Date


People

Output Type

Download Available

Dewey Decimal

351 results

Deep Learning and Dempster-Shafer Theory Based Insider Threat Detection

Journal Article
Tian, Z., Shi, W., Tan, Z., Qiu, J., Sun, Y., Jiang, F., & Liu, Y. (in press)
Deep Learning and Dempster-Shafer Theory Based Insider Threat Detection. Mobile Networks and Applications, https://doi.org/10.1007/s11036-020-01656-7
Organizations' own personnel now have a greater ability than ever before to misuse their access to critical organizational assets. Insider threat detection is a key component ...

Exploring coupled images fusion based on joint tensor decomposition

Journal Article
Lu, L., Ren, X., Yeh, K., Tan, Z., & Chanussot, J. (2020)
Exploring coupled images fusion based on joint tensor decomposition. Human-Centric Computing and Information Sciences, 10, https://doi.org/10.1186/s13673-020-00215-z
Data fusion has always been a hot research topic in human-centric computing and extended with the development of artificial intelligence. Generally, the coupled data fusion al...

Trust-aware and Cooperative Routing Protocol for IoT Security

Journal Article
Djedjig, N., Tandjaoui, D., Medjek, F., & Romdhani, I. (2020)
Trust-aware and Cooperative Routing Protocol for IoT Security. Journal of Information Security and Applications, 52, https://doi.org/10.1016/j.jisa.2020.102467
The resource-constrained nature of IoT objects makes the Routing Protocol for Low-power and Lossy Networks (RPL) vulnerable to several attacks. Although RPL specification prov...

Employing a Machine Learning Approach to Detect Combined Internet of Things Attacks Against Two Objective Functions Using a Novel Dataset

Journal Article
Foley, J., Moradpoor, N., & Ochen, H. (2020)
Employing a Machine Learning Approach to Detect Combined Internet of Things Attacks Against Two Objective Functions Using a Novel Dataset. Security and Communication Networks, 2020, 1-17. https://doi.org/10.1155/2020/2804291
One of the important features of Routing Protocol for Low-Power and Lossy Networks (RPL) is Objective Function (OF). OF influences an IoT network in terms of routing strategie...

Using MAP-Elites to support policy making around Workforce Scheduling and Routing

Journal Article
Urquhart, N., Hart, E., & Hutcheson, W. (2020)
Using MAP-Elites to support policy making around Workforce Scheduling and Routing. Automatisierungstechnik, 68(2), https://doi.org/10.1515/auto-2019-0107
English abstract: Algorithms such as MAP-Elites provide a means of allowing users to explore a solution space by returning an archive of high-performing solutions. Such an arc...

An authentication protocol based on chaos and zero knowledge proof

Journal Article
Major, W., Buchanan, W. J., & Ahmad, J. (2020)
An authentication protocol based on chaos and zero knowledge proof. Nonlinear Dynamics, 99, 3065-3087. https://doi.org/10.1007/s11071-020-05463-3
Port Knocking is a method for authenticating clients through a closed stance firewall, and authorising their requested actions, enabling severs to offer services to authentica...

Fast Forensic Triage Using Centralised Thumbnail Caches on Windows Operating Systems

Journal Article
Mckeown, S., Russell, G., & Leimich, P. (2020)
Fast Forensic Triage Using Centralised Thumbnail Caches on Windows Operating Systems. Journal of Digital Forensics, Security and Law, 14(3),
A common investigative task is to identify known contraband images on a device, which typically involves calculating cryptographic hashes for all the files on a disk and check...

Double-Arc Parallel Coordinates and its Axes re-Ordering Methods

Journal Article
Lu, L., Wang, W., & Tan, Z. (2020)
Double-Arc Parallel Coordinates and its Axes re-Ordering Methods. Mobile Networks and Applications, 25(4), 1376-1391. https://doi.org/10.1007/s11036-019-01455-9
The Parallel Coordinates Plot (PCP) is a popular technique for the exploration of high-dimensional data. In many cases, researchers apply it as an effective method to analyze ...

A Review on Deep Learning Approaches to Image Classification and Object Segmentation

Journal Article
Wu, H., Liu, Q., & Liu, X. (2019)
A Review on Deep Learning Approaches to Image Classification and Object Segmentation. Computers, Materials & Continua, 60(2), 575-597. https://doi.org/10.32604/cmc.2019.03595
Deep learning technology has brought great impetus to artificial intelligence, especially in the fields of image processing, pattern and object recognition in recent years. Pr...

PTAOD: A Novel Framework For Supporting Approximate Outlier Detection over Streaming Data for Edge Computing

Journal Article
Zhu, R., Yu, T., Tan, Z., Du, W., Zhao, L., Li, J., & Xia, X. (2019)
PTAOD: A Novel Framework For Supporting Approximate Outlier Detection over Streaming Data for Edge Computing. IEEE Access, 8, 1475-1485. https://doi.org/10.1109/ACCESS.2019.2962066
Outlier detection over sliding window is a fundamental problem in the domain of streaming data management, which has been studied over 10 years. The key of supporting outlier ...