Kim-Kwang Raymond Choo
Orcid: 0000-0001-9208-5336Affiliations:
- University of Texas at San Antonio, USA
- University of South Australia, Australia
According to our database1,
Kim-Kwang Raymond Choo
authored at least 1,139 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on acm.org
-
on orkg.org
-
on orcid.org
-
on id.loc.gov
-
on d-nb.info
On csauthors.net:
Bibliography
2024
IEEE Trans. Artif. Intell., November, 2024
Efficient Secure Inference Scheme in Multiparty Settings for Industrial Internet of Things.
IEEE Trans. Ind. Informatics, October, 2024
IEEE Trans. Computers, October, 2024
IEEE Trans. Netw. Serv. Manag., August, 2024
Detecting and Mitigating the Dissemination of Fake News: Challenges and Future Research Opportunities.
IEEE Trans. Comput. Soc. Syst., August, 2024
IEEE Trans. Mob. Comput., July, 2024
Peer Peer Netw. Appl., July, 2024
Analyzing the Impact of Personalization on Fairness in Federated Learning for Healthcare.
J. Heal. Informatics Res., June, 2024
IEEE Internet Things J., June, 2024
A Detection Method Against Selfish Mining-Like Attacks Based on Ensemble Deep Learning in IoT.
IEEE Internet Things J., June, 2024
A Lightweight and Anonymous Application-Aware Authentication and Key Agreement Protocol for the Internet of Drones.
IEEE Internet Things J., June, 2024
Time-Controllable Keyword Search Scheme With Efficient Revocation in Mobile E-Health Cloud.
IEEE Trans. Mob. Comput., May, 2024
IEEE Trans. Knowl. Data Eng., May, 2024
Trustworthy Access Control for Multiaccess Edge Computing in Blockchain-Assisted 6G Systems.
IEEE Trans. Ind. Informatics, May, 2024
VMEMDA: Verifiable Multidimensional Encrypted Medical Data Aggregation Scheme for Cloud-Based Wireless Body Area Networks.
IEEE Internet Things J., May, 2024
IEEE Trans. Veh. Technol., April, 2024
An Efficient and Secure Health Data Propagation Scheme Using Steganography-Based Approach for Electronic Health Networks.
IEEE/ACM Trans. Netw., April, 2024
Temporal Refinement Graph Convolutional Network for Skeleton-Based Action Recognition.
IEEE Trans. Artif. Intell., April, 2024
IEEE Trans. Ind. Informatics, March, 2024
J. Ambient Intell. Humaniz. Comput., February, 2024
J. Inf. Secur. Appl., February, 2024
A Concurrent Federated Reinforcement Learning for IoT Resources Allocation With Local Differential Privacy.
IEEE Internet Things J., February, 2024
GPU Accelerated Full Homomorphic Encryption Cryptosystem, Library, and Applications for IoT Systems.
IEEE Internet Things J., February, 2024
Artif. Intell. Rev., February, 2024
1DIEN: Cross-session Electrocardiogram Authentication Using 1D Integrated EfficientNet.
ACM Trans. Multim. Comput. Commun. Appl., January, 2024
IEEE Trans. Ind. Informatics, January, 2024
A Combinatorial Optimization Analysis Method for Detecting Malicious Industrial Internet Attack Behaviors.
ACM Trans. Cyber Phys. Syst., January, 2024
IEEE Trans. Artif. Intell., January, 2024
A Secure, Flexible, and PPG-Based Biometric Scheme for Healthy IoT Using Homomorphic Random Forest.
IEEE Internet Things J., January, 2024
TriBoDeS: A Tri-Blockchain-Based Detection and Sharing Scheme for Dangerous Road Condition Information in Internet of Vehicles.
IEEE Internet Things J., January, 2024
Encrypted Domain Secret Medical-Image Sharing With Secure Outsourcing Computation in IoT Environment.
IEEE Internet Things J., January, 2024
IEEE Internet Things J., January, 2024
IEEE Trans. Serv. Comput., 2024
Practical Privacy-Preserving Convolutional Neural Network Inference Framework With Edge Computing for Health Monitoring.
IEEE Trans. Netw. Sci. Eng., 2024
Efficient Crypto Engine for Authenticated Encryption, Data Traceability, and Replay Attack Detection Over CAN Bus Network.
IEEE Trans. Netw. Sci. Eng., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
Joint Cost Learning and Payload Allocation With Image-Wise Attention for Batch Steganography.
IEEE Trans. Inf. Forensics Secur., 2024
An Efficient and Dynamic Privacy-Preserving Federated Learning System for Edge Computing.
IEEE Trans. Inf. Forensics Secur., 2024
CAT: A Consensus-Adaptive Trust Management Based on the Group Decision Making in IoVs.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
RVE-PFL: Robust Variational Encoder-Based Personalized Federated Learning Against Model Inversion Attacks.
IEEE Trans. Inf. Forensics Secur., 2024
Double-Layer Detection of Internal Threat in Enterprise Systems Based on Deep Learning.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
Backdoor Attack on Deep Learning-Based Medical Image Encryption and Decryption Network.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
A Game-Theory-Based Contract Mechanism to Facilitate Technology Spillover in Emerging Electric Vehicle Markets.
IEEE Trans. Engineering Management, 2024
IEEE Trans. Engineering Management, 2024
PrFAHP-GT: A New Privacy Risk Analysis Framework Using FAHP and Game Theory for Digital Supply Chain Management.
IEEE Trans. Engineering Management, 2024
IEEE Trans. Engineering Management, 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
Verifiable Outsourced Attribute-Based Encryption Scheme for Cloud-Assisted Mobile E-Health System.
IEEE Trans. Dependable Secur. Comput., 2024
Robust Asynchronous Federated Learning With Time-Weighted and Stale Model Aggregation.
IEEE Trans. Dependable Secur. Comput., 2024
REKS: Role-Based Encrypted Keyword Search With Enhanced Access Control for Outsourced Cloud Data.
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
V-Digger: An Efficient and Secure Vulnerability Assessment for Large-Scale ISP Network.
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
Forward Private Verifiable Dynamic Searchable Symmetric Encryption With Efficient Conjunctive Query.
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
Differentially Private Non-Negative Consistent Release for Large-Scale Hierarchical Trees.
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
J. Netw. Comput. Appl., 2024
J. Inf. Secur. Appl., 2024
IB-IADR: Enabling Identity-Based Integrity Auditing and Data Recovery With Fault Localization for Multicloud Storage.
IEEE Internet Things J., 2024
IEEE Internet Things J., 2024
CoPiFL: A collusion-resistant and privacy-preserving federated learning crowdsourcing scheme using blockchain and homomorphic encryption.
Future Gener. Comput. Syst., 2024
An incentive compatible ZD strategy-based data sharing model for federated learning: A perspective of iterated prisoner's dilemma.
Eur. J. Oper. Res., 2024
Forensic Sci. Int. Digit. Investig., 2024
Artificial intelligence in physiological characteristics recognition for internet of things authentication.
Digit. Commun. Networks, 2024
Survey on digital twins for Internet of Vehicles: Fundamentals, challenges, and opportunities.
Digit. Commun. Networks, 2024
Digit. Commun. Networks, 2024
A Deep Dive into Fairness, Bias, Threats, and Privacy in Recommender Systems: Insights and Future Research.
CoRR, 2024
Beyond Text-to-SQL for IoT Defense: A Comprehensive Framework for Querying and Classifying IoT Threats.
CoRR, 2024
A2-DIDM: Privacy-preserving Accumulator-enabled Auditing for Distributed Identity of DNN Model.
CoRR, 2024
Holistic Evaluation Metrics: Use Case Sensitive Evaluation Metrics for Federated Learning.
CoRR, 2024
A secure and lightweight cloud data deduplication scheme with efficient access control and key management.
Comput. Commun., 2024
Proceedings of the International Conference on Smart Applications, 2024
GE-AdvGAN: Improving the transferability of adversarial samples by gradient editing-based adversarial generative model.
Proceedings of the 2024 SIAM International Conference on Data Mining, 2024
Shadow-Free Membership Inference Attacks: Recommender Systems Are More Vulnerable Than You Thought.
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024
Proceedings of the 33rd ACM International Conference on Information and Knowledge Management, 2024
Chebyshev Polynomial and Private Blockchain Based Cross-Domain Authentication Protocol for IoD Networks.
Proceedings of the 21st IEEE Consumer Communications & Networking Conference, 2024
Proceedings of the 21st IEEE Consumer Communications & Networking Conference, 2024
MFABA: A More Faithful and Accelerated Boundary-Based Attribution Method for Deep Neural Networks.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
2023
IEEE Trans. Veh. Technol., December, 2023
Comprehensive Survey on Privacy-Preserving Spatial Data Query in Transportation Systems.
IEEE Trans. Intell. Transp. Syst., December, 2023
BSKCN and BSAML: blind signatures from the module lattice and the asymmetric module lattice.
Frontiers Comput. Sci., December, 2023
BTC-Shadow: an analysis and visualization system for exposing implicit behaviors in Bitcoin transaction graphs.
Frontiers Comput. Sci., December, 2023
Secure Battery Swapping: A Reservation Scheme With Conditional Privacy-Preserving Bidirectional Heterogeneous Aggregate Signcryption and Incentive Mechanism.
IEEE Trans. Veh. Technol., November, 2023
MKSS: An Effective Multi-authority Keyword Search Scheme for edge-cloud collaboration.
J. Syst. Archit., November, 2023
A lightweight privacy-preserving scheme using pixel block mixing for facial image classification in deep learning.
Eng. Appl. Artif. Intell., November, 2023
IEEE Trans. Knowl. Data Eng., October, 2023
EPRICE: An Efficient and Privacy-Preserving Real-Time Incentive System for Crowdsensing in Industrial Internet of Things.
IEEE Trans. Computers, September, 2023
IEEE Internet Things Mag., September, 2023
Quantum Learning on Structured Code With Computing Traps for Secure URLLC in Industrial IoT Scenarios.
IEEE Internet Things J., September, 2023
A Privacy-Preserving Hybrid Range Search Scheme Over Encrypted Electronic Medical Data in IoT Systems.
IEEE Internet Things J., September, 2023
IET Blockchain, September, 2023
Enterp. Inf. Syst., September, 2023
Comput. Secur., September, 2023
Comput. Secur., September, 2023
A Blockchain-Based Access Control Scheme for Zero Trust Cross-Organizational Data Sharing.
ACM Trans. Internet Techn., August, 2023
Sickly Apps: A Forensic Analysis of Medical Device Smartphone Applications on Android and iOS Devices.
Mob. Networks Appl., August, 2023
IEEE Internet Things J., August, 2023
Future Gener. Comput. Syst., August, 2023
Forecasting call center arrivals using temporal memory networks and gradient boosting algorithm.
Expert Syst. Appl., August, 2023
Big data in healthcare: Conceptual network structure, key challenges and opportunities.
Digit. Commun. Networks, August, 2023
Inf. Sci., July, 2023
An in-situ authentication with privacy preservation scheme for accident response in Internet of Vehicles.
Internet Things, July, 2023
Understanding the Trends in Blockchain Domain Through an Unsupervised Systematic Patent Analysis.
IEEE Trans. Engineering Management, June, 2023
Blockchain for unmanned underwater drones: Research issues, challenges, trends and future directions.
J. Netw. Comput. Appl., June, 2023
J. Intell. Inf. Syst., June, 2023
Decis. Support Syst., June, 2023
Internet of things: Conceptual network structure, main challenges and future directions.
Digit. Commun. Networks, June, 2023
IEEE Trans. Knowl. Data Eng., May, 2023
IEEE Internet Things J., May, 2023
An Efficient Multilayered Linkable Ring Signature Scheme With Logarithmic Size for Anonymous Payment in Vehicle-to-Grid Networks.
IEEE Trans. Intell. Veh., April, 2023
Disinformation Propagation Trend Analysis and Identification Based on Social Situation Analytics and Multilevel Attention Network.
IEEE Trans. Comput. Soc. Syst., April, 2023
Confluence of Blockchain and Artificial Intelligence Technologies for Secure and Scalable Healthcare Solutions: A Review.
IEEE Internet Things J., April, 2023
From puzzles to portraits: Enhancing situation awareness during natural disasters using a design science approach.
Decis. Sci., April, 2023
2DF-IDS: Decentralized and differentially private federated learning-based intrusion detection system for industrial IoT.
Comput. Secur., April, 2023
A Multi-Objective Approach Based on Differential Evolution and Deep Learning Algorithms for VANETs.
IEEE Trans. Veh. Technol., March, 2023
Blockchain Use Case in Ballistics and Crime Gun Tracing and Intelligence: Toward Overcoming Gun Violence.
ACM Trans. Manag. Inf. Syst., March, 2023
EPNS: Efficient Privacy-Preserving Intelligent Traffic Navigation From Multiparty Delegated Computation in Cloud-Assisted VANETs.
IEEE Trans. Mob. Comput., March, 2023
CITS-MEW: Multi-Party Entangled Watermark in Cooperative Intelligent Transportation System.
IEEE Trans. Intell. Transp. Syst., March, 2023
IEEE Syst. J., March, 2023
Forensic Sci. Int. Digit. Investig., March, 2023
Blockchain-Based Privacy-Preserving Positioning Data Sharing for IoT-Enabled Maritime Transportation Systems.
