


default search action
1st ICDIS 2018: South Padre Island, TX, USA
- 1st International Conference on Data Intelligence and Security, ICDIS 2018, South Padre Island, TX, USA, April 8-10, 2018. IEEE 2018, ISBN 978-1-5386-5762-1

- Adam J. Brown, Todd R. Andel, Mark Yampolskiy, Jeffrey Todd McDonald:

CAN Authorization Using Message Priority Bit-Level Access Control. 1-8 - Ashkan Aleali, Mahila Dadfarnia, Paulo Shakarian

:
Finding Novel Event Relationships in Temporal Data. 9-16 - Avi Ginsberg, Cui Yu:

Rapid Homoglyph Prediction and Detection. 17-23 - Carlos Pena-Caballero, Elifaleth Cantu, Jesus Rodriguez, Adolfo Gonzales, Osvaldo Castellanos, Angel A. Cantu, Megan Strait, Jae Son, Dongchul Kim:

A Multiple Radar Approach for Automatic Target Recognition of Aircraft Using Inverse Synthetic Aperture Radar. 24-31 - Christine Hines

, Abdou Youssef:
Machine Learning Applied to Rotating Check Fraud Detection. 32-35 - Christoph Lipps, Andreas Weinand, Dennis Krummacker, Christoph Fischer, Hans D. Schotten:

Proof of Concept for IoT Device Authentication Based on SRAM PUFs Using ATMEGA 2560-MCU. 36-42 - Dimitrios Sisiaridis, Olivier Markowitch:

Reducing Data Complexity in Feature Extraction and Feature Selection for Big Data Security Analytics. 43-48 - Egon Kidmose

, Erwin Lansing, Søren Brandbyge, Jens Myrup Pedersen
:
Detection of Malicious and Abusive Domain Names. 49-56 - Elham Shaabani, Ruocheng Guo, Paulo Shakarian

:
Detecting Pathogenic Social Media Accounts without Content or Network Structure. 57-64 - Enas A. Alikhashashneh

, Rajeev R. Raje, James H. Hill:
Using Software Engineering Metrics to Evaluate the Quality of Static Code Analysis Tools. 65-72 - Ericsson Marin, Jana Shakarian, Paulo Shakarian

:
Mining Key-Hackers on Darkweb Forums. 73-80 - Ericsson Marin, Mohammed Almukaynizi

, Eric Nunes, Paulo Shakarian
:
Community Finding of Malware and Exploit Vendors on Darkweb Marketplaces. 81-84 - Faruk Ahmed, Md. Sultan Mahmud, Rakib Al-Fahad, Shahinur Alam, Mohammed Yeasin:

Image Captioning for Ambient Awareness on a Sidewalk. 85-91 - Fitratullah Khan, Mahmoud Quweider

, Max Torres, Clair Goldsmith, Hansheng Lei, Liyu Zhang:
Block Level Streaming Based Alternative Approach for Serving a Large Number of Workstations Securely and Uniformly. 92-98 - George Toscano, Gahangir Hossain

:
Predicting the Effect of Parental Education and Income on Infant Mortality Through Statistical Learning. 99-102 - Hansheng Lei, Yamin Hu, Wenjian Luo, Cheng Chang Pan:

Mining Dependent Items. 103-109 - Hasan Turaev, Pavol Zavarsky, Bobby Swar:

Prevention of Ransomware Execution in Enterprise Environment on Windows OS: Assessment of Application Whitelisting Solutions. 110-118 - Himanshu Upadhyay, Hardik A. Gohel

, Alexander Perez-Pons
, Leonel E. Lagos
:
Windows Virtualization Architecture For Cyber Threats Detection. 119-122 - Hugo Armando Herrera, William Robert Rivas, Sanjeev Kumar:

Evaluation of Internet Connectivity Under Distributed Denial of Service Attacks from Botnets of Varying Magnitudes. 123-126 - Husamelddin A. M. Balla, Chen Guang Sheng, Weipeng Jing:

Reliability Enhancement in Cloud Computing Via Optimized Job Scheduling Implementing Reinforcement Learning Algorithm and Queuing Theory. 127-130 - Ihab Darwish, Tarek N. Saadawi:

Attack Detection and Mitigation Techniques in Industrial Control System -Smart Grid DNP3. 131-134 - Jaime Yeckle, Bo Tang:

Detection of Electricity Theft in Customer Consumption Using Outlier Detection Algorithms. 135-140 - Jatesh Jagraj Singh, Hamman Samuel, Pavol Zavarsky:

