On the File Recovery in Systems Infected by Ransomware (Englisch)
- Neue Suche nach: D’Arco, Raffaele
- Neue Suche nach: Pizzolante, Raffaele
- Neue Suche nach: Castiglione, Arcangelo
- Neue Suche nach: Palmieri, Francesco
- Neue Suche nach: D’Arco, Raffaele
- Neue Suche nach: Pizzolante, Raffaele
- Neue Suche nach: Castiglione, Arcangelo
- Neue Suche nach: Palmieri, Francesco
In:
Advanced information networking and applications ; Set 1
; 1412-1425
;
2020
- Aufsatz (Konferenz) / Print
-
Titel:On the File Recovery in Systems Infected by Ransomware
-
Beteiligte:D’Arco, Raffaele ( Autor:in ) / Pizzolante, Raffaele ( Autor:in ) / Castiglione, Arcangelo ( Autor:in ) / Palmieri, Francesco ( Autor:in )
-
Kongress:AINA ; 34. ; 2020 ; Caserta
-
Erschienen in:
-
Verlag:
- Neue Suche nach: Springer
-
Erscheinungsort:Cham
-
Erscheinungsdatum:2020
-
Medientyp:Aufsatz (Konferenz)
-
Format:Print
-
Sprache:Englisch
- Neue Suche nach: 54.72
- Weitere Informationen zu Basisklassifikation
-
Schlagwörter:
-
Klassifikation:
BKL: 54.72 Künstliche Intelligenz -
Datenquelle:
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Dynamic Routing and Bandwidth Provision Based on Reinforcement Learning in SDN NetworksLu, Yi-Hsun / Leu, Fang-Yie et al. | 2020
- 12
-
Blockchain-Based Reputation System in Agri-Food Supply ChainShahid, Affaf / Sarfraz, Umair / Malik, Muhammad Waseem / Iftikhar, Muhammad Sohaib / Jamal, Abid / Javaid, Nadeem et al. | 2020
- 22
-
An Enhanced Convolutional Neural Network Model Based on Weather Parameters for Short-Term Electricity Supply and DemandAslam, Zeeshan / Javaid, Nadeem / Adıl, Muhammad / Hjaz, Muhammad Tariq / Rahman, Atta ur / Ahmed, Mohsin et al. | 2020
- 36
-
A Secure Distributed e-Health System for the Management of Personal Health Metrics DataBocu, Razvan et al. | 2020
- 52
-
Machine Learning-Based Regression Models for Price Prediction in the Australian Container Shipping Industry: Case Study of Asia-Oceania Trade LaneUbaid, Ayesha / Hussain, Farookh Khadeer / Charles, Jon et al. | 2020
- 60
-
Modeling the Chatbot Quality of Services (CQoS) Using Word Embedding to Intelligently Detect Inappropriate ResponsesAlmansor, Ebtesam Hussain / Hussain, Farookh Khadeer et al. | 2020
- 71
-
Self-balanced IPv4-IPv6 Lossless Translators with Dynamic Addresses MappingBembo, Giovanni / Presti, Francesco Lo et al. | 2020
- 85
-
Eye Tracking Technology in Personal Authentication ProtocolsOgiela, Marek R. / Ogiela, Lidia et al. | 2020
- 90
-
Techno-Economic Analysis of MMWave vs Mid-Band Spectrum N in 5G NetworksBouras, Christos / Kollia, Anastasia et al. | 2020
- 106
-
Leveraging Fine-Grained Access Control in Blockchain-Based Healthcare SystemTariq, Fatima / Khan, Zahoor Ali / Sultana, Tanzeela / Rehman, Mubariz / Shahzad, Qaiser / Javaid, Nadeem et al. | 2020
- 116
-
Improving Spectrum Usage on Full-Duplex Communications with an Innovative Channel ReservationGuimarães, Lucas de Melo / Bordim, Jacir Luiz et al. | 2020
- 127
-
Machine Learning Based Data Reduction in WSN for Smart AgricultureSalim, Christian / Mitton, Nathalie et al. | 2020
- 139
-
A QoS-Based Service Chain Composition Approach for a Dynamic End-to-End Resource Allocation in NFVKamgang, Ines Raissa Djouela / Zhioua, Ghayet El Mouna / Tabbane, Nabil et al. | 2020
