2024
Unknown, Atypical and Polymorphic Network Intrusion Detection: A Systematic Survey.
IEEE Trans. Netw. Serv. Manag., February, 2024
A hybrid artificial intelligence framework for enhancing digital forensic investigations of infotainment systems.
Forensic Sci. Int. Digit. Investig., 2024
Multi-Objective Optimization for Managing Disruption Risk in SDN.
Proceedings of the 20th International Conference on the Design of Reliable Communication Networks, 2024
2023
ECKN: An Integrated Approach for Position Estimation, Packet Routing, and Sleep Scheduling in Wireless Sensor Networks.
Sensors, July, 2023
Guest Editorial: Special Section on Machine Learning and Artificial Intelligence for Managing Networks, Systems, and Services - Part II.
,
,
,
,
,
,
,
,
,
,
,
IEEE Trans. Netw. Serv. Manag., June, 2023
Securing the Electric Vehicle Charging Infrastructure: An In-Depth Analysis of Vulnerabilities and Countermeasures.
Proceedings of the Int'l ACM Symposium on Design and Analysis of Intelligent Vehicular Networks and Applications, 2023
Trust-based Knowledge Sharing Among Federated Learning Servers in Vehicular Edge Computing.
Proceedings of the Int'l ACM Symposium on Design and Analysis of Intelligent Vehicular Networks and Applications, 2023
Analyzing the Quality of Synthetic Adversarial Cyberattacks.
Proceedings of the 19th International Conference on Network and Service Management, 2023
2022
Guest Editorial: Special Issue on Machine Learning and Artificial Intelligence for Managing Networks, Systems, and Services - Part I.
,
,
,
,
,
,
,
,
,
,
,
IEEE Trans. Netw. Serv. Manag., December, 2022
Artificial intelligence for intrusion detection systems in Unmanned Aerial Vehicles.
Comput. Electr. Eng., 2022
2021
Privacy and Artificial Intelligence.
IEEE Trans. Artif. Intell., 2021
Building an Intrusion Detection System to Detect Atypical Cyberattack Flows.
IEEE Access, 2021
CVAE-AN: Atypical Attack Flow Detection Using Incremental Adversarial Learning.
Proceedings of the IEEE Global Communications Conference, 2021
2020
A Service Architecture Using Machine Learning to Contextualize Anomaly Detection.
J. Database Manag., 2020
Functionality-based mobile application recommendation system with security and privacy awareness.
Comput. Secur., 2020
Eye Gaze-Based Human Error Prevention System: Experts vs. Non-Experts.
Proceedings of the SIN 2020: 13th International Conference on Security of Information and Networks, 2020
Novelty-based Intrusion Detection of Sensor Attacks on Unmanned Aerial Vehicles.
Proceedings of the Q2SWinet '20: Proceedings of the 16th ACM Symposium on QoS and Security for Wireless and Mobile Networks, 2020
Machine Learning-Based Intrusion Detection System for Controller Area Networks.
Proceedings of the DIVANet '20: Proceedings of the 10th ACM Symposium on Design and Analysis of Intelligent Vehicular Networks and Applications, 2020
UniNet: A Mixed Reality Driving Simulator.
Proceedings of the 46th Graphics Interface Conference 2020, 2020
A New Statistical Method for Anomaly Detection in Distributed Systems.
Proceedings of the IEEE Canadian Conference on Electrical and Computer Engineering, 2020
2019
Cooperative Localization Improvement Using Distance Information in Vehicular Ad Hoc Networks.
Sensors, 2019
Human Activity Recognition Using Inertial Sensors in a Smartphone: An Overview.
Sensors, 2019
A survey of privacy enhancing technologies for smart cities.
Pervasive Mob. Comput., 2019
Techniques to detect data leakage in mobile applications.
Int. J. Secur. Networks, 2019
Detecting Malicious Driving with Machine Learning.
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference, 2019
A Visual Analytics Framework for Adversarial Text Generation.
Proceedings of the 16th IEEE Symposium on Visualization for Cyber Security, VizSec 2019, 2019
Evaluation of Deep Learning in Detecting Unknown Network Attacks.
Proceedings of the International Conference on Smart Applications, 2019
A Distance-based Data Fusion Technique for Minimizing GPS Positioning Error in Vehicular Ad Hoc Networks.
Proceedings of the 15th ACM International Symposium on QoS and Security for Wireless and Mobile Networks, 2019
Ridesharing Architecture for Patterned Commute Traffic.
Proceedings of the 9th ACM Symposium on Design and Analysis of Intelligent Vehicular Networks and Applications, 2019
2018
Big Data Analytics Architecture for Security Intelligence.
Proceedings of the 11th International Conference on Security of Information and Networks, 2018
Compound Password System for Mobile.
Proceedings of the International Conference On Cyber Situational Awareness, 2018
2017
Using clustering for target tracking in vehicular ad hoc networks.
Veh. Commun., 2017
SDN-based wireless user management system.
Telecommun. Syst., 2017
On the Possibility of Insider Threat Prevention Using Intent-Based Access Control (IBAC).
