2024
Explainable convolutional neural network model provides an alternative genome-wide association perspective on mutations in SARS-CoV-2.
CoRR, 2024
Log File Anomaly Detection Using Knowledge Graph Completion.
Proceedings of the 2024 8th International Conference on Deep Learning Technologies, 2024
2023
A Knowledge Graph Question Answering Approach to IoT Forensics.
Proceedings of the 8th ACM/IEEE Conference on Internet of Things Design and Implementation, 2023
ForensiQ: A Knowledge Graph Question Answering System for IoT Forensics.
Proceedings of the Digital Forensics and Cyber Crime - 14th EAI International Conference, 2023
Flick me once and I know it's you! Flicking-based Implicit Authentication for Smartwatch.
Proceedings of the International Conference on Computing, Networking and Communications, 2023
2022
Correction to: A comprehensive analysis of the impact of online media and newsprint on advertising sales in the information society.
Soft Comput., 2022
A comprehensive analysis of the impact of online media and newsprint on advertising sales in the information society.
Soft Comput., 2022
Secure Decentralized IoT Service Platform Using Consortium Blockchain.
Sensors, 2022
Shifting Trends of COVID-19 Tweet Sentiment with Respect to Voting Preferences in the 2020 Election Year of the United States.
CoRR, 2022
DIP: a log parser based on "disagreement index token" conditions.
Proceedings of the ACM SE '22: 2022 ACM Southeast Conference, Virtual Event, April 18, 2022
2021
ReLF: Scalable Remote Live Forensics for Android.
Proceedings of the 20th IEEE International Conference on Trust, 2021
2020
L-PowerGraph: a lightweight distributed graph-parallel communication mechanism.
J. Supercomput., 2020
Developing and Validating a Computable Phenotype for the Identification of Transgender and Gender Nonconforming Individuals and Subgroups.
,
,
,
,
,
,
,
,
,
,
,
,
,
Proceedings of the AMIA 2020, 2020
2019
Powering Hands-on Cybersecurity Practices with Cloud Computing.
Proceedings of the 27th IEEE International Conference on Network Protocols, 2019
Network Intrusion Detection System as a Service on OpenStack Cloud.
Proceedings of the 27th IEEE International Conference on Network Protocols, 2019
Isoflat: Flat Provider Network Multiplexing and Firewalling in OpenStack Cloud.
Proceedings of the 2019 IEEE International Conference on Communications, 2019
2018
Understanding secure and usable gestures for realtime motion based authentication.
Proceedings of the IEEE INFOCOM 2018, 2018
2017
EZSetup: A Novel Tool for Cybersecurity Practices Utilizing Cloud Resources.
Proceedings of the 18th Annual Conference on Information Technology Education and the 6th Annual Conference on Research in Information Technology, 2017
2016
A Distributed Graph-Parallel Computing System with Lightweight Communication Overhead.
IEEE Trans. Big Data, 2016
Platoon: A Virtual Platform for Team-oriented Cybersecurity Training and Exercises.
Proceedings of the 17th Annual Conference on Information Technology Education and the 5th Annual Conference on Research in Information Technology, 2016
Remote live forensics for Android devices.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016
SEGAUTH: A segment-based approach to behavioral biometric authentication.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016
Real time motion-based authentication for smartwatch.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016
Comparison between fingerprint and behavioral biometric authentication using 2D and 3D gestures.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016
2015
MotionAuth: Motion-based authentication for wrist worn smart devices.
Proceedings of the 2015 IEEE International Conference on Pervasive Computing and Communication Workshops, 2015
Comparison of PIN- and pattern-based behavioral biometric authentication on mobile devices.
Proceedings of the 34th IEEE Military Communications Conference, 2015
A Measurement Study on Media Streaming over Wi-Fi in Named Data Networking.
Proceedings of the 12th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2015
CamAuth: Securing Web Authentication with Camera.