- 153
-
ITMN: A New MAC Protocol for Improving Throughput of Multihop Wireless Networks Considering Number of Neighbor NodesMorita, Taiki / Tian, Xuejun / Okuda, Takashi et al. | 2020
- 164
-
DALC: Distributed Automatic LSTM Customization for Fine-Grained Traffic Speed PredictionLee, Ming-Chang / Lin, Jia-Chun et al. | 2020
- 176
-
Periodic Mining of Traffic Information in Industrial Control NetworksNi, Jiahui / Yin, Wenging / Jiang, Yong / Zhao, Jingling / Hu, Yiming et al. | 2020
- 184
-
The Power Consumption Model of a Server to Perform Data Access Application Processes in Virtual Machine EnvironmentsEnokido, Tomoya / Takizawa, Makoto et al. | 2020
- 193
-
A Fuzzy Decision Tree Based Tasks Orchestration Algorithm for Edge Computing EnvironmentsMechalikh, Charafeddine / Taktak, Hajer / Moussa, Faouzi et al. | 2020
- 204
-
CUSCO: A Customizable Solution for NFV CompositionFulber-Garcia, Vinicius / Luizelli, Marcelo Caggiani / Santos, Carlos R. Paula dos / Duarte, Elias P. Jr. et al. | 2020
- 217
-
Evaluating Energy Efficiency and Security for Internet of Things: A Systematic ReviewOliveira, Luciana P. / Vieira, Moroni N. / Leite, Gabriel B. / Almeida, Edson L. V. de et al. | 2020
- 229
-
IoT Geolocation Performance Using LoRaWANBouras, Christos / Gkamas, Apostolos / Kokkimos, Vasileios / Papachristos, Nikolaos et al. | 2020
- 240
-
TF-BiLSTMS2S: A Chinese Text Summarization ModelXiong, Caiquan / Wang, Zhuang / Shen, Li / Deng, Na et al. | 2020
- 250
-
Mobile Fog Computing Model of a Topic-Based Publish/Subscribe SystemSaito, Takumi / Nakamura, Shigenari / Enokido, Tomoya / Takizawa, Makoto et al. | 2020
- 258
-
Benchmarking Predictive Models in Electronic Health Records: Sepsis Length of Stay PredictionAlsinglawi, Belal / Alnajjar, Fady / Mubin, Omar / Novoa, Mauricio / Karajeh, Ola / Darwish, Omar et al. | 2020
- 268
-
Distributed Approach to Fog Computing with Auction MethodGuo, Yinzhe / Saito, Takumi / Oma, Ryuji / Nakamura, Shigenari / Enokido, Tomoya / Takizawa, Makoto et al. | 2020
- 276
-
A Self-learning Personal Privacy AssistantKasaraneni, Mounika / Thomas, Johnson P. et al. | 2020
- 288
-
Performance Evaluation of WMNs by WMN-PSOHC Hybrid Simulation System Considering Replacement Methods CM and LDVMSakamoto, Shinji / Ohara, Seiji / Barolli, Leonard / Okamoto, Shusuke et al. | 2020
- 298
-
Performance Evaluation of WMNSs Using WMN-PSOHC-DGA Considering LDVM and RDVM Replacement MethodsBarolli, Admir / Ohara, Seiji / Sakamoto., Shinji / Takizawa, Makoto / Barolli, Leonard et al. | 2020
- 308
-
A Mini-review: Conventional and Metaheuristic Optimization Methods for the Solution of Optimal Power Flow (OPF) ProblemUllah, Zia / Elkadeem, M. R. / Wang, Shaorong / Azam, Muhammad / Shaheen, Khdija / Hussain, Mehmood / Rizwan, Muhammad et al. | 2020
- 320
-
Narrative Knowledge Representation and Blockchain: A Symbiotic RelationshipSabri, Lyazid / Boubetra, Abdelhak et al. | 2020
- 338
-
Investigating Feature Selection for Predicting the Number of Bus Passengers by Monitoring Wi-Fi Signal Activity from Mobile DevicesOransirikul, Thongtat / Takada, Hideyuki et al. | 2020
