Touloumis, A., Blake, A., & Delaney, A. (2019)
The efficacy of Euler diagrams and linear diagrams for visualizing set cardinality using proportions and numbers. PLOS ONE, 14(3), https://doi.org/10.1371/journal.pone.0211234
This paper presents the first empirical investigation that compares Euler and linear diagrams when they are used to represent set cardinality. A common approach is to use area...
Visualization of Online Datasets
Conference Proceeding
Peng, T., & Downie, C. (2017)
Visualization of Online Datasets. In Proceedings of 15th IEEE/ACIS International Conference on Software Engineering Research, Management and Application (SERA). , (239-246
As computing technology advances, computers are being used to orchestrate and advance wide spectrums of commercial and personal life, an element even more significant as we im...
Reviving legacy enterprise systems with microservice-based architecture within cloud environments
Conference Proceeding
Habibullah, S., Liu, X., Tan, Z., Zhang, Y., & Liu, Q. (2019)
Reviving legacy enterprise systems with microservice-based architecture within cloud environments. In Computer Science Conference Proceedingshttps://doi.org/10.5121/csit.2019.90713
Evolution has always been a challenge for enterprise computing systems. The microservice based architecture is a new design model which is rapidly becoming one of the most eff...
Fuzzy-Based Distributed Protocol for Vehicle-to-Vehicle Communication
Journal Article
Hawbani, A., Torbosh, E., Wang, X., Sincak, P., Zhao, L., & Al-Dubai, A. (2021)
Fuzzy-Based Distributed Protocol for Vehicle-to-Vehicle Communication. IEEE Transactions on Fuzzy Systems, 29(3), 612-626. https://doi.org/10.1109/tfuzz.2019.2957254
This paper modeled the multihop data-routing in Vehicular Ad-hoc Networks(VANET) as Multiple Criteria Decision Making (MCDM) in four steps. First, the criteria which have an i...
The Greater The Power, The More Dangerous The Abuse: Facing Malicious Insiders in The Cloud
Conference Proceeding
Pitropakis, N., Lyvas, C., & Lambrinoudakis, C. (2017)
The Greater The Power, The More Dangerous The Abuse: Facing Malicious Insiders in The Cloud. In C. Becker Westphall, Y. Woo Lee, B. Duncan, R. Ege, A. Olmsted, M. Vassilakopoulos, …S. Katsikas (Eds.), CLOUD COMPUTING 2017 - The Eighth International Conference on Cloud Computing, GRIDs, and Virtualization
The financial crisis made companies around the world search for cheaper and more efficient solutions to cover their needs in terms of computational power and storage. Their qu...
A speculative approach to spatial-temporal efficiency with multi-objective optimization in a heterogeneous cloud environment
Journal Article
Liu, Q., Cai, W., Shen, J., Fu, Z., Liu, X., & Linge, N. (2016)
A speculative approach to spatial-temporal efficiency with multi-objective optimization in a heterogeneous cloud environment. Security and Communication Networks, 9(17), 4002-4012. https://doi.org/10.1002/sec.1582
A heterogeneous cloud system, for example, a Hadoop 2.6.0 platform, provides distributed but cohesive services with rich features on large-scale management, reliability, and e...
Exploring coupled images fusion based on joint tensor decomposition
Journal Article
Lu, L., Ren, X., Yeh, K., Tan, Z., & Chanussot, J. (2020)
Exploring coupled images fusion based on joint tensor decomposition. Human-Centric Computing and Information Sciences, 10, https://doi.org/10.1186/s13673-020-00215-z
Data fusion has always been a hot research topic in human-centric computing and extended with the development of artificial intelligence. Generally, the coupled data fusion al...