IEEE Trans. Intell. Transp. Syst., February, 2023
A Blockchain-Based Decentralized, Fair and Authenticated Information Sharing Scheme in Zero Trust Internet-of-Things.
IEEE Trans. Computers, February, 2023
Achieving Lightweight and Privacy-Preserving Object Detection for Connected Autonomous Vehicles.
IEEE Internet Things J., February, 2023
COVID-19 pandemic and the cyberthreat landscape: Research challenges and opportunities.
Digit. Commun. Networks, February, 2023
Veh. Commun., 2023
An Efficient Blockchain-Based Conditional Privacy-Preserving Authentication Protocol for VANETs.
IEEE Trans. Veh. Technol., 2023
Privacy-Preserving Fast Three-Factor Authentication and Key Agreement for IoT-Based E-Health Systems.
IEEE Trans. Serv. Comput., 2023
IEEE Trans. Serv. Comput., 2023
IEEE Trans. Serv. Comput., 2023
IEEE Trans. Serv. Comput., 2023
IEEE Trans. Serv. Comput., 2023
IEEE Trans. Serv. Comput., 2023
A Blockchain-Based Cross-Domain and Autonomous Access Control Scheme for Internet of Things.
IEEE Trans. Serv. Comput., 2023
IEEE Trans. Serv. Comput., 2023
Regulatable and Hardware-Based Proof of Stake to Approach Nothing at Stake and Long Range Attacks.
IEEE Trans. Serv. Comput., 2023
IEEE Trans. Netw. Sci. Eng., 2023
Guest Editorial Introduction to the Special Section on AI-Driven Cybersecurity for Healthcare Cyber Physical Systems.
IEEE Trans. Netw. Sci. Eng., 2023
IEEE Trans. Intell. Transp. Syst., 2023
IEEE Trans. Inf. Forensics Secur., 2023
Multi-Domain Virtual Network Embedding Algorithm Based on Horizontal Federated Learning.
IEEE Trans. Inf. Forensics Secur., 2023
A Dynamic-Efficient Structure for Secure and Verifiable Location-Based Skyline Queries.
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Inf. Forensics Secur., 2023
Generalized Autonomous Path Proxy Re-Encryption Scheme to Support Branch Functionality.
IEEE Trans. Inf. Forensics Secur., 2023
Differentially Private Deep Learning With Dynamic Privacy Budget Allocation and Adaptive Optimization.
IEEE Trans. Inf. Forensics Secur., 2023
BPVSE: Publicly Verifiable Searchable Encryption for Cloud-Assisted Electronic Health Records.
IEEE Trans. Inf. Forensics Secur., 2023
Technical, Temporal, and Spatial Research Challenges and Opportunities in Blockchain-Based Healthcare: A Systematic Literature Review.
IEEE Trans. Engineering Management, 2023
Assessment of the Blockchain Technology Adoption for the Management of the Electronic Health Record Systems.
IEEE Trans. Engineering Management, 2023
A Differentially Private Federated Learning Model Against Poisoning Attacks in Edge Computing.
IEEE Trans. Dependable Secur. Comput., 2023
Lightweight Privacy-Preserving Distributed Recommender System Using Tag-Based Multikey Fully Homomorphic Data Encapsulation.
IEEE Trans. Dependable Secur. Comput., 2023
Dynamic Authenticated Asymmetric Group Key Agreement With Sender Non-Repudiation and Privacy for Group-Oriented Applications.
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
Inference of User Desires to Spread Disinformation Based on Social Situation Analytics and Group Effect.
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
NACA: A Joint Distortion-Based Non-Additive Cost Assignment Method for Video Steganography.
IEEE Trans. Dependable Secur. Comput., 2023
Towards an Interpretable Autoencoder: A Decision-Tree-Based Autoencoder and its Application in Anomaly Detection.
IEEE Trans. Dependable Secur. Comput., 2023
A2UA: An Auditable Anonymous User Authentication Protocol Based on Blockchain for Cloud Services.
IEEE Trans. Cloud Comput., 2023
IEEE Trans. Cloud Comput., 2023
IEEE Trans. Cloud Comput., 2023
An Identity-Based Adaptor Signature Scheme and its Applications in the Blockchain System.
IEEE Open J. Comput. Soc., 2023
BESIFL: Blockchain-Empowered Secure and Incentive Federated Learning Paradigm in IoT.
IEEE Internet Things J., 2023
BDIM: A Blockchain-Based Decentralized Identity Management Scheme for Large Scale Internet of Things.
IEEE Internet Things J., 2023
IEEE Internet Things J., 2023
ACM Comput. Surv., 2023
Ethical Considerations and Policy Implications for Large Language Models: Guiding Responsible Development and Deployment.
CoRR, 2023
CoRR, 2023
Edge Learning for 6G-Enabled Internet of Things: A Comprehensive Survey of Vulnerabilities, Datasets, and Defenses.
IEEE Commun. Surv. Tutorials, 2023
Comput. Secur., 2023
AFPr-AM: A novel Fuzzy-AHP based privacy risk assessment model for strategic information management of social media platforms.
Comput. Secur., 2023
Proceedings of the Machine Learning and Knowledge Discovery in Databases: Research Track, 2023
Proceedings of the IEEE Symposium on Computers and Communications, 2023
Proceedings of the Digital Forensics and Cyber Crime - 14th EAI International Conference, 2023
Password Managers and Vault Application Security and Forensics: Research Challenges and Future Opportunities.
Proceedings of the Digital Forensics and Cyber Crime - 14th EAI International Conference, 2023
Poisoning Attacks in Federated Edge Learning for Digital Twin 6G-Enabled IoTs: An Anticipatory Study.
Proceedings of the IEEE International Conference on Communications, 2023
Voters' Impacts on Creators' Popularity Disparity and Network Size in Two-sided Decentralized User-Generated Content Market.
Proceedings of the 56th Hawaii International Conference on System Sciences, 2023
Proceedings of the Future Access Enablers for Ubiquitous and Intelligent Infrastructures, 2023
Empirical Evaluations of Machine Learning Effectiveness in Detecting Web Application Attacks.
Proceedings of the Future Access Enablers for Ubiquitous and Intelligent Infrastructures, 2023
Enabling Privacy-Preserving Prediction for Length of Stay in ICU - A Multimodal Federated-Learning-based Approach.
Proceedings of the 31st European Conference on Information Systems, 2023
Proceedings of the 32nd ACM International Conference on Information and Knowledge Management, 2023
Proceedings of the 32nd ACM International Conference on Information and Knowledge Management, 2023
Efficiency-enhanced Blockchain-based Client Selection in Heterogeneous Federated Learning.
Proceedings of the IEEE International Conference on Blockchain, 2023
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
2022
A hybrid XSS attack (H<i><sub>Y</sub></i>XSS<i><sub>A</sub></i>) based on fusion approach: Challenges, threats and implications in cybersecurity.
J. King Saud Univ. Comput. Inf. Sci., November, 2022
J. Comput. Inf. Syst., November, 2022
Deep Federated Learning Enhanced Secure POI Microservices for Cyber-Physical Systems.
IEEE Wirel. Commun., 2022
Blockchain-Based Secure and Cooperative Private Charging Pile Sharing Services for Vehicular Networks.
IEEE Trans. Veh. Technol., 2022
Lattice-Based Conditional Privacy-Preserving Authentication Protocol for the Vehicular Ad Hoc Network.
IEEE Trans. Veh. Technol., 2022
IEEE Trans. Serv. Comput., 2022
VFIRM: Verifiable Fine-Grained Encrypted Image Retrieval in Multi-Owner Multi-User Settings.
IEEE Trans. Serv. Comput., 2022
IEEE Trans. Serv. Comput., 2022
IEEE Trans. Serv. Comput., 2022
IEEE Trans. Serv. Comput., 2022
IEEE/ACM Trans. Netw., 2022
IEEE Trans. Netw. Serv. Manag., 2022
Federated Anomaly Detection on System Logs for the Internet of Things: A Customizable and Communication-Efficient Approach.
IEEE Trans. Netw. Serv. Manag., 2022
AI-Assisted Energy-Efficient and Intelligent Routing for Reconfigurable Wireless Networks.
IEEE Trans. Netw. Sci. Eng., 2022
IEEE Trans. Neural Networks Learn. Syst., 2022
DeepKeyGen: A Deep Learning-Based Stream Cipher Generator for Medical Image Encryption and Decryption.
IEEE Trans. Neural Networks Learn. Syst., 2022
ACM Trans. Manag. Inf. Syst., 2022
IEEE Trans. Mob. Comput., 2022
IEEE Trans. Knowl. Data Eng., 2022
IEEE Trans. Knowl. Data Eng., 2022
SAVE: Efficient Privacy-Preserving Location-Based Service Bundle Authentication in Self-Organizing Vehicular Social Networks.
IEEE Trans. Intell. Transp. Syst., 2022
MVFusFra: A Multi-View Dynamic Fusion Framework for Multimodal Brain Tumor Segmentation.
IEEE J. Biomed. Health Informatics, 2022
Guest Editorial: AI-Enabled Threat Intelligence and Hunting Microservices for Distributed Industrial IoT System.
IEEE Trans. Ind. Informatics, 2022
Verifiable Data Mining Against Malicious Adversaries in Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2022
IEEE Trans. Ind. Informatics, 2022
A Privacy-Preserving Proximity Testing Using Private Set Intersection for Vehicular Ad-Hoc Networks.
IEEE Trans. Ind. Informatics, 2022
Privacy-Preserving Aggregation-Authentication Scheme for Safety Warning System in Fog-Cloud Based VANET.
IEEE Trans. Inf. Forensics Secur., 2022
IEEE Trans. Inf. Forensics Secur., 2022
Towards Privacy-Preserving Spatial Distribution Crowdsensing: A Game Theoretic Approach.
IEEE Trans. Inf. Forensics Secur., 2022
IEEE Trans. Inf. Forensics Secur., 2022
IEEE Trans. Inf. Forensics Secur., 2022
Editorial: Blockchain Ecosystem - Technological and Management Opportunities and Challenges: Part II.
IEEE Trans. Engineering Management, 2022
IEEE Trans. Dependable Secur. Comput., 2022
Social Characteristic-Based Propagation-Efficient PBFT Protocol to Broadcast in Unstructured Overlay Networks.
IEEE Trans. Dependable Secur. Comput., 2022
A Hardware-Assisted Heartbeat Mechanism for Fault Identification in Large-Scale IoT Systems.
IEEE Trans. Dependable Secur. Comput., 2022
DDCA: A Distortion Drift-Based Cost Assignment Method for Adaptive Video Steganography in the Transform Domain.
IEEE Trans. Dependable Secur. Comput., 2022
Efficient Privacy-Preserving Outsourced Discrete Wavelet Transform in the Encrypted Domain.
IEEE Trans. Cloud Comput., 2022
Lightweight Public/Private Auditing Scheme for Resource-Constrained End Devices in Cloud Storage.
IEEE Trans. Cloud Comput., 2022
VPSL: Verifiable Privacy-Preserving Data Search for Cloud-Assisted Internet of Things.
IEEE Trans. Cloud Comput., 2022
IEEE Trans. Cloud Comput., 2022
Verifiable Searchable Encryption Framework Against Insider Keyword-Guessing Attack in Cloud Storage.
IEEE Trans. Cloud Comput., 2022
IEEE Trans. Cloud Comput., 2022
IEEE Trans. Cloud Comput., 2022
IEEE Trans. Cloud Comput., 2022
IEEE Trans. Cloud Comput., 2022
IEEE Trans. Cloud Comput., 2022
An Automated Task Scheduling Model Using Non-Dominated Sorting Genetic Algorithm II for Fog-Cloud Systems.
IEEE Trans. Cloud Comput., 2022
IEEE Trans. Computers, 2022
Achieving Efficient and Privacy-Preserving Cross-Domain Big Data Deduplication in Cloud.
IEEE Trans. Big Data, 2022
Revocable Identity-Based Access Control for Big Data with Verifiable Outsourced Computing.
IEEE Trans. Big Data, 2022
A Memory Network Information Retrieval Model for Identification of News Misinformation.
IEEE Trans. Big Data, 2022
DssP: Efficient Dual-Server Secret Sharing Protocol Based on Password Authentication for Cloud Storage Services.
IEEE Syst. J., 2022
EAFS: An Efficient, Accurate, and Forward Secure Searchable Encryption Scheme Supporting Range Search.
IEEE Syst. J., 2022
A Global Secure Ranked Multikeyword Search Based on the Multiowner Model for Cloud-Based Systems.
IEEE Syst. J., 2022
FabricFL: Blockchain-in-the-Loop Federated Learning for Trusted Decentralized Systems.
IEEE Syst. J., 2022
The Security of Blockchain-Based Medical Systems: Research Challenges and Opportunities.
IEEE Syst. J., 2022
An Efficient Privacy-Preserving Credit Score System Based on Noninteractive Zero-Knowledge Proof.
IEEE Syst. J., 2022
Secur. Priv., 2022
IEEE J. Sel. Areas Commun., 2022
Coordinate-based efficient indexing mechanism for intelligent IoT systems in heterogeneous edge computing.
J. Parallel Distributed Comput., 2022
FELIDS: Federated learning-based intrusion detection system for agricultural Internet of Things.
J. Parallel Distributed Comput., 2022
IT Prof., 2022
CovertSYS: A systematic covert communication approach for providing secure end-to-end conversation via social networks.