- 345
-
Better User Clustering Scheme in Distributed NOMA SystemsMounchili, Salifou / Hamouda, Soumaya et al. | 2020
- 357
-
Sample Selection Search to Predict Elephant Flows in IXP Programmable NetworksSilva, Marcus Vinicius Brito da / Carvalho, Andre Augusto Pacheco de / Jacobs, Arthur Selle / Pfitscher, Ricardo José / Granville, Lisandro Zambenedetti et al. | 2020
- 369
-
An Experimental Study on Culturally Competent Robot for Smart Home EnvironmentPham, Van Cu / Lim, Yuto / Bui, Ha-Duong / Tan, Yasuo / Chong, Nak Young / Sgorbissa, Antonio et al. | 2020
- 381
-
A Heuristic Approach for Large-Scale Orchestration of the In-band Data Plane Telemetry ProblemHohemberger, Rumenigue / Lorenzon, Arthur Francisco / Rossi, Fäbio Diniz / Luizelli, Marcelo Caggiani et al. | 2020
- 393
-
Impact of Road Gradient on Electric Vehicle Energy Consumption in Real-World DrivingSagaama, Insaf / Kchiche, Amine / Trojet, Wassim / Kamoun, Farouk et al. | 2020
- 405
-
Architecture for Visualizing Indoor Air Quality Data with Augmented Reality Based Cognitive Internet of ThingsSassi, Mohamed Saifeddine Hadj / Fourati, Lamia Chaari et al. | 2020
- 419
-
Security Measures in Vehicular Ad-Hoc Networks on the Example of Bogus and Sybil AttacksStepien, Krzysztof / Poniszewska-Maranda, Aneta et al. | 2020
- 431
-
Comparative Analysis of Japan and the US Cybersecurity Related Newspaper Articles: A Content and Sentiment Analysis ApproachGhasiya, Piyush / Okamura, Koji et al. | 2020
- 444
-
A Universal Defense System Based on Backtrace Canary for ELF Against VulnerabilitiesZhao, Jingling / Yu, Congxiang / Ni, Yunze et al. | 2020
- 458
-
Budgeted Constrained Coverage on Series-Parallel Multi-interface NetworksAloisio, Alessandro / Navarra, Alfredo et al. | 2020
- 470
-
Transformative Computing for Distributed Services Management ProtocolsOgiela, Lidia / Takizawa, Makoto / Ogiela, Urszula et al. | 2020
- 476
-
Effect of Task Accomplishment for Actor Node Selection in WSANs: Performance Evaluation and a Comparison StudyElmazi, Donald / Cuka, Miralda / Ikeda, Makoto / Barolli, Keita Matsuo. Leonard / Takizawa, Makoto et al. | 2020
- 488
-
A Fuzzy Based Simulation System for IoT Node Selection in an Opportunistic Network Considering IoT Node’s Unique Encounters as a New ParameterCuka, Miralda / Elmazi, Donald / Matsuo, Keita / Ikeda, Makoto / Takizawa, Makoto / Barolli, Leonard et al. | 2020
- 499
-
A Blockchain-Based Secure Data Storage and Trading Model for Wireless Sensor NetworksAli, Shahab / Javaid, Nadeem / Javeed, Danish / Ahmad, Ijaz / Ali, Anwar / Badamasi, Umar Mohammed et al. | 2020
- 512
-
Performance Evaluation of Nomadic Levy Walk on Unit Disk Graphs Using Hierarchical ClusteringSugihara, Koichiro / Hayashibara, Naohiro et al. | 2020
- 523
-
Animal Species Recognition Using Deep LearningIbraheam, Mai / Gebali, Fayez / Li, Kin Fun / Sielecki, Leonard et al. | 2020
- 533
-
Implementing On-Chip Wireless Communication in Multi-stage Interconnection NoCSMnejja, Sirine / Aydi, Yassine / Abid, Mohamed / Monteleone, Salvatore / Palesi, Maurizio / Patti, Davide et al. | 2020
- 547
-