Proceedings of the 16th IEEE International Symposium on High Assurance Systems Engineering, 2015
There is a Will, There is a Way: A New Mechanism for Traffic Control Based on VTL and VANET.
Proceedings of the 16th IEEE International Symposium on High Assurance Systems Engineering, 2015
Mining Twitter as a First Step toward Assessing the Adequacy of Gender Identification Terms on Intake Forms.
Proceedings of the AMIA 2015, 2015
2014
Pre-execution data prefetching with I/O scheduling.
J. Supercomput., 2014
Evaluation and Analysis of Distributed Graph-Parallel Processing Frameworks.
J. Cyber Secur. Mobil., 2014
Social network analysis of biomedical research collaboration networks in a CTSA institution.
J. Biomed. Informatics, 2014
EEP2P: An energy-efficient and economy-efficient P2P network protocol.
Proceedings of the International Green Computing Conference, 2014
USign - A security enhanced electronic consent model.
Proceedings of the 36th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2014
LightGraph: Lighten Communication in Distributed Graph-Parallel Processing.
Proceedings of the 2014 IEEE International Congress on Big Data, Anchorage, AK, USA, June 27, 2014
2013
Pre-execution Data Prefetching with Inter-thread I/O Scheduling.
Proceedings of the Supercomputing - 28th International Supercomputing Conference, 2013
CamTalk: A Bidirectional Light Communications Framework for Secure Communications on Smartphones.
Proceedings of the Security and Privacy in Communication Networks, 2013
Moim: A Multi-GPU MapReduce Framework.
Proceedings of the 16th IEEE International Conference on Computational Science and Engineering, 2013
SIM: A smartphone-based identity management framework and its application to Arkansas trauma image repository.
Proceedings of the 2013 IEEE International Conference on Bioinformatics and Biomedicine, 2013
Understanding biomedicai research collaborations through social network analysis: A case study.
Proceedings of the 2013 IEEE International Conference on Bioinformatics and Biomedicine, 2013
2012
On Energy Security of Server Systems.
IEEE Trans. Dependable Secur. Comput., 2012
Secure instant messaging in enterprise-like networks.
Comput. Networks, 2012
Enhancing cache robustness for content-centric networking.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012
2011
Design and Implementation of a Fast Dynamic Packet Filter.
IEEE/ACM Trans. Netw., 2011
Humans and Bots in Internet Chat: Measurement, Analysis, and Automated Classification.
IEEE/ACM Trans. Netw., 2011
Energy Attack on Server Systems.
Proceedings of the 5th USENIX Workshop on Offensive Technologies, 2011
A methodology for empirical analysis of brain connectivity through graph mining.
Proceedings of the IEEE International Conference on Systems, 2011
2010
An automatic HTTP cookie management system.
Comput. Networks, 2010
A Collaboration-based Autonomous Reputation System for Email Services.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010
Mimimorphism: a new approach to binary code obfuscation.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
2009
Battle of Botcraft: fighting bots in online games with human observational proofs.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009
2008
Thwarting E-mail Spam Laundering.
ACM Trans. Inf. Syst. Secur., 2008
Measurement and Classification of Humans and Bots in Internet Chat.
Proceedings of the 17th USENIX Security Symposium, 2008
Swift: A Fast Dynamic Packet Filter.
Proceedings of the 5th USENIX Symposium on Networked Systems Design & Implementation, 2008
2007
Automatic Cookie Usage Setting with CookiePicker.
Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2007
HoneyIM: Fast Detection and Suppression of Instant Messaging Malware in Enterprise-Like Networks.
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007
2006
Identifying Low-ProfileWeb Server's IP Fingerprint.
Proceedings of the Third International Conference on the Quantitative Evaluation of Systems (QEST 2006), 2006
An effective defense against email spam laundering.
Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006
Cooperative behavior rule acquisition for multi-agent systems using a genetic algorithm.
Proceedings of the IASTED International Conference on Advances in Computer Science and Technology, 2006