J. Inf. Secur. Appl., 2022
Introducing the Special Topic on "Mitigating Cyber Threats and Defense in Data Intensive Smart Cities".
Inf. Syst. Frontiers, 2022
Segmentation mask and feature similarity loss guided GAN for object-oriented image-to-image translation.
Inf. Process. Manag., 2022
A Blockchain-Based Shamir's Threshold Cryptography Scheme for Data Protection in Industrial Internet of Things Settings.
IEEE Internet Things J., 2022
IEEE Internet Things J., 2022
IEEE Internet Things J., 2022
Consumer, Commercial, and Industrial IoT (In)Security: Attack Taxonomy and Case Studies.
IEEE Internet Things J., 2022
A Redactable Blockchain Framework for Secure Federated Learning in Industrial Internet of Things.
IEEE Internet Things J., 2022
IEEE Internet Things J., 2022
A Secure and Efficient Multiserver Authentication and Key Agreement Protocol for Internet of Vehicles.
IEEE Internet Things J., 2022
Privacy-Preserving Threshold-Based Image Retrieval in Cloud-Assisted Internet of Things.
IEEE Internet Things J., 2022
IEEE Internet Things J., 2022
Demand-Supply-Based Economic Model for Resource Provisioning in Industrial IoT Traffic.
IEEE Internet Things J., 2022
A Lightweight and Anonymous Authentication and Key Agreement Protocol for Wireless Body Area Networks.
IEEE Internet Things J., 2022
A Lightweight and Privacy-Preserving Mutual Authentication and Key Agreement Protocol for Internet of Drones Environment.
IEEE Internet Things J., 2022
PUF-Based Authentication and Key Agreement Protocols for IoT, WSNs, and Smart Grids: A Comprehensive Survey.
IEEE Internet Things J., 2022
IEEE Internet Things J., 2022
Time-Controlled Hierarchical Multikeyword Search Over Encrypted Data in Cloud-Assisted IoT.
IEEE Internet Things J., 2022
IEEE Internet Things J., 2022
A Redesigned Identity-Based Anonymous Authentication Scheme for Mobile-Edge Computing.
IEEE Internet Things J., 2022
A Provably Secure and Efficient Range Query Scheme for Outsourced Encrypted Uncertain Data From Cloud-Based Internet of Things Systems.
IEEE Internet Things J., 2022
IEEE Internet Things J., 2022
IEEE Internet Things J., 2022
Transparent Ciphertext Retrieval System Supporting Integration of Encrypted Heterogeneous Database in Cloud-Assisted IoT.
IEEE Internet Things J., 2022
Blockchain-Based Cross-Domain Authentication for Intelligent 5G-Enabled Internet of Drones.
IEEE Internet Things J., 2022
HAPPS: A Hidden Attribute and Privilege-Protection Data-Sharing Scheme With Verifiability.
IEEE Internet Things J., 2022
IEEE Internet Things J., 2022
Privacy-Preserving Encrypted Traffic Inspection With Symmetric Cryptographic Techniques in IoT.
IEEE Internet Things J., 2022
IEEE Internet Things J., 2022
An efficient IoT forensic approach for the evidence acquisition and analysis based on network link.
Log. J. IGPL, 2022
Editorial: The Inaugural Issue of ACM Distributed Ledger Technologies: Research and Practice.
Distributed Ledger Technol. Res. Pract., 2022
Integrated Blockchain and Cloud Computing Systems: A Systematic Survey, Solutions, and Challenges.
ACM Comput. Surv., 2022
ACM Comput. Surv., 2022
Multi-Domain Virtual Network Embedding Algorithm based on Horizontal Federated Learning.
CoRR, 2022
Forensic Artefact Discovery and Attribution from Android Cryptocurrency Wallet Applications.
CoRR, 2022
CoRR, 2022
Concurr. Comput. Pract. Exp., 2022
A privacy preservation method for multiple-source unstructured data in online social networks.
Comput. Secur., 2022
Lightweight Sybil Attack Detection in IoT based on Bloom Filter and Physical Unclonable Function.
Comput. Secur., 2022
Comput. Secur., 2022
Comput. Secur., 2022
The role of national cybersecurity strategies on the improvement of cybersecurity education.
Comput. Secur., 2022
Artificial intelligence in cyber security: research advances, challenges, and opportunities.
Artif. Intell. Rev., 2022
Ad Hoc Networks, 2022
IEEE Access, 2022
On the Efficiency and Security of Quantum-resistant Key Establishment Mechanisms on FPGA Platforms.
Proceedings of the 19th International Conference on Security and Cryptography, 2022
Proceedings of the 23rd IEEE International Conference on Mobile Data Management, 2022
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022
BSCI 2022: The 4th ACM International Symposium on Blockchain and Secure Critical Infrastructure.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
2021
IEEE Trans. Veh. Technol., 2021
IEEE Trans. Veh. Technol., 2021
On the Design of Mutual Authentication and Key Agreement Protocol in Internet of Vehicles-Enabled Intelligent Transportation System.
IEEE Trans. Veh. Technol., 2021
Are You Dating Danger? An Interdisciplinary Approach to Evaluating the (In)Security of Android Dating Apps.
IEEE Trans. Sustain. Comput., 2021
IEEE Trans. Sustain. Comput., 2021
Signcryption Based Authenticated and Key Exchange Protocol for EI-Based V2G Environment.
IEEE Trans. Smart Grid, 2021
IEEE Trans. Serv. Comput., 2021
IEEE Trans. Serv. Comput., 2021
ACM Trans. Reconfigurable Technol. Syst., 2021
A Flow-based Multi-agent Data Exfiltration Detection Architecture for Ultra-low Latency Networks.
ACM Trans. Internet Techn., 2021
Introduction to the Special Issue on Decentralized Blockchain Applications and Infrastructures for Next Generation Cyber-Physical Systems.
ACM Trans. Internet Techn., 2021
ACM Trans. Internet Techn., 2021
IEEE Trans. Netw. Sci. Eng., 2021
Blockchain-Enabled Authentication Handover With Efficient Privacy Protection in SDN-Based 5G Networks.
IEEE Trans. Netw. Sci. Eng., 2021
A Blockchain-Based Proxy Re-Encryption With Equality Test for Vehicular Communication Systems.
IEEE Trans. Netw. Sci. Eng., 2021
Multi-Area Throughput and Energy Optimization of UAV-Aided Cellular Networks Powered by Solar Panels and Grid.
IEEE Trans. Mob. Comput., 2021
IEEE Trans. Knowl. Data Eng., 2021
BCPPA: A Blockchain-Based Conditional Privacy-Preserving Authentication Protocol for Vehicular Ad Hoc Networks.
IEEE Trans. Intell. Transp. Syst., 2021
IEEE Trans. Intell. Transp. Syst., 2021
IEEE Trans. Ind. Informatics, 2021
IEEE Trans. Ind. Informatics, 2021
IEEE Trans. Ind. Informatics, 2021
IEEE Trans. Ind. Informatics, 2021
IEEE Trans. Ind. Informatics, 2021
OBFP: Optimized Blockchain-Based Fair Payment for Outsourcing Computations in Cloud Computing.
IEEE Trans. Inf. Forensics Secur., 2021
IEEE Trans. Inf. Forensics Secur., 2021
IEEE Trans. Inf. Forensics Secur., 2021
A Fuzzy Authentication System Based on Neural Network Learning and Extreme Value Statistics.
IEEE Trans. Fuzzy Syst., 2021
Privacy-Preserving Reinforcement Learning Design for Patient-Centric Dynamic Treatment Regimes.
IEEE Trans. Emerg. Top. Comput., 2021
Lightweight Searchable Public-Key Encryption with Forward Privacy over IIoT Outsourced Data.
IEEE Trans. Emerg. Top. Comput., 2021
PVOPM: Verifiable Privacy-Preserving Pattern Matching with Efficient Outsourcing in the Malicious Setting.
IEEE Trans. Dependable Secur. Comput., 2021
A Mixing Scheme Using a Decentralized Signature Protocol for Privacy Protection in Bitcoin Blockchain.
IEEE Trans. Dependable Secur. Comput., 2021
IEEE Trans. Dependable Secur. Comput., 2021
IEEE Trans. Dependable Secur. Comput., 2021
IEEE Trans. Dependable Secur. Comput., 2021
IEEE Trans. Dependable Secur. Comput., 2021
Classification-Based and Energy-Efficient Dynamic Task Scheduling Scheme for Virtualized Cloud Data Center.
IEEE Trans. Cloud Comput., 2021
Provably Secure and Lightweight Identity-Based Authenticated Data Sharing Protocol for Cyber-Physical Cloud Environment.
IEEE Trans. Cloud Comput., 2021
IEEE Trans. Cloud Comput., 2021
PPChain: A Privacy-Preserving Permissioned Blockchain Architecture for Cryptocurrency and Other Regulated Applications.
IEEE Syst. J., 2021
Secur. Commun. Networks, 2021
Artificial Intelligence Technologies for COVID-19-Like Epidemics: Methods and Challenges.
IEEE Netw., 2021
IEEE Netw., 2021
IEEE Netw., 2021
Semi-supervised anomaly detection algorithms: A comparative summary and future research directions.
Knowl. Based Syst., 2021
Spatial self-attention network with self-attention distillation for fine-grained image recognition.
J. Vis. Commun. Image Represent., 2021
J. Parallel Distributed Comput., 2021
A multi-type and decentralized data transaction scheme based on smart contracts and digital watermarks.
J. Netw. Comput. Appl., 2021
Emerging DDoS attack detection and mitigation strategies in software-defined networks: Taxonomy, challenges and future directions.
J. Netw. Comput. Appl., 2021
A privacy-preserving protocol for continuous and dynamic data collection in IoT enabled mobile app recommendation system (MARS).
J. Netw. Comput. Appl., 2021
Group trip planning and information seeking behaviours by mobile social media users: A study of tourists in Australia, Bangladesh and China.
J. Inf. Sci., 2021
A Special Section on Deep & Advanced Machine Learning Approaches for Human Behavior Analysis.
J. Inf. Process. Syst., 2021
On the Application of Channel Characteristic-Based Physical Layer Authentication in Industrial Wireless Networks.
KSII Trans. Internet Inf. Syst., 2021
Inf. Sci., 2021
FAPS: A fair, autonomous and privacy-preserving scheme for big data exchange based on oblivious transfer, Ether cheque and smart contracts.
Inf. Sci., 2021
Inf. Sci., 2021
An Energy-Efficient Authentication Scheme Based on Chebyshev Chaotic Map for Smart Grid Environments.
IEEE Internet Things J., 2021
Efficient Policy-Hiding and Large Universe Attribute-Based Encryption With Public Traceability for Internet of Medical Things.
IEEE Internet Things J., 2021
An Efficient and Privacy-Preserving Outsourced Support Vector Machine Training for Internet of Medical Things.
IEEE Internet Things J., 2021
IoTCop: A Blockchain-Based Monitoring Framework for Detection and Isolation of Malicious Devices in Internet-of-Things Systems.
IEEE Internet Things J., 2021
Security Challenges and Opportunities for Smart Contracts in Internet of Things: A Survey.
IEEE Internet Things J., 2021
Efficient Certificateless Online/Offline Signature Scheme for Wireless Body Area Networks.
IEEE Internet Things J., 2021
PSL-MAAKA: Provably Secure and Lightweight Mutual Authentication and Key Agreement Protocol for Fully Public Channels in Internet of Medical Things.
IEEE Internet Things J., 2021
Toward Detection and Attribution of Cyber-Attacks in IoT-Enabled Cyber-Physical Systems.
IEEE Internet Things J., 2021
A Multikernel and Metaheuristic Feature Selection Approach for IoT Malware Threat Hunting in the Edge Layer.
IEEE Internet Things J., 2021
Edge Computing and Deep Learning Enabled Secure Multitier Network for Internet of Vehicles.
IEEE Internet Things J., 2021
IEEE Internet Things J., 2021
IEEE Internet Things J., 2021
PADP: Efficient Privacy-Preserving Data Aggregation and Dynamic Pricing for Vehicle-to-Grid Networks.
IEEE Internet Things J., 2021
A Deep Blockchain Framework-Enabled Collaborative Intrusion Detection for Protecting IoT and Cloud Networks.
IEEE Internet Things J., 2021
Guest Editorial for Special Issue on Blockchain for Internet-of-Things and Cyber-Physical Systems.
IEEE CAA J. Autom. Sinica, 2021
Fighting COVID-19 and Future Pandemics With the Internet of Things: Security and Privacy Perspectives.
IEEE CAA J. Autom. Sinica, 2021
Analysis and Improvement of a Certificateless Signature Scheme for Resource-Constrained Scenarios.
IEEE Commun. Lett., 2021
DAD: A Distributed Anomaly Detection system using ensemble one-class statistical learning in edge networks.
Future Gener. Comput. Syst., 2021
Discovering communities from disjoint complex networks using Multi-Layer Ant Colony Optimization.
Future Gener. Comput. Syst., 2021
Asymmetric cryptographic functions based on generative adversarial neural networks for Internet of Things.
Future Gener. Comput. Syst., 2021
Future Gener. Comput. Syst., 2021
Future Gener. Comput. Syst., 2021
Future Gener. Comput. Syst., 2021
Frontiers Comput. Sci., 2021
Trans. Emerg. Telecommun. Technol., 2021
On the need for AI to triage encrypted data containers in U.S. law enforcement applications.