Synergy of Trust, Blockchain and Smart Contracts for Optimization of Decentralized IoT Service PlatformsShala, Besfort / Trick, Ulrich / Ghita, Armin Lehmann. Bogdan / Shiaeles, Stavros et al. | 2020
- 559
-
SSR: A Stall Scheme Reducing Bubbles in Load-Use Hazard of RISC-V PipelineSu, Dongchu / Li, Yong / Yuan, Bo et al. | 2020
- 566
-
On the Regression and Assimilation for Air Quality Mapping Using Dense Low-Cost WSNFekih, Mohamed Anis / Mokhtari, Ichrak / Belbaki, Walid Bechkit. Yasmine / Rivano, Hervé et al. | 2020
- 579
-
Evaluation of SLA Negotiation for Personalized SDN Service DeliveryKhan, Shuraia / Hussain, Farookh Khadeer et al. | 2020
- 591
-
Trust-Based Decision Making for Food-Energy-Water ActorsUslu, Suleyman / Kaur, Davinder / Rivera, Samuel J. / Durresi, Arjan / Babbar-Sebens, Meshna et al. | 2020
- 603
-
Trust-Based Human-Machine Collaboration Mechanism for Predicting CrimesKaur, Davinder / Uslu, Suleyman / Durresi, Arjan / Mohler, George / Carter, Jeremy G. et al. | 2020
- 617
-
Detection of Users’ Abnormal Behavior on Social NetworksChaabene, Nour El Houda Ben / Bouzeghoub, Amel / Guetari, Ramzi / Balti, Samar / Ghezala, Henda Hajjami Ben et al. | 2020
- 630
-
Efficient Authentication Scheme Using Blockchain in IoT DevicesSikarwar, Himani / Das, Debasis / Kalra, Sumit et al. | 2020
- 642
-
VNF-DOC: A Dynamic Overload Controller for Virtualized Network Functions in CloudMurugasen, Sudhakar / Raman, Shankar / Veezhinathan, Kamakoti et al. | 2020
- 657
-
On the Impact of Delays on Control Packets of Routing Algorithms and Mitigation Strategies for Wireless Ad-Hoc Networks ...........Sinha, Pratik Kumar / Choudhury, Subhrabrata / Dutta, Animesh et al. | 2020
- 669
-
An Innovative Big Data Predictive Analytics Framework over Hybrid Big Data Sources with an Application for Disease AnalyticsSouza, Joglas / Leung, Carson K. / Cuzzocrea, Alfredo et al. | 2020
- 681
-
Optimisation of the CSIT Allocation Size for Interference Alignment Technique in Massive MIMO NetworksManai, Hosni / Slama, Larbi Ben Hadj / Bouallegue, Ridha et al. | 2020
- 693
-
A Flexible and Interpretable Framework for Predicting Anomalous Behavior in Industry 4.0 EnvironmentsLangone, Rocco / Cuzzocrea, Alfredo / Skantzos, Nikolaos et al. | 2020
- 703
-
Future Internet Exchange Point (FIXP): Enabling Future Internet Architectures InterconnectionGavazza, José A. T. / Melo, Juliano Coelho / Silva, Thiago Bueno da / Alberti, Antonio M. / Rosa, Pedro Frosi / Silva, Flävio de Oliveira / Verdi, Fäbio L. / Suruagy, José Augusto et al. | 2020
- 715
-
Ensuring the Practical Applicability of Algorithms for User Behavior Modeling Through Integration into Building AutomationAleksy, Markus / Bauer, Philipp et al. | 2020
- 722
-
Analysis of Human Vital Functions Based on Data from Internet of Things DevicesPoniszewska-Marahda, Aneta / Pluta, Maciej et al. | 2020
- 734
-
Adaptive Multi-agent-based Alert System for Diseases’ DetectionSelmi, Ibtihel / Kabachi, Nadia / Abdallah, Sana Ben / Guegan, Chirine Ghedira / Baazaoui, Hajer et al. | 2020
- 746
-
Anycast MAC Protocol with Advanced Preamble for Wireless Sensor NetworksGiacomin, João Carlos / Araújo, Gustavo Figueiredo / Heimfarth, Tales et al. | 2020
- 758
-