IEEE Syst. J., 2017
A Comparative Analysis of the Impact of Features on Human Activity Recognition with Smartphone Sensors.
Proceedings of the 23rd Brazillian Symposium on Multimedia and the Web, 2017
SoLVE: A Localization System Framework for VANets using the Cloud and Fog Computing.
Proceedings of the 6th ACM Symposium on Development and Analysis of Intelligent VehicularNetworks and Applications, 2017
Proactive Certificate Distribution for PKI in VANET.
Proceedings of the 13th ACM Symposium on QoS and Security for Wireless and Mobile Networks, 2017
A Privacy Enhanced Facial Recognition Access Control System Using Biometric Encryption.
Proceedings of the 13th International Conference on Distributed Computing in Sensor Systems, 2017
2016
Phishing Susceptibility Detection through Social Media Analytics.
Proceedings of the 9th International Conference on Security of Information and Networks, 2016
Intention-based Trust Re-evaluation.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016
Vehicular Digital Forensics: What Does My Vehicle Know About Me?
Proceedings of the 6th ACM Symposium on Development and Analysis of Intelligent Vehicular Networks and Applications, 2016
Paving the way for Intelligent Transport Systems (ITS): Privacy Implications of Vehicle Infotainment and Telematics Systems.
Proceedings of the 6th ACM Symposium on Development and Analysis of Intelligent Vehicular Networks and Applications, 2016
An architecture for health data collection using off-the-shelf health sensors.
Proceedings of the 2016 IEEE International Symposium on Medical Measurements and Applications, 2016
2015
An Encrypted Trust-Based Routing Protocol.
CoRR, 2015
On the use of homomorphic encryption to secure cloud computing, services, and routing protocols.
CoRR, 2015
A Secure Database System using Homomorphic Encryption Schemes.
CoRR, 2015
Privacy and security concerns for health data collected using off-the-shelf health monitoring devices.
Proceedings of the 11th IEEE International Conference on Wireless and Mobile Computing, 2015
Smartphone-based Architecture for Smart Cities.
Proceedings of the 5th ACM Symposium on Development and Analysis of Intelligent Vehicular Networks and Applications, 2015
Design and Implementation of a Software-Defined Integrated Wired-Wireless Network Testbed.
Proceedings of the 13th ACM International Symposium on Mobility Management and Wireless Access, 2015
Smart city architecture for community level services through the internet of things.
Proceedings of the 18th International Conference on Intelligence in Next Generation Networks, 2015
Identifying and Classifying Suspicious Network Behavior Using Passive DNS Analysis.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015
2014
On the Possibility of Insider Threat Detection Using Physiological Signal Monitoring.
Proceedings of the 7th International Conference on Security of Information and Networks, 2014
Toward a Big Data Healthcare Analytics System: A Mathematical Modeling Perspective.
Proceedings of the 2014 IEEE World Congress on Services, 2014
A prediction based clustering algorithm for target tracking in vehicular ad-hoc networks.
Proceedings of the fourth ACM international symposium on Development and analysis of intelligent vehicular networks and applications, 2014
2013
Infrastructure Logicielle d un Environnement Hospitalier Intelligent.
CoRR, 2013
A Tweet of the Mind: Automated Emotion Detection for Social Media Using Brain Wave Pattern Analysis.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013
Authorized! access denied, unauthorized! access granted.
Proceedings of the 6th International Conference on Security of Information and Networks, 2013
Encouraging second thoughts: Obstructive user interfaces for raising security awareness.
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013
Privacy representation in VANET.
Proceedings of the third ACM international symposium on Design and analysis of intelligent vehicular networks and applications, 2013
A distributed clustering algorithm for target tracking in vehicular ad-hoc networks.
Proceedings of the third ACM international symposium on Design and analysis of intelligent vehicular networks and applications, 2013
Securing modbus transactions using hash-based message authentication codes and stream transmission control protocol.
Proceedings of the Third International Conference on Communications and Information Technology, 2013
The state of the art in electroencephalogram and access control.
Proceedings of the Third International Conference on Communications and Information Technology, 2013
Supporting Health Informatics with Platform-as-a-Service Cloud Computing.
Proceedings of the Advanced Technologies, Embedded and Multimedia for Human-centric Computing, 2013
2012
Privacy Preserving Scheme for Location-Based Services.
J. Information Security, 2012
Examining privacy in vehicular ad-hoc networks.
Proceedings of the second ACM international symposium on Design and analysis of intelligent vehicular networks and applications, 2012
Security model for real time tracking system (RTLS) in the healthcare sector.
Proceedings of the International Conference on Communications and Information Technology, 2012
A fully private video on-Demand service.
Proceedings of the 25th IEEE Canadian Conference on Electrical and Computer Engineering, 2012
2011
J. Internet Serv. Inf. Secur., 2011
Defining and Investigating Device Comfort.
J. Inf. Process., 2011
Non-standards for Trust: Foreground Trust and Second Thoughts for Mobile Security.