Digit. Investig., 2021
A Lightweight Privacy-Preserving Scheme Using Label-based Pixel Block Mixing for Image Classification in Deep Learning.
CoRR, 2021
Comput. Secur., 2021
Comput. Secur., 2021
Comput. Secur., 2021
A survey of empirical performance evaluation of permissioned blockchain platforms: Challenges and opportunities.
Comput. Secur., 2021
A multidisciplinary approach to Internet of Things (IoT) cybersecurity and risk management.
Comput. Secur., 2021
Comput. Secur., 2021
A secure and trustworthy medical record sharing scheme based on searchable encryption and blockchain.
Comput. Networks, 2021
A secure and computationally efficient authentication and key agreement scheme for Internet of Vehicles.
Comput. Electr. Eng., 2021
Introduction to the special section on application of artificial intelligence in security of cyber physical systems (VSI-aicps).
Comput. Electr. Eng., 2021
An Efficient Access Control Scheme With Outsourcing and Attribute Revocation for Fog-Enabled E-Health.
IEEE Access, 2021
IEEE Access, 2021
A Systematic Review of Bio-Cyber Interface Technologies and Security Issues for Internet of Bio-Nano Things.
IEEE Access, 2021
A Stochastic Packet Forwarding Algorithm in Flying Ad Hoc Networks: Design, Analysis, and Evaluation.
IEEE Access, 2021
IEEE Access, 2021
Proceedings of the 20th IEEE International Conference on Trust, 2021
Proceedings of the 20th IEEE International Conference on Trust, 2021
Proceedings of the National Cyber Summit (NCS) Research Track 2021, 2021
Proceedings of the DroneCom '21: Proceedings of the 4th ACM MobiCom Workshop on Drone Assisted Wireless Communications for 5G and Beyond, 2021
Human-in-the-Loop XAI-enabled Vulnerability Detection, Investigation, and Mitigation.
Proceedings of the 36th IEEE/ACM International Conference on Automated Software Engineering, 2021
Privacy-Preserving Contact Tracing Protocol for Mobile Devices: A Zero-Knowledge Proof Approach.
Proceedings of the Information Security Practice and Experience: 16th International Conference, 2021
DIEF: An Autopsy Module for Distributed Identification of E-mail Files from Disk Images.
Proceedings of the 9th IEEE International Conference on Smart City and Informatization, 2021
Proceedings of the Digital Forensics and Cyber Crime - 12th EAI International Conference, 2021
Introduction to the Minitrack on Machine Learning and Cyber Threat Intelligence and Analytics.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021
Proceedings of the Future Access Enablers for Ubiquitous and Intelligent Infrastructures, 2021
Investigating Protected Health Information Leakage from Android Medical Applications.
Proceedings of the Future Access Enablers for Ubiquitous and Intelligent Infrastructures, 2021
Enhancing Challenge-based Collaborative Intrusion Detection Against Insider Attacks using Spatial Correlation.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021
International Workshop on Privacy, Security and Trust in Computational Intelligence (PSTCI2021).
Proceedings of the CIKM '21: The 30th ACM International Conference on Information and Knowledge Management, Virtual Event, Queensland, Australia, November 1, 2021
Proceedings of the CPSIoTSec '21: Proceedings of the 2th Workshop on CPS&IoT Security and Privacy, 2021
Investigating formation of Collective Identity driving the Black Lives Matter movement during COVID-19.
Proceedings of the 27th Americas Conference on Information Systems, 2021
2020
Secure Blockchain-Based Traffic Load Balancing Using Edge Computing and Reinforcement Learning.
Proceedings of the Blockchain Cybersecurity, Trust and Privacy, 2020
Proceedings of the Blockchain Cybersecurity, Trust and Privacy, 2020
Proceedings of the Blockchain Cybersecurity, Trust and Privacy, 2020
A multiview learning method for malware threat hunting: windows, IoT and android as case studies.
World Wide Web, 2020
Unified Biometric Privacy Preserving Three-Factor Authentication and Key Agreement for Cloud-Assisted Autonomous Vehicles.
IEEE Trans. Veh. Technol., 2020
BloCkEd: Blockchain-Based Secure Data Processing Framework in Edge Envisioned V2X Environment.
IEEE Trans. Veh. Technol., 2020
An Energy-Efficient SDN Controller Architecture for IoT Networks With Blockchain-Based Security.
IEEE Trans. Serv. Comput., 2020
Decentralized Authentication of Distributed Patients in Hospital Networks Using Blockchain.
IEEE J. Biomed. Health Informatics, 2020
Blockchain-Based Anonymous Authentication With Key Management for Smart Grid Edge Computing Infrastructure.
IEEE Trans. Ind. Informatics, 2020
Smart Collaborative Automation for Receive Buffer Control in Multipath Industrial Networks.
IEEE Trans. Ind. Informatics, 2020
A Privacy-Preserving-Framework-Based Blockchain and Deep Learning for Protecting Smart Power Networks.
IEEE Trans. Ind. Informatics, 2020
A Big Data-Enabled Consolidated Framework for Energy Efficient Software Defined Data Centers in IoT Setups.
IEEE Trans. Ind. Informatics, 2020
Editorial: Blockchain in Industrial IoT Applications: Security and Privacy Advances, Challenges, and Opportunities.
IEEE Trans. Ind. Informatics, 2020
IEEE Trans. Inf. Forensics Secur., 2020
Comments on "Publicly Verifiable Computation of Polynomials Over Outsourced Data With Multiple Sources".
IEEE Trans. Inf. Forensics Secur., 2020
IEEE Trans. Inf. Forensics Secur., 2020
DCAP: A Secure and Efficient Decentralized Conditional Anonymous Payment System Based on Blockchain.
IEEE Trans. Inf. Forensics Secur., 2020
IEEE Trans. Inf. Forensics Secur., 2020
IEEE Trans. Inf. Forensics Secur., 2020
An Ontological Graph Identification Method for Improving Localization of IP Prefix Hijacking in Network Systems.
IEEE Trans. Inf. Forensics Secur., 2020
An Enhanced Stacked LSTM Method With No Random Initialization for Malware Threat Hunting in Safety and Time-Critical Systems.
IEEE Trans. Emerg. Top. Comput. Intell., 2020
Guest Editorial: Introduction to the Special Section on Cyber Security Threats and Defense Advance.
IEEE Trans. Emerg. Top. Comput., 2020
Editorial: Blockchain Ecosystem - Technological and Management Opportunities and Challenges.
IEEE Trans. Engineering Management, 2020
Privacy-Preserving Cloud Establishment and Data Dissemination Scheme for Vehicular Cloud.
IEEE Trans. Dependable Secur. Comput., 2020
IEEE Trans. Dependable Secur. Comput., 2020
IEEE Trans. Dependable Secur. Comput., 2020
Secure and Efficient Two-Party Signing Protocol for the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography.
IEEE Trans. Dependable Secur. Comput., 2020
Privacy-Preserving Tensor Decomposition Over Encrypted Data in a Federated Cloud Environment.
IEEE Trans. Dependable Secur. Comput., 2020
Toward Artificial Emotional Intelligence for Cooperative Social Human-Machine Interaction.
IEEE Trans. Comput. Soc. Syst., 2020
ACM Trans. Cyber Phys. Syst., 2020
IEEE Trans. Consumer Electron., 2020
IEEE Trans. Cogn. Commun. Netw., 2020
Privacy-Preserving Outsourced Support Vector Machine Design for Secure Drug Discovery.
IEEE Trans. Cloud Comput., 2020
IEEE Trans. Big Data, 2020
Efficient Obfuscation for Encrypted Identity-Based Signatures in Wireless Body Area Networks.
IEEE Syst. J., 2020
An Adaptive Grid Frequency Support Mechanism for Energy Management in Cloud Data Centers.
IEEE Syst. J., 2020
A Provably Secure and Efficient Identity-Based Anonymous Authentication Scheme for Mobile Edge Computing.
IEEE Syst. J., 2020
IEEE Syst. J., 2020
Efficient Certificateless Aggregate Signature Scheme for Performing Secure Routing in VANETs.
Secur. Commun. Networks, 2020
IEEE Netw., 2020
Blockchain-Based Self-Tallying Voting System with Software Updates in Decentralized IoT.
IEEE Netw., 2020
Neural Comput. Appl., 2020
MMDA: Multidimensional and multidirectional data aggregation for edge computing-enhanced IoT.
J. Syst. Archit., 2020
A high-performance framework for a network programmable packet processor using P4 and FPGA.
J. Netw. Comput. Appl., 2020
J. Netw. Comput. Appl., 2020
Sidechain technologies in blockchain networks: An examination and state-of-the-art review.
J. Netw. Comput. Appl., 2020
J. Netw. Comput. Appl., 2020
R-Dedup: Secure client-side deduplication for encrypted data without involving a third-party entity.
J. Netw. Comput. Appl., 2020
J. Netw. Comput. Appl., 2020
Efficient NTRU Lattice-Based Certificateless Signature Scheme for Medical Cyber-Physical Systems.
J. Medical Syst., 2020
An Efficient Privacy-Preserving Protocol for Computing kth Minimum Value in P2P Networks.
J. Circuits Syst. Comput., 2020
A novel proxy-oriented public auditing scheme for cloud-based medical cyber physical systems.
J. Inf. Secur. Appl., 2020
J. Inf. Secur. Appl., 2020
An Ontology and Multi-Agent Based Decision Support Framework for Prefabricated Component Supply Chain.
Inf. Syst. Frontiers, 2020
Understanding Factors Influencing Employees' Consumptive and Contributive Use of Enterprise Social Networks.
Inf. Syst. Frontiers, 2020
A trajectory privacy-preserving scheme based on a dual-K mechanism for continuous location-based services.
Inf. Sci., 2020
Inf. Sci., 2020
A flexible method to defend against computationally resourceful miners in blockchain proof of work.
Inf. Sci., 2020
Large-Universe Attribute-Based Encryption With Public Traceability for Cloud Storage.
IEEE Internet Things J., 2020
A Hierarchical Encryption and Key Management Scheme for Layered Access Control on H.264/SVC Bitstream in the Internet of Things.
IEEE Internet Things J., 2020
Blockchain-Based Lightweight Certificate Authority for Efficient Privacy-Preserving Location-Based Service in Vehicular Social Networks.
IEEE Internet Things J., 2020
An Ensemble of Deep Recurrent Neural Networks for Detecting IoT Cyber Attacks Using Network Traffic.
IEEE Internet Things J., 2020
Certificateless-Signcryption-Based Three-Factor User Access Control Scheme for IoT Environment.
IEEE Internet Things J., 2020
IEEE Internet Things J., 2020
Game-Theoretic Resource Allocation for Fog-Based Industrial Internet of Things Environment.
IEEE Internet Things J., 2020
Key-Free Authentication Protocol Against Subverted Indoor Smart Devices for Smart Home.
IEEE Internet Things J., 2020
BoSMoS: A Blockchain-Based Status Monitoring System for Defending Against Unauthorized Software Updating in Industrial Internet of Things.
IEEE Internet Things J., 2020
Enabling Secure Cross-Modal Retrieval Over Encrypted Heterogeneous IoT Databases With Collective Matrix Factorization.
IEEE Internet Things J., 2020
Toward Secure and Provable Authentication for Internet of Things: Realizing Industry 4.0.
IEEE Internet Things J., 2020
Guest Editorial Special Issue on Edge-Cloud Interplay Based on SDN and NFV for Next-Generation IoT Applications.
IEEE Internet Things J., 2020
Lightweight Privacy-Preserving Training and Evaluation for Discretized Neural Networks.
IEEE Internet Things J., 2020
Inf. Fusion, 2020
Neurocomputing, 2020
Distributed signing protocol for IEEE P1363-compliant identity-based signature scheme.
IET Inf. Secur., 2020
White-Box Implementation of the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography.
IEICE Trans. Inf. Syst., 2020
A crowdsourcing method for online social networks security assessment based on human-centric computing.
Hum. centric Comput. Inf. Sci., 2020
A Review of Supervised Classification based on Contrast Patterns: Applications, Trends, and Challenges.
J. Grid Comput., 2020
Detecting Cryptomining Malware: a Deep Learning Approach for Static and Dynamic Analysis.
J. Grid Comput., 2020
A task scheduling algorithm considering game theory designed for energy management in cloud computing.
Future Gener. Comput. Syst., 2020
Future Gener. Comput. Syst., 2020
Sharpening the edge: Towards improved edge computing environment for mobile and IoT applications.
Future Gener. Comput. Syst., 2020
PMKT: Privacy-preserving Multi-party Knowledge Transfer for financial market forecasting.
Future Gener. Comput. Syst., 2020
Future Gener. Comput. Syst., 2020
Future Gener. Comput. Syst., 2020
Lightweight privacy preserving data aggregation with batch verification for smart grid.
Future Gener. Comput. Syst., 2020
A provable-secure and practical two-party distributed signing protocol for SM2 signature algorithm.
Frontiers Comput. Sci., 2020
IoT Botnet Forensics: A Comprehensive Digital Forensic Case Study on Mirai Botnet Servers.
Digit. Investig., 2020
Digit. Commun. Networks, 2020
ACM Comput. Surv., 2020
Cyberbullying detection in social media text based on character-level convolutional neural network with shortcuts.