Multi-objective Priority Based Heuristic Optimization for Region Coverage with UAVSKilic, Kemal Ihsan / Gemikonakli, Orhan / Mostarda, Leonardo et al. | 2020
- 780
-
Network Forensics of WhatsApp: A Practical Approach Based on Side-Channel AnalysisFiscone, Gianluca De Luca / Pizzolante, Raffaele / Castiglione, Arcangelo / Palmieri, Francesco et al. | 2020
- 792
-
Incentive Mechanism for Mobile Crowdsensing in Spatial Information Prediction Using Machine LearningShinkuma, Ryoichi / Takagi, Rieko / Inagaki, Yuichi / Oki, Eiji / Xhafa, Fatos et al. | 2020
- 804
-
Constructing Balanced, Conflict-Minimal, Overlap-Fair Channel Sensing SchedulesAragao, Paulo / Gotzhein, Reinhard et al. | 2020
- 817
-
Investigation into MPI ANl-Reduce Performance in a Distributed Cluster with Consideration of Imbalanced Process Arrival PatternsProficz, Jerzy / Sumionka, Piotr / Skomiat, Jarostaw / Semeniuk, Marcin / Niedzielewski, Karol / Walczak, Maciej et al. | 2020
- 830
-
Enabling Multi-domain and End-to-End Slice Orchestration for Virtualization Everything Functions (VxFs)Moreira, Rodrigo / Rosa, Pedro Frosi / Aguiar, Rui Luis Andrade / Silva, Flávio de Oliveira et al. | 2020
- 845
-
A RSA-Biometric Based User Authentification Scheme for Smart Homes Using SmartphonesBagha, Amir Mohammadi / Woungang, Isaac / Dhurandher, Sanjay Kumar / Traore, Issa et al. | 2020
- 858
-
A Bottom-Up Approach for Extracting Network IntentsRibeiro, Rafael Hengen / Jacobs, Arthur Selle / Parizotto, Ricardo / ZEmbruzki, Luciano / Schaeffer-Filho, Alberto Egon / Granville, Lisandro Zambenedetti et al. | 2020
- 871
-
dnstracker: Measuring Centralization of DNS Infrastructure in the WildZembruzki, Luciano / Jacobs, Arthur Selle / Landtreter, Gustavo Spier / Granville, Lisandro Zambenedetti / Moura, Giovane C. M. et al. | 2020
- 883
-
Classification of Encrypted Internet Traffic Using Kullback-Leibler Divergence and Euclidean DistanceCunha, Vanice Canuto / Zavala, Arturo A. Z. / Inácio, Pedro R. M. / Magoni, Damien / Freire, Mario M. et al. | 2020
- 898
-
Facing the Unknown: A Stream Learning Intrusion Detection System for Reliable Model UpdatesViegas, Eduardo K. / Santin, Altair O. / Cogo, Vinicius V. / Abreu, Vilmar et al. | 2020
- 910
-
Efficient Distributed D2D ProSe-Based Service Discovery and Querying in Disaster SituationsAbdellatif, Sami / Tibermacine, Okba / Bechkit, Walid / Bachir, Abdelmalik et al. | 2020
- 922
-
Micro-service Based Network Management for Distributed ApplicationsMartins, Rafael de Jesus / Hecht, Rodolfo B. / Machado, Ederson Ribas / Nobre, Jeferson Campos / Wickboldt, Juliano Araujo / Granville, Lisandro Zambenedetti et al. | 2020
- 934
-
Offioading the Small Cells for Load Balancing in UDNs Using the Proactive and the User Transfer Algorithms with Reducing the APs Inter-communicationsSalhani, Mohamad et al. | 2020
- 947
-
Weighted-Gain Beam Selection for Beamspace mmWave Massive MIMO SystemsShili, Maroua / Hajjaj, Moufida / Ammari, Mohamed Lassaad et al. | 2020
- 957
-
Implementing the Cognition Level for Industry 4.0 by Integrating Augmented Reality and Manufacturing Execution SystemsPace, Alfonso Di / Fenza, Giuseppe / Gallo, Mariacristina / Meglio, Vincenzo Loia. Aldo / Orciuvoli, Francesco et al. | 2020
- 968
-