,
,
,
,
,
,
,
,
,
,
,
,
Proceedings of the Security and Trust Management - 7th International Workshop, 2011
Cryptographic security models for eHealth P2P database management systems network.
Proceedings of the Ninth Annual Conference on Privacy, Security and Trust, 2011
Negotiating Privacy Preferences in Video Surveillance Systems.
Proceedings of the Modern Approaches in Applied Intelligence, 2011
Encrypted processes for oblivious data retrieval.
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011
Privacy and security of smart grid communication.
Proceedings of the Center for Advanced Studies on Collaborative Research, 2011
2010
Impact of Feature Reduction on the Efficiency of Wireless Intrusion Detection Systems.
IEEE Trans. Parallel Distributed Syst., 2010
Corrigendum to "Private key agreement and secure communication for heterogeneous sensor networks" [J. Parallel Distrib. Comput 70 (2010) 858-870].
J. Parallel Distributed Comput., 2010
Private key agreement and secure communication for heterogeneous sensor networks.
J. Parallel Distributed Comput., 2010
Pair-wise Cryptographic Models for Secure Data Exchange in P2P Database Management Systems.
IACR Cryptol. ePrint Arch., 2010
A Privacy-Enabled Architecture for an RFID-based Location Monitoring System.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010
Cybersecurity issues for businesses.
Proceedings of the 2010 conference of the Centre for Advanced Studies on Collaborative Research, 2010
2009
Secure Anonymous Communication for Wireless Sensor Networks Based on Pairing over Elliptic Curves.
J. Interconnect. Networks, 2009
Analysis of Chinese Remainder Theorem Based Group Key Management Protocols.
Proceedings of the 2009 International Conference on Security & Management, 2009
Workshop on cybersecurity: security and privacy in the 21st century.
Proceedings of the 2009 conference of the Centre for Advanced Studies on Collaborative Research, 2009
2008
Wireless networks security: Proof of chopchop attack.
Proceedings of the 9th IEEE International Symposium on a World of Wireless, 2008
Biometric Identification System Based on Electrocardiogram Data.
Proceedings of the NTMS 2008, 2008
The cost of protecting privacy in multimedia applications.
Proceedings of the Q2SWinet'08, 2008
A secure digital asset managment network for game development and education.
Proceedings of the 2008 Conference on Future Play: Research, Play, Share, 2008
2007
A performance evaluation of distributed dynamic channel allocation protocols for mobile networks.
Wirel. Commun. Mob. Comput., 2007
Corrigendum to "Trust-based security for wireless ad hoc and sensor networks" [Computer Communications 30 (2007) 2413-2427].
Comput. Commun., 2007
Trust-based security for wireless ad hoc and sensor networks.
Comput. Commun., 2007
A QoS-based Service Composition for Content Adaptation.
Proceedings of the 23rd International Conference on Data Engineering Workshops, 2007
2006
Performance evaluation of an anonymity providing protocol for wireless ad hoc networks.
Perform. Evaluation, 2006
Protecting the privacy of user's QoS preferences for multimedia applications.
Proceedings of the WMuNeP'06, 2006
2005
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks.
Comput. Commun., 2005
2004
Personal and service mobility in ubiquitous computing environments.
Wirel. Commun. Mob. Comput., 2004
A QoE Sensitive Architecture for Advanced Collaborative Environments.
Proceedings of the 1st International Conference on Quality of Service in Heterogeneous Wired/Wireless Networks (QSHINE 2004), 2004
A QoS-Based Framework for Distributed Content Adaptation.
Proceedings of the 1st International Conference on Quality of Service in Heterogeneous Wired/Wireless Networks (QSHINE 2004), 2004
A novel solution for achieving anonymity in wireless ad hoc networks.
Proceedings of the 1st ACM International Workshop on Performance Evaluation of Wireless Ad Hoc, 2004
A performance comparison of dynamic channel and ressource allocation protocols for mobile cellular networks.
Proceedings of the Second International Workshop on Mobility Management & Wireless Access Protocols, 2004
SDAR: A Secure Distributed Anonymous Routing Protocol for Wireless and Mobile Ad Hoc Networks.
Proceedings of the 29th Annual IEEE Conference on Local Computer Networks (LCN 2004), 2004
2003
Privacy and Security in E-Learning.
Int. J. Distance Educ. Technol., 2003
Agent Support for Context-Aware Services and Personal Mobility.
Proceedings of the Mobile Agents for Telecommunication Applications, 2003
Secure Dynamic Distributed Routing Algorithm for Ad Hoc Wireless Networks.
Proceedings of the 32nd International Conference on Parallel Processing Workshops (ICPP 2003 Workshops), 2003
Support for Personal and Service Mobility in Ubiquitous Computing Environments.
Proceedings of the Euro-Par 2003. Parallel Processing, 2003
2001
Selecting the QoS Parameters for Multicast Applications Based on User Profile and Device Capability.
Proceedings of the Interactive Distributed Multimedia Systems, 2001
1999
On Metrics for the Dynamic Load Balancing of Optimistic Simulations.
Proceedings of the 32nd Annual Hawaii International Conference on System Sciences (HICSS-32), 1999