Concurr. Comput. Pract. Exp., 2020
Concurr. Comput. Pract. Exp., 2020
Secure search for encrypted personal health records from big data NoSQL databases in cloud.
Computing, 2020
P4-to-blockchain: A secure blockchain-enabled packet parser for software defined networking.
Comput. Secur., 2020
Blockchain smart contracts formalization: Approaches and challenges to address vulnerabilities.
Comput. Secur., 2020
Applications of blockchain in ensuring the security and privacy of electronic health record systems: A survey.
Comput. Secur., 2020
Comput. Secur., 2020
Comput. Secur., 2020
What's really '<i>Happn</i>ing'? A forensic analysis of Android and iOS <i>Happn</i> dating apps.
Comput. Secur., 2020
Comput. Secur., 2020
FGMC-HADS: Fuzzy Gaussian mixture-based correntropy models for detecting zero-day attacks from linux systems.
Comput. Secur., 2020
Privacy-preserving image search (PPIS): Secure classification and searching using convolutional neural network over large-scale encrypted medical images.
Comput. Secur., 2020
Comput. Law Secur. Rev., 2020
An eigenvalue-based immunization scheme for node attacks in networks with uncertainty.
Sci. China Inf. Sci., 2020
Sci. China Inf. Sci., 2020
Privacy concerns and benefits of engagement with social media-enabled apps: A privacy calculus perspective.
Comput. Hum. Behav., 2020
IEEE Consumer Electron. Mag., 2020
Introduction to the special section on blockchain technologies for industrial Internet of Things (SI-bciot).
Comput. Electr. Eng., 2020
Game theoretic resource allocation model for designing effective traffic safety solution against drunk driving.
Appl. Math. Comput., 2020
Lightweight Certificate-Based Public/Private Auditing Scheme Based on Bilinear Pairing for Cloud Storage.
IEEE Access, 2020
IEEE Access, 2020
IEEE Access Special Section Editorial: Security and Trusted Computing for Industrial Internet of Things: Research Challenges and Opportunities.
IEEE Access, 2020
Have You Been a Victim of COVID-19-Related Cyber Incidents? Survey, Taxonomy, and Mitigation Strategies.
IEEE Access, 2020
A Deep CNN Ensemble Framework for Efficient DDoS Attack Detection in Software Defined Networks.
IEEE Access, 2020
A Flexible SDN-Based Architecture for Identifying and Mitigating Low-Rate DDoS Attacks Using Machine Learning.
IEEE Access, 2020
A Parallel and Forward Private Searchable Public-Key Encryption for Cloud-Based Data Sharing.
IEEE Access, 2020
IEEE Access, 2020
Practical Secure Two-Party EdDSA Signature Generation with Key Protection and Applications in Cryptocurrency.
Proceedings of the 19th IEEE International Conference on Trust, 2020
Efficient and Secure Two-Party Distributed Signing Protocol for the GOST Signature Algorithm.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2020
Specification-based Distributed Detection of Rank-related Attacks in RPL-based Resource-Constrained Real-Time Wireless Networks.
Proceedings of the IEEE Conference on Industrial Cyberphysical Systems, 2020
Proceedings of the 2020 IEEE International Conference on Embedded Software and Systems, 2020
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020
Introduction to the Minitrack on Machine Learning and Cyber Threat Intelligence and Analytics.
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020
Blockchain-Based Programmable Fog Architecture for Future Internet of Things Applications.
Proceedings of the IEEE Global Communications Conference, 2020
Proceedings of the 28th European Conference on Information Systems, 2020
Proceedings of the Computational Data and Social Networks - 9th International Conference, 2020
Evidence Identification and Acquisition Based on Network Link in an Internet of Things Environment.
Proceedings of the 13th International Conference on Computational Intelligence in Security for Information Systems, 2020
Proceedings of the Digital Forensic Education, An Experiential Learning Approach., 2020
Proceedings of the Digital Forensic Education, An Experiential Learning Approach., 2020
Proceedings of the Cyber and Digital Forensic Investigations, 2020
Proceedings of the Cyber and Digital Forensic Investigations, 2020
Proceedings of the Cyber and Digital Forensic Investigations, 2020
Proceedings of the Cyber and Digital Forensic Investigations, 2020
Proceedings of the Cyber and Digital Forensic Investigations, 2020
Proceedings of the Cyber and Digital Forensic Investigations, 2020
The Increasing Importance of Digital Forensics and Investigations in Law Enforcement, Government and Commercial Sectors.
Proceedings of the Cyber and Digital Forensic Investigations, 2020
Proceedings of the Cyber and Digital Forensic Investigations, 2020
Digital Forensic Investigation of Internet of Thing Devices: A Proposed Model and Case Studies.
Proceedings of the Cyber and Digital Forensic Investigations, 2020
Proceedings of the Cyber and Digital Forensic Investigations, 2020
Proceedings of the Cyber and Digital Forensic Investigations, 2020
2019
Wirel. Networks, 2019
Blockchain based secure data sharing system for Internet of vehicles: A position paper.
Veh. Commun., 2019
IEEE Trans. Sustain. Comput., 2019
Robust Malware Detection for Internet of (Battlefield) Things Devices Using Deep Eigenspace Learning.
IEEE Trans. Sustain. Comput., 2019
Are you emotional or depressed? Learning about your emotional state from your music using machine learning.
J. Supercomput., 2019
Anonymity Preserving and Lightweight Multimedical Server Authentication Protocol for Telecare Medical Information System.
IEEE J. Biomed. Health Informatics, 2019
IEEE Trans. Ind. Informatics, 2019
IEEE Trans. Ind. Informatics, 2019
IEEE Trans. Inf. Forensics Secur., 2019
Outlier Dirichlet Mixture Mechanism: Adversarial Statistical Learning for Anomaly Detection in the Fog.
IEEE Trans. Inf. Forensics Secur., 2019
IEEE Trans. Inf. Forensics Secur., 2019
A Two-Layer Dimension Reduction and Two-Tier Classification Model for Anomaly-Based Intrusion Detection in IoT Backbone Networks.
IEEE Trans. Emerg. Top. Comput., 2019
Memory-Efficient Implementation of Elliptic Curve Cryptography for the Internet-of-Things.
IEEE Trans. Dependable Secur. Comput., 2019
IEEE Trans. Dependable Secur. Comput., 2019
A Crowdsensing-based Cyber-physical System for Drone Surveillance Using Random Finite Set Theory.
ACM Trans. Cyber Phys. Syst., 2019
On Reliability Analysis of Smart Grids under Topology Attacks: A Stochastic Petri Net Approach.
ACM Trans. Cyber Phys. Syst., 2019
Special Issue on Big Data Applications in Cyber Security and Threat Intelligence - Part 2.
IEEE Trans. Big Data, 2019
Special Issue on Big Data Applications in Cyber Security and Threat Intelligence - Part 1.
IEEE Trans. Big Data, 2019
Soft Comput., 2019
A Provably Secure and Lightweight Identity-Based Two-Party Authenticated Key Agreement Protocol for Vehicular Ad Hoc Networks.
Secur. Commun. Networks, 2019
Improved t-SNE based manifold dimensional reduction for remote sensing data processing.
Multim. Tools Appl., 2019
Mob. Networks Appl., 2019
Privacy-aware smart city: A case study in collaborative filtering recommender systems.
J. Parallel Distributed Comput., 2019
Cooperative unmanned aerial vehicles with privacy preserving deep vision for real-time object identification and tracking.
J. Parallel Distributed Comput., 2019
J. Parallel Distributed Comput., 2019
Implementation of deep packet inspection in smart grids and industrial Internet of Things: Challenges and opportunities.
J. Netw. Comput. Appl., 2019
J. Netw. Comput. Appl., 2019
AEP-PPA: An anonymous, efficient and provably-secure privacy-preserving authentication protocol for mobile services in smart cities.
J. Netw. Comput. Appl., 2019
J. Netw. Comput. Appl., 2019
J. Netw. Comput. Appl., 2019
Cyber Kill Chain-Based Taxonomy of Advanced Persistent Threat Actors: Analogy of Tactics, Techniques, and Procedures.
J. Inf. Process. Syst., 2019
Special issue on cybersecurity in the critical infrastructure: Advances and future directions.
J. Comput. Syst. Sci., 2019
Convolutional Neural Network with Expert Knowledge for Hyperspectral Remote Sensing Imagery Classification.
KSII Trans. Internet Inf. Syst., 2019
Efficient privacy-preserving data merging and skyline computation over multi-source encrypted data.
Inf. Sci., 2019
Intelligent temporal classification and fuzzy rough set-based feature selection algorithm for intrusion detection system in WSNs.
Inf. Sci., 2019
Inf. Sci., 2019
Privacy-preserving model and generalization correlation attacks for 1: M data with multiple sensitive attributes.
Inf. Sci., 2019
A heuristic line piloting method to disclose malicious taxicab driver's privacy over GPS big data.
Inf. Sci., 2019
How Do I Share My IoT Forensic Experience With the Broader Community? An Automated Knowledge Sharing IoT Forensic Platform.
IEEE Internet Things J., 2019
IEEE Internet Things J., 2019
An Ensemble Intrusion Detection Technique Based on Proposed Statistical Flow Features for Protecting Network Traffic of Internet of Things.
IEEE Internet Things J., 2019
Secure Online/Offline Data Sharing Framework for Cloud-Assisted Industrial Internet of Things.
IEEE Internet Things J., 2019
IEEE Internet Things J., 2019
An Efficient and Provably Secure Authenticated Key Agreement Protocol for Fog-Based Vehicular Ad-Hoc Networks.
IEEE Internet Things J., 2019
CL-CPPA: Certificate-Less Conditional Privacy-Preserving Authentication Protocol for the Internet of Vehicles.
IEEE Internet Things J., 2019
Secure and Efficient K Nearest Neighbor Query Over Encrypted Uncertain Data in Cloud-IoT Ecosystem.
IEEE Internet Things J., 2019
IEEE Internet Things J., 2019
Adaptive Fusion and Category-Level Dictionary Learning Model for Multiview Human Action Recognition.
IEEE Internet Things J., 2019
On Data Sovereignty in Cloud-Based Computation Offloading for Smart Cities Applications.
IEEE Internet Things J., 2019
Deep Belief Network for Meteorological Time Series Prediction in the Internet of Things.
IEEE Internet Things J., 2019
A Provably Secure and Lightweight Anonymous User Authenticated Session Key Exchange Scheme for Internet of Things Deployment.
IEEE Internet Things J., 2019
Pairing-Free Identity-Based Encryption with Authorized Equality Test in Online Social Networks.
Int. J. Found. Comput. Sci., 2019
An IND-CCA2 secure post-quantum encryption scheme and a secure cloud storage use case.
Hum. centric Comput. Inf. Sci., 2019
Future Gener. Comput. Syst., 2019
Multi-dimensional data indexing and range query processing via Voronoi diagram for internet of things.
Future Gener. Comput. Syst., 2019
Future Gener. Comput. Syst., 2019
A machine learning-based FinTech cyber threat attribution framework using high-level indicators of compromise.
Future Gener. Comput. Syst., 2019
Tradeoff gain and loss optimization against man-in-the-middle attacks based on game theoretic model.
Future Gener. Comput. Syst., 2019
Future Gener. Comput. Syst., 2019
Distributed machine learning cloud teleophthalmology IoT for predicting AMD disease progression.
Future Gener. Comput. Syst., 2019
Future Gener. Comput. Syst., 2019
Comprehending the IoT cyber threat landscape: A data dimensionality reduction technique to infer and characterize Internet-scale IoT probing campaigns.
Digit. Investig., 2019
Concurr. Comput. Pract. Exp., 2019
Concurr. Comput. Pract. Exp., 2019
<i>BEST</i>: Blockchain-based secure energy trading in SDN-enabled intelligent transportation system.
Comput. Secur., 2019
IEEE Consumer Electron. Mag., 2019
Comput. Electr. Eng., 2019
Towards detection of juice filming charging attacks via supervised CPU usage analysis on smartphones.
Comput. Electr. Eng., 2019
A systematic literature review and meta-analysis on artificial intelligence in penetration testing and vulnerability assessment.
Comput. Electr. Eng., 2019
An Automated Live Forensic and Postmortem Analysis Tool for Bitcoin on Windows Systems.
IEEE Access, 2019
A Novel Social Situation Analytics-Based Recommendation Algorithm for Multimedia Social Networks.
IEEE Access, 2019
IEEE Access, 2019
IEEE Access, 2019
A Deep and Scalable Unsupervised Machine Learning System for Cyber-Attack Detection in Large-Scale Smart Grids.
IEEE Access, 2019
Joint Optimization of Area Throughput and Grid-Connected Microgeneration in UAV-Based Mobile Networks.
IEEE Access, 2019
IEEE Access, 2019
Mixture Localization-Based Outliers Models for securing Data Migration in Cloud Centers.
IEEE Access, 2019
Proceedings of the 18th IEEE International Conference On Trust, 2019
Proceedings of the Network and System Security - 13th International Conference, 2019
Unmanned Aerial Vehicles (UAVs) Threat Analysis and a Routine Activity Theory Based Mitigation Approach.
Proceedings of the National Cyber Summit, 2019
Anomaly Detection with Graph Convolutional Networks for Insider Threat and Fraud Detection.