Dynamic User Interests Profiling Using Fuzzy Logic ApplicationSilem, Abd El Heq / Taktak, Hajer / Moussa, Faouzi et al. | 2020
- 980
-
Blended Learning Course Design from the Perspective of Learning Powered by Technology-A Case Study on Computer NetworkingQi, Yuanyi / Yang, Jianhua / Zhang, Yongzhong et al. | 2020
- 994
-
A Secure and Distributed Control Plane for Software Defined NetworksSilva, Jefferson Pereira da / Alchieri, Eduardo / Bordim, Jacir / Costa, Lucas et al. | 2020
- 1007
-
Efficiently Detecting Web Spambots in a Temporally Annotated SequenceAlamro, Hayam / Iliopoulos, Costas S. / Loukides, Grigorios et al. | 2020
- 1020
-
On Scheduling Transaction in Grid Processing System Considering Load Using Fuzzy Ant Colony OptimizationMahato, Dharmendra Prasad et al. | 2020
- 1032
-
DeepScheduling: Grid Computing Job Scheduler Based on Deep Reinforcement LearningCasagrande, Lucas C. / Koslovski, Guilherme P. / Miers, Charles C. / Pillon, Mauricio A. et al. | 2020
- 1045
-
Communication QoS-Aware Navigation of Autonomous Robots for Effective CoordinationNath, Amar / Niyogi, Rajdeep et al. | 2020
- 1057
-
Semantic CPPS in Industry 4.0Fenza, Giuseppe / Gallo, Mariacristina / Loia, Vincenzo / Marino, Domenico / Orciuoli, Francesco / Volpe, Alberto et al. | 2020
- 1069
-
Semantically Oriented Idioms for Sentiment Analysis. A Linguistic Resource for the Italian LanguagePelosi, Serena et al. | 2020
- 1078
-
Keywords Co-occurrence Analysis to Map New Topics and Recent Trends in Social Research MethodsCatone, Maria Carmela / Diana, Paolo / Giordano, Giuseppe et al. | 2020
- 1089
-
Context-Aware Service Composition with Functionally Equivalent Services for Complex User RequestsSwain, Sujata / Niyogi, Rajdeep et al. | 2020
- 1101
-
Cloud Resources Reassignment Based on CPU and Bandwidth CorrelationVila, Sergi / Moraes, Nilson / Guirado, Fernando / Lérida, Josep L. / Cores, Fernando / Verdi, Fábio L. et al. | 2020
- 1114
-
Elixir: An Agent for Supporting Elasticity in Docker SwarmAlexiou, Michail S. / Petrakis, Euripides G. M. et al. | 2020
- 1126
-
A Distributed Decision Making Model for Cloudlets Network: A Fog to Cloud Computing ApproachLazreg, Amel Ben / Arbia, Anis Ben / Youssef, Habib et al. | 2020
- 1138
-
Data Center Resource Provisioning Using Particle Swarm Optimization and Cuckoo Search: A Performance ComparisonBraiki, Khaoula / Youssef, Habib et al. | 2020
- 1150
-
A Multi-Criteria Decision Making Approach for Cloud-Fog CoordinationYahya, Fadwa / Maamar, Zakaria / Boukadi, Khouloud et al. | 2020
- 1162
-
A Model-Driven Approach to Unravel the Interoperability Problem of the Internet of ThingsBerrouyne, Imad / Adda, Mehdi / Royer, Jean-Marie Mottu. Jean-Claude / Tisi, Massimo et al. | 2020
- 1176
-
Towards an Approach for Validating the Internet-of-Transactional-ThingsMaamar, Zakaria / Sellami, Mohamed / Narendra, Nanjangud C. / Guidara, Ikbel / Ugljanin, Emir / Banihashemi, Bita et al. | 2020
- 1189
-
iZen: Secure Federated Service Oriented Architecture for the Internet of Things in the CloudZacharia, Neofytos / Tsakos, Konstantinos / Petrakis, Euripides G. M. et al. | 2020
- 1201
-
iSWOoT: Service Oriented Architecture in the Cloud for the Semantic Web of ThingsBotonakis, Stelios / Tzavaras, Aimilios / Petrakis, Euripides G. M. et al. | 2020