Impact of Paranoia Levels on the Effectiveness of the ModSecurity Web Application Firewall. 141-144 - Jayachander Surbiryala, Bikash Agrawal, Chunming Rong

:
Improve Security Over Multiple Cloud Service Providers for Resource Allocation. 145-148 - Jayraj Gondaliya, Savani Savani, Vivek Sheetal Dhaduvai, Gahangir Hossain

:
Hybrid Security RSA Algorithm in Application of Web Service. 149-152 - Jiaping Men, Wei Wang, Jiqiang Liu, Zhen Han:

Designing Mutual Authentication Protocols in Industrial Wireless Network. 153-158 - Joel A. Dawson

, Jeffrey Todd McDonald, Lee M. Hively, Todd R. Andel, Mark Yampolskiy, Charles Hubbard:
Phase Space Detection of Virtual Machine Cyber Events Through Hypervisor-Level System Call Analysis. 159-167 - Kathiravan Natarajan, Truong-Huy D. Nguyen, Mutlu Mete:

Hand Gesture Controlled Drones: An Open Source Library. 168-175 - Leonard Renners, Felix Heine

, Carsten Kleiner
, Gabi Dreo Rodosek:
A Feedback-Based Evaluation Approach for the Continuous Adjustment of Incident Prioritization. 176-183 - Liang Ming, Gang Zhao, Minhuan Huang, Xiaohui Kuang, Hu Li, Ming Zhang

:
Security Analysis of Intelligent Transportation Systems Based on Simulation Data. 184-187 - Mahmoud Quweider, Hansheng Lei, Liyu Zhang, Fitra Khan:

Managing Big Data in Visual Retrieval Systems for DHS Applications: Combining Fourier Descriptors and Metric Space Indexing. 188-193 - Mohamed Dahmane, Samuel Foucher

:
Combating Insider Threats by User Profiling from Activity Logging Data. 194-199 - Nannan Lu, Wenjian Luo, Li Ni, Hao Jiang, Weiping Ding

:
Extending CDFR for Overlapping Community Detection. 200-206 - Remilekun Sobayo, Hsiang-Huang Wu, Ram L. Ray

, Lijun Qian:
Integration of Convolutional Neural Network and Thermal Images into Soil Moisture Estimation. 207-210 - Rujit Raval, Alison Maskus, Benjamin Saltmiras, Morgan Dunn, Peter J. Hawrylak

, John Hale
:
Competitive Learning Environment for Cyber-Physical System Security Experimentation. 211-218 - Saeid Soheily-Khah

, Pierre-Francois Marteau, Nicolas Béchet:
Intrusion Detection in Network Systems Through Hybrid Supervised and Unsupervised Machine Learning Process: A Case Study on the ISCX Dataset. 219-226 - Sanjay Kumar, Ari Viinikainen

, Timo Hämäläinen
:
A Network-Based Framework for Mobile Threat Detection. 227-233 - Saud Alashri, Jiun-Yi Tsai

, Anvesh Reddy Koppela, Hasan Davulcu:
Snowball: Extracting Causal Chains from Climate Change Text Corpora. 234-241 - Shay Taylor, Tabor Kvasnicka, Thomas Shaw, Kyle Cook, Jim Arrowood, John Hale

:
A Platform for Experimentation with and Measurement of Reflective Deception. 242-245 - Sourabh Shivaji Kumbhar, Young Lee, Jeong Yang

:
Hybrid Encryption for Securing SharedPreferences of Android Applications. 246-249 - Sven Plaga

, Melanie Niethammer, Norbert Wiedermann, Alexander Borisov:
Adding Channel Binding for an Out-of-Band OTP Authentication Protocol in an Industrial Use-Case. 250-257 - Todd R. Andel, Lindsey N. Whitehurst, Jeffrey Todd McDonald, Waleed Al-Assadi:

Enhancing Security Against Software Attacks with Reprogrammable Hardware. 258-266 - Will Nichols, Zachary Hill, Peter J. Hawrylak

, John Hale
, Mauricio Papa
:
Automatic Generation of Attack Scripts from Attack Graphs. 267-274 - Yongzhong He, Binghui Hu, Zhen Han:

Dynamic Privacy Leakage Analysis of Android Third-Party Libraries. 275-280 - Zachary Campbell, Andrew Bray, Anna M. Ritz, Adam Groce:

Differentially Private ANOVA Testing. 281-285 - Zhigang Zhang, Chaowen Chang, Zhuo Lv, PeiSheng Han, Yutong Wang:

A Control Flow Anomaly Detection Algorithm for Industrial Control Systems. 286-293

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