Proceedings of the 2019 IEEE Military Communications Conference, 2019
Warder: Online Insider Threat Detection System Using Multi-Feature Modeling and Graph-Based Correlation.
Proceedings of the 2019 IEEE Military Communications Conference, 2019
Proceedings of the Smart City and Informatization - 7th International Conference, 2019
Proceedings of the IEEE International Conference on Industrial Internet, 2019
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019
Energy Efficient Decentralized Authentication in Internet of Underwater Things Using Blockchain.
Proceedings of the 2019 IEEE Globecom Workshops, Waikoloa, HI, USA, December 9-13, 2019, 2019
Practical Bayesian Poisoning Attacks on Challenge-Based Collaborative Intrusion Detection Networks.
Proceedings of the Computer Security - ESORICS 2019, 2019
Efficient and Secure Three-Factor User Authentication and Key Agreement Using Chaotic Maps.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019
CAVAEva: An Engineering Platform for Evaluating Commercial Anti-malware Applications on Smartphones.
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019
Proceedings of the 2019 IEEE Canadian Conference of Electrical and Computer Engineering, 2019
A Blockchain-based Framework for Detecting Malicious Mobile Applications in App Stores.
Proceedings of the 2019 IEEE Canadian Conference of Electrical and Computer Engineering, 2019
BlockIPFS - Blockchain-Enabled Interplanetary File System for Forensic and Trusted Data Traceability.
Proceedings of the IEEE International Conference on Blockchain, 2019
Proceedings of the 25th Americas Conference on Information Systems, 2019
AMOGAP: Defending Against Man-in-the-Middle and Offline Guessing Attacks on Passwords.
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019
Proceedings of the Handbook of Big Data and IoT Security, 2019
Forensic Investigation of Cross Platform Massively Multiplayer Online Games: Minecraft as a Case Study.
Proceedings of the Handbook of Big Data and IoT Security, 2019
Proceedings of the Handbook of Big Data and IoT Security, 2019
Big Data and Internet of Things Security and Forensics: Challenges and Opportunities.
Proceedings of the Handbook of Big Data and IoT Security, 2019
Proceedings of the Security and Privacy for Big Data, Cloud Computing and Applications, 2019
Proceedings of the Security and Privacy for Big Data, Cloud Computing and Applications, 2019
A survey of trust, trustworthiness and trustworthy computing: concepts, models and challenges.
Proceedings of the Security and Privacy for Big Data, Cloud Computing and Applications, 2019
Proceedings of the Security and Privacy for Big Data, Cloud Computing and Applications, 2019
Proceedings of the Security and Privacy for Big Data, Cloud Computing and Applications, 2019
Proceedings of the Security and Privacy for Big Data, Cloud Computing and Applications, 2019
Proceedings of the Security and Privacy for Big Data, Cloud Computing and Applications, 2019
Proceedings of the Security and Privacy for Big Data, Cloud Computing and Applications, 2019
A layered security architecture based on cyber kill chain against advanced persistent threats.
Proceedings of the Security and Privacy for Big Data, Cloud Computing and Applications, 2019
2018
Wirel. Commun. Mob. Comput., 2018
Wirel. Commun. Mob. Comput., 2018
J. Comput. Virol. Hacking Tech., 2018
EPA-CPPA: An efficient, provably-secure and anonymous conditional privacy-preserving authentication scheme for vehicular ad hoc networks.
Veh. Commun., 2018
Three-Stage Stackelberg Game for Defending Against Full-Duplex Active Eavesdropping Attacks in Cooperative Communication.
IEEE Trans. Veh. Technol., 2018
IEEE Trans. Sustain. Comput., 2018
Towards Bayesian-Based Trust Management for Insider Attacks in Healthcare Software-Defined Networks.
IEEE Trans. Netw. Serv. Manag., 2018
Design of Secure and Lightweight Authentication Protocol for Wearable Devices Environment.
IEEE J. Biomed. Health Informatics, 2018
Certificateless Searchable Public Key Encryption Scheme for Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2018
Cryptographic Solutions for Industrial Internet-of-Things: Research Challenges and Opportunities.
IEEE Trans. Ind. Informatics, 2018
IEEE Trans. Dependable Secur. Comput., 2018
A Provably-Secure Cross-Domain Handshake Scheme with Symptoms-Matching for Mobile Healthcare Social Network.
IEEE Trans. Dependable Secur. Comput., 2018
Reliable Inversion in GF(2<sup>8</sup>) With Redundant Arithmetic for Secure Error Detection of Cryptographic Architectures.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2018
From Latency, Through Outbreak, to Decline: Detecting Different States of Emergency Events Using Web Resources.
IEEE Trans. Big Data, 2018
DUK-SVD: dynamic dictionary updating for sparse representation of a long-time remote sensing image sequence.
Soft Comput., 2018
A novel fuzzy gaussian-based dissimilarity measure for discovering similarity temporal association patterns.
Soft Comput., 2018
Applications of computational intelligence in vehicle traffic congestion problem: a survey.
Soft Comput., 2018
Soft Comput., 2018
A General Architecture for Multiserver Authentication Key Agreement with Provable Security.
Secur. Commun. Networks, 2018
Secur. Commun. Networks, 2018
An Efficient and Provably-Secure Certificateless Proxy-Signcryption Scheme for Electronic Prescription System.
Secur. Commun. Networks, 2018
Peer-to-Peer Netw. Appl., 2018
Feature extraction and classification of VHR images with attribute profiles and convolutional neural networks.
Multim. Tools Appl., 2018
Multim. Tools Appl., 2018
Signature-based three-factor authenticated key exchange for internet of things applications.
Multim. Tools Appl., 2018
DADTA: A novel adaptive strategy for energy and performance efficient virtual machine consolidation.
J. Parallel Distributed Comput., 2018
Efficient and secure searchable encryption protocol for cloud-based Internet of Things.
J. Parallel Distributed Comput., 2018
J. Parallel Distributed Comput., 2018
J. Comput. Sci., 2018
The convergence of new computing paradigms and big data analytics methodologies for online social networks.
J. Comput. Sci., 2018
A cyber kill chain based taxonomy of banking Trojans for evolutionary computational intelligence.
J. Comput. Sci., 2018
BSeIn: A blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0.
J. Netw. Comput. Appl., 2018
A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments.
J. Netw. Comput. Appl., 2018
Multimedia big data computing and Internet of Things applications: A taxonomy and process model.
J. Netw. Comput. Appl., 2018
An untraceable and anonymous password authentication protocol for heterogeneous wireless sensor networks.
J. Netw. Comput. Appl., 2018
J. Ambient Intell. Humaniz. Comput., 2018
Jo-DPMF: Differentially private matrix factorization learning through joint optimization.
Inf. Sci., 2018
Inf. Sci., 2018
Inf. Sci., 2018
IEEE Internet Things Mag., 2018
Efficient and Provably Secure Distributed Signing Protocol for Mobile Devices in Wireless Networks.
IEEE Internet Things J., 2018
A Privacy-Aware Architecture at the Edge for Autonomous Real-Time Identity Reidentification in Crowds.
IEEE Internet Things J., 2018
A Robust and Energy Efficient Authentication Protocol for Industrial Internet of Things.
IEEE Internet Things J., 2018
IEEE Internet Things J., 2018
Nonreciprocity Compensation Combined With Turbo Codes for Secret Key Generation in Vehicular Ad Hoc Social IoT Networks.
IEEE Internet Things J., 2018
Neurocomputing, 2018
Int. J. Commun. Syst., 2018
White-Box Implementation of the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography.
IACR Cryptol. ePrint Arch., 2018
Efficiently and securely harnessing cloud to solve linear regression and other matrix operations.
Future Gener. Comput. Syst., 2018
Future Gener. Comput. Syst., 2018
Future Gener. Comput. Syst., 2018
Future Gener. Comput. Syst., 2018
PAT: A precise reward scheme achieving anonymity and traceability for crowdcomputing in public clouds.
Future Gener. Comput. Syst., 2018
QRFence: A flexible and scalable QR link security detection framework for Android devices.
Future Gener. Comput. Syst., 2018
Digital forensic intelligence: Data subsets and Open Source Intelligence (DFINT+OSINT): A timely and cohesive mix.
Future Gener. Comput. Syst., 2018
A deep Recurrent Neural Network based approach for Internet of Things malware threat hunting.
Future Gener. Comput. Syst., 2018
A robust biometrics based three-factor authentication scheme for Global Mobility Networks in smart city.
Future Gener. Comput. Syst., 2018
Achieving high performance and privacy-preserving query over encrypted multidimensional big metering data.
Future Gener. Comput. Syst., 2018
Circumventing iOS security mechanisms for APT forensic investigations: A security taxonomy for cloud apps.
Future Gener. Comput. Syst., 2018
Measurements and security of complex networks and systems: Research advances and challenges.
Future Gener. Comput. Syst., 2018
A foggy research future: Advances and future opportunities in fog computing research.
Future Gener. Comput. Syst., 2018
LiReK: A lightweight and real-time key establishment scheme for wearable embedded devices by gestures or motions.
Future Gener. Comput. Syst., 2018
Future Gener. Comput. Syst., 2018
Security analysis and improvement of a mutual authentication and key agreement solution for wireless sensor networks using chaotic maps.
Trans. Emerg. Telecommun. Technol., 2018
Expert Syst. Appl., 2018
Secure and privacy-preserving 3D vehicle positioning schemes for vehicular ad hoc network.
EURASIP J. Wirel. Commun. Netw., 2018
Electron. Commer. Res., 2018
Digital forensic investigation of two-way radio communication equipment and services.
Digit. Investig., 2018
Digit. Commun. Networks, 2018
Non-Reciprocity Compensation Combined with Turbo Codes for Secret Key Generation in Vehicular Ad Hoc Social IoT Networks.
CoRR, 2018
CoRR, 2018
Ensemble-based Multi-Filter Feature Selection Method for DDoS Detection in Cloud Computing.
CoRR, 2018
Unmanned Aerial Vehicle Forensic Investigation Process: Dji Phantom 3 Drone As A Case Study.
CoRR, 2018
Concurr. Comput. Pract. Exp., 2018
Comput. Secur., 2018
Comput. Secur., 2018
Comput. Networks, 2018
Securing Edge Devices in the Post-Quantum Internet of Things Using Lattice-Based Cryptography.
IEEE Commun. Mag., 2018
IEEE Commun. Mag., 2018
IEEE Commun. Mag., 2018
Performance prediction of parallel computing models to analyze cloud-based big data applications.
Clust. Comput., 2018
Comput. Law Secur. Rev., 2018
IEEE Cloud Comput., 2018
IEEE Cloud Comput., 2018
IEEE Cloud Comput., 2018
IEEE Cloud Comput., 2018
IEEE Cloud Comput., 2018
Cloud-Based Biometrics (Biometrics as a Service) for Smart Cities, Nations, and Beyond.
IEEE Cloud Comput., 2018
Efficient Ring Signature and Group Signature Schemes Based on q-ary Identification Protocols.
Comput. J., 2018
Comput. Hum. Behav., 2018
Fair Resource Allocation in an Intrusion-Detection System for Edge Computing: Ensuring the Security of Internet of Things Devices.
IEEE Consumer Electron. Mag., 2018
Comput. Electr. Eng., 2018
Appl. Math. Comput., 2018
An efficient provably-secure certificateless signature scheme for Internet-of-Things deployment.
Ad Hoc Networks, 2018
Performance and Security Evaluations of Identity- and Pairing-Based Digital Signature Algorithms on Windows, Android, and Linux Platforms: Revisiting the Algorithms of Cha and Cheon, Hess, Barreto, Libert, Mccullagh and Quisquater, and Paterson and Schuldt.
IEEE Access, 2018
IEEE Access, 2018
A Novel Index for Assessing the Robustness of Integrated Electrical Network and a Natural Gas Network.
IEEE Access, 2018
Leakage Models and Inference Attacks on Searchable Encryption for Cyber-Physical Social Systems.
IEEE Access, 2018
A Secure and Practical RFID Ownership Transfer Protocol Based on Chebyshev Polynomials.
IEEE Access, 2018
A New Transitively Closed Undirected Graph Authentication Scheme for Blockchain-Based Identity Management Systems.
IEEE Access, 2018
IEEE Access, 2018
IEEE Access Special Section Editorial: Research Challenges and Opportunities in Security and Privacy of Blockchain Technologies.
IEEE Access, 2018
Identifying WeChat Red Packets and Fund Transfers Via Analyzing Encrypted Network Traffic.
Proceedings of the 17th IEEE International Conference On Trust, 2018
Proceedings of the 17th IEEE International Conference On Trust, 2018
Proceedings of the 17th IEEE International Conference On Trust, 2018
Proceedings of the 17th IEEE International Conference On Trust, 2018
Proceedings of the 17th IEEE International Conference On Trust, 2018
PUSC: Privacy-Preserving User-Centric Skyline Computation Over Multiple Encrypted Domains.
Proceedings of the 17th IEEE International Conference On Trust, 2018
Proceedings of the 17th IEEE International Conference On Trust, 2018
Proceedings of the 17th IEEE International Conference On Trust, 2018
Proceedings of the 17th IEEE International Conference On Trust, 2018
Manipulating Visibility of Political and Apolitical Threads on Reddit via Score Boosting.
Proceedings of the 17th IEEE International Conference On Trust, 2018
Proceedings of the Security and Privacy in Communication Networks, 2018
An Approach to Enhance Understanding of Digital Forensics Technical Terms in the Presentation Phase of a Digital Investigation Using Multimedia Presentations.
Proceedings of the Security and Privacy in Communication Networks, 2018
A Provably-Secure Two-Factor Authenticated Key Exchange Protocol with Stronger Anonymity.
Proceedings of the Network and System Security - 12th International Conference, 2018
Proceedings of the Network and System Security - 12th International Conference, 2018
Proceedings of the Network and System Security - 12th International Conference, 2018
Prediction and Detection of Malicious Insiders' Motivation Based on Sentiment Profile on Webpages and Emails.
Proceedings of the 2018 IEEE Military Communications Conference, 2018
Towards Automation of Vulnerability and Exploitation Identification in IIoT Networks.
Proceedings of the IEEE International Conference on Industrial Internet, 2018
Proceedings of the Digital Forensics and Cyber Crime - 10th International EAI Conference, 2018
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018
Blockchain-Based Security Layer for Identification and Isolation of Malicious Things in IoT: A Conceptual Design.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018
Canalization or Increased Diffusion? An Empirical Analysis on the Impact of the Recommendation System in the Mobile App Market.
Proceedings of the 51st Hawaii International Conference on System Sciences, 2018
Introduction to the Minitrack on Cyber-of-Things: Cyber Crimes, Cyber Security and Cyber Forensics.
Proceedings of the 51st Hawaii International Conference on System Sciences, 2018
Proceedings of the 51st Hawaii International Conference on System Sciences, 2018
Proceedings of the IEEE Global Communications Conference, 2018
CyberPDF: Smart and Secure Coordinate-based Automated Health PDF Data Batch Extraction.
Proceedings of the Third IEEE/ACM International Conference on Connected Health: Applications, 2018
Empirical vulnerability analysis of automated smart contracts security testing on blockchains.
Proceedings of the 28th Annual International Conference on Computer Science and Software Engineering, 2018
Proceedings of the 24th Americas Conference on Information Systems, 2018
Proceedings of the 24th Americas Conference on Information Systems, 2018
Proceedings of the 24th Americas Conference on Information Systems, 2018
SpringerBriefs on Cyber Security Systems and Networks, Springer, ISBN: 978-981-13-0262-6, 2018
SpringerBriefs on Cyber Security Systems and Networks, Springer, ISBN: 978-981-10-7762-3, 2018
2017
Special Issue on Big Data Analytics and Network Applications for Cyber-Physical Systems Wireless Personal Communications.
Wirel. Pers. Commun., 2017
J. Supercomput., 2017
Hierarchy-Cutting Model Based Association Semantic for Analyzing Domain Topic on the Web.
IEEE Trans. Ind. Informatics, 2017
Efficient Hierarchical Identity-Based Signature With Batch Verification for Automatic Dependent Surveillance-Broadcast System.
IEEE Trans. Inf. Forensics Secur., 2017
A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification.
IEEE Trans. Inf. Forensics Secur., 2017
IEEE Trans. Emerg. Top. Comput., 2017
ACM Trans. Embed. Comput. Syst., 2017
IEEE Trans. Dependable Secur. Comput., 2017
IEEE Trans. Cloud Comput., 2017
Big forensic data management in heterogeneous distributed systems: quick analysis of multimedia forensic data.
Softw. Pract. Exp., 2017
Softw. Pract. Exp., 2017
Spectral-spatial multi-feature-based deep learning for hyperspectral remote sensing image classification.
Soft Comput., 2017
Soft Comput., 2017
A Novel Certificateless Signature Scheme for Smart Objects in the Internet-of-Things.
Sensors, 2017
Erratum to "An Efficient Code-Based Threshold Ring Signature Scheme with a Leader-Participant Model".
Secur. Commun. Networks, 2017
An Efficient Code-Based Threshold Ring Signature Scheme with a Leader-Participant Model.
Secur. Commun. Networks, 2017
Practical <i>m</i>-<i>k</i>-Anonymization for Collaborative Data Publishing without Trusted Third Party.
Secur. Commun. Networks, 2017
Pers. Ubiquitous Comput., 2017
Pers. Ubiquitous Comput., 2017
Multim. Tools Appl., 2017
Multim. Tools Appl., 2017
Multim. Tools Appl., 2017
Multim. Tools Appl., 2017
The Role of Mobile Forensics in Terrorism Investigations Involving the Use of Cloud Storage Service and Communication Apps.
Mob. Networks Appl., 2017
Distributed host-based collaborative detection for false data injection attacks in smart grid cyber-physical system.
J. Parallel Distributed Comput., 2017
J. Parallel Distributed Comput., 2017
J. Netw. Comput. Appl., 2017
An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment.
J. Netw. Comput. Appl., 2017
Pervasive social networking forensics: Intelligence and evidence from mobile device extracts.
J. Netw. Comput. Appl., 2017
A bayesian inference-based detection mechanism to defend medical smartphone networks against insider attacks.
J. Netw. Comput. Appl., 2017
Secure and flexible cloud-assisted association rule mining over horizontally partitioned databases.
J. Comput. Syst. Sci., 2017
Secure outsourcing of modular exponentiations under single untrusted programme model.
J. Comput. Syst. Sci., 2017
Special Issue on Cyber Security in the Critical Infrastructure: Advances and Future Directions.
J. Comput. Syst. Sci., 2017
An efficient provably-secure identity-based authentication scheme using bilinear pairings for Ad hoc network.
J. Inf. Secur. Appl., 2017
Inf. Syst. Frontiers, 2017
IEEE Internet Things J., 2017
Provably Secure Three-party Password Authenticated Key Exchange Protocol Based On Ring Learning With Error.
IACR Cryptol. ePrint Arch., 2017
Efficient and secure identity-based encryption scheme with equality test in cloud computing.
Future Gener. Comput. Syst., 2017
Associative retrieval in spatial big data based on spreading activation with semantic ontology.
Future Gener. Comput. Syst., 2017
An optimized approach for massive web page classification using entity similarity based on semantic network.
Future Gener. Comput. Syst., 2017
Design of a provably secure biometrics-based multi-cloud-server authentication scheme.
Future Gener. Comput. Syst., 2017
Future Gener. Comput. Syst., 2017
A novel file carving algorithm for National Marine Electronics Association (NMEA) logs in GPS forensics.
Digit. Investig., 2017
SeGoAC: A tree-based model for self-defined, proxy-enabled and group-oriented access control in mobile cloud computing.
Comput. Stand. Interfaces, 2017
Comput. Stand. Interfaces, 2017
Pairing-based CP-ABE with constant-size ciphertexts and secret keys for cloud environment.
Comput. Stand. Interfaces, 2017
CoRR, 2017
Investigating America Online Instant Messaging Application: Data Remnants on Windows 8.1 Client Machine.
CoRR, 2017
Cloud Storage Forensics: Analysis of Data Remnants on SpiderOak, JustCloud, and pCloud.
CoRR, 2017
Honeypots for employee information security awareness and education training: A conceptual EASY training model.
CoRR, 2017
Concurr. Comput. Pract. Exp., 2017
Can Android VoIP voice conversations be decoded? I can eavesdrop on your Android VoIP communication.
Concurr. Comput. Pract. Exp., 2017
Concurr. Comput. Pract. Exp., 2017
On the design of a secure user authentication and key agreement scheme for wireless sensor networks.
Concurr. Comput. Pract. Exp., 2017
Forensic data acquisition from cloud-of-things devices: windows Smartphones as a case study.
Concurr. Comput. Pract. Exp., 2017
A secure and resilient cross-domain SIP solution for MANETs using dynamic clustering and joint spatial and temporal redundancy.
Concurr. Comput. Pract. Exp., 2017
Towards enhancing click-draw based graphical passwords using multi-touch behaviours on smartphones.
Comput. Secur., 2017
Practical-oriented protocols for privacy-preserving outsourced big data analysis: Challenges and future research directions.
Comput. Secur., 2017
Stalking the stalkers - detecting and deterring stalking behaviours using technology: A review.
Comput. Secur., 2017
An adaptive trust-Stackelberg game model for security and energy efficiency in dynamic cognitive radio networks.
Comput. Commun., 2017
Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks.
Comput. Networks, 2017
Vehicular Fog Computing: Architecture, Use Case, and Security and Forensic Challenges.
IEEE Commun. Mag., 2017
Cloud of Things in Smart Agriculture: Intelligent Irrigation Monitoring by Thermal Imaging.
IEEE Cloud Comput., 2017
Challenges of Connecting Edge and Cloud Computing: A Security and Forensic Perspective.
IEEE Cloud Comput., 2017
IEEE Cloud Comput., 2017
IEEE Cloud Comput., 2017
IEEE Cloud Comput., 2017
I-Marks: An iris code embedding system for ownership identification of multimedia content.
Comput. Electr. Eng., 2017
Forensic investigation of P2P cloud storage services and backbone for IoT networks: BitTorrent Sync as a case study.
Comput. Electr. Eng., 2017
An enhanced 1-round authentication protocol for wireless body area networks with user anonymity.
Comput. Electr. Eng., 2017
Introduction to the Special Section on Security and Privacy in Wearable and Embedded Technologies.
Comput. Electr. Eng., 2017
Privacy-preserving certificateless provable data possession scheme for big data storage on cloud.
Appl. Math. Comput., 2017
Stackelberg game based relay selection for physical layer security and energy efficiency enhancement in cognitive radio networks.
Appl. Math. Comput., 2017
A Markov adversary model to detect vulnerable iOS devices and vulnerabilities in iOS apps.
Appl. Math. Comput., 2017
IEEE Access, 2017
IEEE Access, 2017
Expressive CP-ABE Scheme for Mobile Devices in IoT Satisfying Constant-Size Keys and Ciphertexts.
IEEE Access, 2017
Efficient and Secure Time-Key Based Single Sign-On Authentication for Mobile Devices.
IEEE Access, 2017
IEEE Access, 2017
IEEE Access Special Section Editorial: Intelligent Sensing On Mobile and Social Media Analytics.
IEEE Access, 2017
A Branch History Directed Heuristic Search for Effective Binary Level Dynamic Symbolic Execution.
IEEE Access, 2017
IEEE Access, 2017
IEEE Access, 2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Proceedings of the Security and Privacy in Communication Networks, 2017
Proceedings of the Security and Privacy in Communication Networks, 2017
Proceedings of the Security and Privacy in Communication Networks, 2017
Proceedings of the Security and Privacy in Communication Networks, 2017
A Visualization Scheme for Network Forensics Based on Attribute Oriented Induction Based Frequent Item Mining and Hyper Graph.
Proceedings of the Digital Forensics and Cyber Crime - 9th International Conference, 2017
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017
An Efficient Data Aggregation Scheme in Privacy-Preserving Smart Grid Communications with a High Practicability.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2017
Investigating Mobile Social Media Users? Behaviors in Tourism Collaborative Information Seeking.
Proceedings of the 2017 Conference on Conference Human Information Interaction and Retrieval, 2017
Proceedings of the Second IEEE/ACM International Conference on Connected Health: Applications, 2017
Proceedings of the 2017 International Workshop on Managing Insider Security Threats, Dallas, TX, USA, October 30, 2017
Back to Pen and Paper: Recovering Assessment Questions from Computer-Based Examination Applications.
Proceedings of the 23rd Americas Conference on Information Systems, 2017
Proceedings of the 23rd Americas Conference on Information Systems, 2017
A Study of the Effectiveness Abs Reliability of Android Free Anti-Mobile Malware Apps.
Proceedings of the Mobile Security and Privacy, 2017
Investigating America Online Instant Messaging Application: Data Remnants on Windows 8.1 Client Machine.
Proceedings of the Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, 2017
Proceedings of the Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, 2017
The Role of Mobile Devices in Enhancing the Policing System to Improve Efficiency and Effectiveness.
Proceedings of the Mobile Security and Privacy, 2017
Implications of Emerging Technologies to Incident Handling and Digital Forensic Strategies: A Routine Activity Theory.
Proceedings of the Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, 2017
Proceedings of the Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, 2017
Cloud Storage Forensics: Analysis of Data Remnants on SpiderOak, JustCloud, and pCloud.
Proceedings of the Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, 2017
Honeypots for Employee Information Security Awareness and Education Training: A Conceptual EASY Training Model.
Proceedings of the Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, 2017
Proceedings of the Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, 2017
Proceedings of the Mobile Security and Privacy, 2017
Proceedings of the Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, 2017
2016
ACM Trans. Internet Techn., 2016
IEEE Trans. Inf. Forensics Secur., 2016
IEEE Trans. Inf. Forensics Secur., 2016
DDOA: A Dirichlet-Based Detection Scheme for Opportunistic Attacks in Smart Grid Cyber-Physical System.
IEEE Trans. Inf. Forensics Secur., 2016
Privacy-Preserving-Outsourced Association Rule Mining on Vertically Partitioned Databases.
IEEE Trans. Inf. Forensics Secur., 2016
IEEE Trans. Inf. Forensics Secur., 2016
Pervasive Mob. Comput., 2016
Pervasive Mob. Comput., 2016
IEEE Netw., 2016
J. Univers. Comput. Sci., 2016
J. Netw. Comput. Appl., 2016
Bit-level n-gram based forensic authorship analysis on social media: Identifying individuals from linguistic profiles.
J. Netw. Comput. Appl., 2016
Distributed denial of service (DDoS) resilience in cloud: Review and conceptual cloud DDoS mitigation framework.
J. Netw. Comput. Appl., 2016
On cloud security attacks: A taxonomy and intrusion detection and prevention as a service.
J. Netw. Comput. Appl., 2016
J. Netw. Comput. Appl., 2016
Fine-grained Database Field Search Using Attribute-Based Encryption for E-Healthcare Clouds.
J. Medical Syst., 2016
Int. J. Web Grid Serv., 2016
Int. J. Netw. Secur., 2016
Future Gener. Comput. Syst., 2016
Participatory sensing-based semantic and spatial analysis of urban emergency events using mobile social media.
EURASIP J. Wirel. Commun. Netw., 2016
EURASIP J. Wirel. Commun. Netw., 2016
Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing.
EURASIP J. Wirel. Commun. Netw., 2016
Electron. Commer. Res., 2016
Chroma key background detection for digital video using statistical correlation of blurring artifact.
Digit. Investig., 2016
CoRR, 2016
Building knowledge base of urban emergency events based on crowdsourcing of social media.
Concurr. Comput. Pract. Exp., 2016
Comput. Secur., 2016
Geographical information system parallelization for spatial big data processing: a review.
Clust. Comput., 2016
Clust. Comput., 2016
PEDAL: a dynamic analysis tool for efficient concurrency bug reproduction in big data environment.
Clust. Comput., 2016
IEEE Cloud Comput., 2016
IEEE Cloud Comput., 2016
IEEE Cloud Comput., 2016
IEEE Cloud Comput., 2016
IEEE Cloud Comput., 2016
IEEE Cloud Comput., 2016
A Provably-Secure and Efficient Verifier-Based Anonymous Password-Authenticated Key Exchange Protocol.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Astroturfing Detection in Social Media: Using Binary n-Gram Analysis for Authorship Attribution.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Proceedings of the Security, Privacy and Anonymity in Computation, Communication and Storage, 2016
ase-PoW: A Proof of Ownership Mechanism for Cloud Deduplication in Hierarchical Environments.
Proceedings of the Security and Privacy in Communication Networks, 2016
Proceedings of the Security and Privacy in Communication Networks, 2016
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016
A Robust Authentication Protocol with Privacy Protection for Wireless Sensor Networks.
Proceedings of the Radio Frequency Identification and IoT Security, 2016
Proceedings of the Network and System Security - 10th International Conference, 2016
The role of mobile forensics in terrorism investigations involving the use of cloud apps.
Proceedings of the 9th EAI International Conference on Mobile Multimedia Communications, 2016
Proceedings of the 22nd IEEE International Conference on Parallel and Distributed Systems, 2016
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016
Introduction to the Cybercrimes, Cyber-Physical Innovations, and Emerging Investigation Challenges Minitrack.
Proceedings of the 49th Hawaii International Conference on System Sciences, 2016
Using Multimedia Presentations to Enhance the Judiciary's Technical Understanding of Digital Forensic Concepts: An Indonesian Case Study.
Proceedings of the 49th Hawaii International Conference on System Sciences, 2016
Proceedings of the 49th Hawaii International Conference on System Sciences, 2016
Proceedings of the 17th International Digital Government Research Conference on Digital Government Research, 2016
Perspectives on Cyber Science and Technology for Cyberization and Cyber-Enabled Worlds.
Proceedings of the 2016 IEEE 14th Intl Conf on Dependable, 2016
A Publish/Subscribe Protocol for Event-Driven Communications in the Internet of Things.
Proceedings of the 2016 IEEE 14th Intl Conf on Dependable, 2016
Proceedings of the 12th International Conference on Computational Intelligence and Security, 2016
Proceedings of the 2016 8th Computer Science and Electronic Engineering Conference, 2016
Proceedings of the 22nd Americas Conference on Information Systems, 2016
Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, 2016
Empirical Analysis of Impact of HTTP Referer on Malicious Website Behaviour and Delivery.
Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, 2016
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2015
Symmetry, 2015
Exploring Factors Influencing the Use of Enterprise Social Networks in Multinational Professional Service Firms.
J. Organ. Comput. Electron. Commer., 2015
Informatica, 2015
An Offline Dictionary Attack against Abdalla and Pointcheval's Key Exchange in the Password-Only Three-Party Setting.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015
Impact of a participatory cyber crime prevention programme on secondary school students' attainment in crime prevention concepts in civic education and social studies.
Educ. Inf. Technol., 2015
Comput. Stand. Interfaces, 2015
Efficient and Anonymous Two-Factor User Authentication in Wireless Sensor Networks: Achieving User Anonymity with Lightweight Sensor Computation.
CoRR, 2015
CoRR, 2015
Comput. Secur., 2015
IEEE Cloud Comput., 2015
IEEE Cloud Comput., 2015
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
A Taxonomy of Cloud Attack Consequences and Mitigation Strategies: The Role of Access Control and Privileged Access Management.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
A Secure Cross-Domain SIP Solution for Mobile Ad Hoc Network Using Dynamic Clustering.
Proceedings of the Security and Privacy in Communication Networks, 2015
What Influences Employees to Use Enterprise Social Networks? A Socio-Technical Perspective.
Proceedings of the 19th Pacific Asia Conference on Information Systems, 2015
Proceedings of the Lightweight Cryptography for Security and Privacy, 2015
Proceedings of the Information and Communications Security - 17th International Conference, 2015
A Generic Process to Identify Vulnerabilities and Design Weaknesses in iOS Healthcare Apps.
Proceedings of the 48th Hawaii International Conference on System Sciences, 2015
Extended Proxy-Assisted Approach: Achieving Revocable Fine-Grained Encryption of Cloud Data.
Proceedings of the Computer Security - ESORICS 2015, 2015
Information Privacy Concerns of Real Estate Customers and Information Security in the Real Estate Industry: an Empirical Analysis.
Proceedings of the 13th Australasian Information Security Conference, 2015
Factors Influencing the Adoption of Cloud Incident Handling Strategy: A Preliminary Study in Malaysia.
Proceedings of the 21st Americas Conference on Information Systems, 2015
Employees' Intended Information Security Behaviour in Real Estate Organisations: a Protection Motivation Perspective.
Proceedings of the 21st Americas Conference on Information Systems, 2015
Proceedings of the 21st Americas Conference on Information Systems, 2015
Enterprise Social Networks: A Successful Implementation within a Telecommunication Company.
Proceedings of the 21st Americas Conference on Information Systems, 2015
Proceedings of the 21st Americas Conference on Information Systems, 2015
Online Social Networking Has a Greater Effect on Others than on Me: A Third-Person Effect Perspective.
Proceedings of the Australasian Conference on Information Systems, 2015
Using Multimedia Presentations to Improve Digital Forensic Understanding: A Pilot Study.
Proceedings of the Australasian Conference on Information Systems, 2015
Proceedings of the Cloud Security Ecosystem, 2015
Proceedings of the Cloud Security Ecosystem, 2015
Integrating digital forensic practices in cloud incident handling: A conceptual Cloud Incident Handling Model.
Proceedings of the Cloud Security Ecosystem, 2015
Proceedings of the Cloud Security Ecosystem, 2015
Proceedings of the Cloud Security Ecosystem, 2015
Proceedings of the Cloud Security Ecosystem, 2015
2014
Secur. Commun. Networks, 2014
A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols.
Inf. Sci., 2014
Information security in the South Australian real estate industry: A study of 40 real estate organisations.
Inf. Manag. Comput. Secur., 2014
Impacts of increasing volume of digital forensic data: A survey and future research challenges.
Digit. Investig., 2014
Comput. Law Secur. Rev., 2014
IEEE Cloud Comput., 2014
Always connected, but are smart mobile users getting more security savvy? A survey of smart mobile device users.
Behav. Inf. Technol., 2014
Remote Programmatic vCloud Forensics: A Six-Step Collection Process and a Proof of Concept.
Proceedings of the 13th IEEE International Conference on Trust, 2014
Enforcing File System Permissions on Android External Storage: Android File System Permissions (AFP) Prototype and ownCloud.
Proceedings of the 13th IEEE International Conference on Trust, 2014
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014
Proceedings of the Network and System Security - 8th International Conference, 2014
Proceedings of the Advances in Digital Forensics X, 2014
Proceedings of the 47th Hawaii International Conference on System Sciences, 2014
Proceedings of the 47th Hawaii International Conference on System Sciences, 2014
A Study of Ten Popular Android Mobile VoIP Applications: Are the Communications Encrypted?
Proceedings of the 47th Hawaii International Conference on System Sciences, 2014
Proceedings of the 22st European Conference on Information Systems, 2014
Proceedings of the 22st European Conference on Information Systems, 2014
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014
Proceedings of the 20th Americas Conference on Information Systems, 2014
Proceedings of the 20th Americas Conference on Information Systems, 2014
Understanding the Information Security Awareness Process in Real Estate Organizations Using the SECI Model.
Proceedings of the 20th Americas Conference on Information Systems, 2014
Syngress Publishing / Elsevier, ISBN: 978-0-12-419970-5, 2014
2013
Dictionary Attacks against Password-Based Authenticated Three-Party Key Exchange Protocols.
KSII Trans. Internet Inf. Syst., 2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
Future Gener. Comput. Syst., 2013
Forensic collection of cloud storage data: Does the act of collection result in changes to the data or its metadata?
Digit. Investig., 2013
Comput. Secur., 2013
Comput. Law Secur. Rev., 2013
Proceedings of the Advances in Digital Forensics IX, 2013
Proceedings of the Eleventh Australasian Information Security Conference, 2013
iOS Forensics: How Can We Recover Deleted Image Files with Timestamp in a Forensically Sound Manner?
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013
2012
SIGACT News, 2012
Digit. Investig., 2012
2011
Comput. Secur., 2011
Comput. Electr. Eng., 2011
2010
On the security of an enhanced novel access control protocol for wireless sensor networks.
IEEE Trans. Consumer Electron., 2010
Inf. Secur. Tech. Rep., 2010
Security Improvements to Anonymous ID-Based Group Key Agreement for Wireless Networks.
Proceedings of the Seventh International Conference on Information Technology: New Generations, 2010
2009
Advances in Information Security 41, Springer, ISBN: 978-0-387-87968-0, 2009
Inf. Sci., 2009
IEEE Commun. Lett., 2009
IEEE Commun. Lett., 2009
Perfect forward secure identity-based authenticated key agreement protocol in the escrow mode.
Sci. China Ser. F Inf. Sci., 2009
2008
Int. J. Netw. Secur., 2008
IACR Cryptol. ePrint Arch., 2008
Privacy on the Line: The Politics of Wiretapping and Encryption, Updated and Expanded Edition.
Comput. J., 2008
2007
An Integrative Framework to Protocol Analysis and Repair: Bellare-Rogaway Model + Planning + Model Checker.
Informatica, 2007
IACR Cryptol. ePrint Arch., 2007
Comput. J., 2007
Proceedings of the Information Security Applications, 8th International Workshop, 2007
Security of a Leakage-Resilient Protocol for Key Establishment and Mutual Authentication.
Proceedings of the Provable Security, 2007
2006
On the Security Analysis of Lee, Hwang & Lee (2004) and Song & Kim (2000) Key Exchange / Agreement Protocols.
Informatica, 2006
Inf. Manag. Comput. Secur., 2006
Int. J. Netw. Secur., 2006
Int. J. Netw. Secur., 2006
New Identity-Based Authenticated Key Agreement Protocols from Pairings (without Random Oracles).
IACR Cryptol. ePrint Arch., 2006
The importance of proofs of security for key establishment protocols: Formal analysis of Jan-Chen, Yang-Shen-Shieh, Kim-Huh-Hwang-Lee, Lin-Sun-Hwang, and Yeh-Sun protocols.
Comput. Commun., 2006
Refuting Security Proofs for Tripartite Key Exchange with Model Checker in Planning Problem Setting.
Proceedings of the 19th IEEE Computer Security Foundations Workshop, 2006
Proceedings of the proceedings of the Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), 2006
Secure Password-Based Authenticated Group Key Agreement for Data-Sharing Peer-to-Peer Networks.
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006
An Extension to Bellare and Rogaway (1993) Model: Resetting Compromised Long-Term Keys.
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006
2005
Revisit of McCullagh-Barreto Two-party ID-based Authenticated Key Agreement Protocols.
Int. J. Netw. Secur., 2005
IACR Cryptol. ePrint Arch., 2005
IACR Cryptol. ePrint Arch., 2005
On Session Key Construction in Provably-Secure Key Establishment Protocols: Revisiting Chen & Kudla (2003) and McCullagh & Barreto (2005) ID-Based Protocols.
IACR Cryptol. ePrint Arch., 2005
Proceedings of the Progress in Cryptology, 2005
Proceedings of the Progress in Cryptology, 2005
Proceedings of the 2005 IEEE International Conference on e-Technology, e-Commerce, and e-Services (EEE 2005), 29 March, 2005
Security Requirements for Key Establishment Proof Models: Revisiting Bellare-Rogaway and Jeong-Katz-Lee Protocols.
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005
2004
On Session Identifiers in Provably Secure Protocols: The Bellare-Rogaway Three-Party Key Distribution Protocol Revisited.
IACR Cryptol. ePrint Arch., 2004
Proceedings of the Formal Aspects in Security and Trust: Second IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), 2004
Proceedings of the 6th International Conference on Electronic Commerce, 2004