- 1215
-
Identity and Access Management for IoT in Smart GridAbreu, Vilmar / Santin, Altair O. / Viegas, Eduardo K. / Cogo, Vinicius V. et al. | 2020
- 1227
-
Information Centric Protocols to Overcome the Limitations of Group Communication in the IoTLachowski, Rosana / Pellenz, Marcelo E. / Jamhour, Edgard / Penna, Manoel C. / Moritz, Guilherme / Brante, Glauber / Souza, Richard D. et al. | 2020
- 1239
-
Prevention of DDoS Attacks in IoT NetworksQuerfelli, Fatima Ezzahra / Barbaria, Khaled / Zouari, Belhassen / Fachkha, Claude et al. | 2020
- 1251
-
Dynamic Hierarchical Security Access Control with Time-Limited Method in Electronic Medical RecordTai, Kuang-Yen / Chen, Tzer-Shyong / Huang, Frank Yeong-Sung Lin. Po-Min / Tu, Jing-Chen et al. | 2020
- 1265
-
Development of an Information Security Management Model for Enterprise Automated SystemsAlhussain, Thamer / AlZubi, Ahmad Ali / AlFarraj, Osama / Alkhalaf, Salem / Alkhalaf, Musab S. et al. | 2020
- 1278
-
Analysis of the Relationship Between Psychological Manipulation Techniques and Both Personality Factors and Behavioral Characteristics in Targeted EmailUehara, Kota / Nishikawa, Hiroki / Kawauchi, Takumi Yamamoto. Kiyoto / Nishigaki, Masakatsu et al. | 2020
- 1291
-
RePAD: Real-Time Proactive Anomaly Detection for Time SeriesLee, Ming-Chang / Lin, Jia-Chun / Gran, Ernst Gunnar et al. | 2020
- 1303
-
An Event-B Based Approach for Formal Modelling and Verification of Smart ContractsLahbib, Asma / Wakrime, Abderrahim Ait / Laouiti, Anis / Toumi, Khalifa / Martin, Steven et al. | 2020
- 1319
-
Greybox Fuzzing Based on Ant Colony AlgorithmSun, Bowen / Wang, Bo / Cui, Baojiang / Fu, Yeqi et al. | 2020
- 1330
-
Micro Biometric Authentication Using Fingernail Surfaces: A Study of Practical UseShiomi, Yuya / Sugimoto, Genki / Sugimoto, Ayaka / Uehara, Kota / Fujita, Masahiro / Mano, Yuto / Ohki, Tetsushi / Nishigaki, Masakatsu et al. | 2020
- 1341
-
Generating Sentiment-Preserving Fake Online Reviews Using Neural Language Models and Their Human- and Machine-Based DetectionAdelani, David Ifeoluwa / Mai, Haotian / Fang, Fuming / Yamagishi, Huy H. Nguyen. Junichi / Echizen, Isao et al. | 2020
- 1355
-
New Programmable Data Plane Architecture Based on P4 OpenFlow AgentCarvalho, Ranyelson N. / Costa, Lucas R. / Bordim, Jacir L. / Alchieri, Eduardo A. P. et al. | 2020
- 1368
-
Code Reordering Obfuscation Technique Detection by Means of Weak BisimulationCrincoli, Giuseppe / Marinaro, Tiziano / Martinelli, Fabio / Mercaldo, Francesco / Santone, Antonella et al. | 2020
- 1383
-
Using Four Modalities for Malware Detection Based on Feature Level and Decision Level FusionJiménez, Jarilyn M. Hernández / Goseva-Popstojanova, Katerina et al. | 2020
- 1397
-
Intrusion Detection Using ASTDsTidjon, Lionel N. / Frappier, Marc / Mammar, Amel et al. | 2020
- 1412
-
On the File Recovery in Systems Infected by RansomwareD’Arco, Raffaele / Pizzolante, Raffaele / Castiglione, Arcangelo / Palmieri, Francesco et al. | 2020
- 1426
-
An Improved Fast Correlation Attack on Fruit-80Zhang, Chunlan / Dong, Lihua et al. | 2020
- 1437
-
A Long-Lasting Reinforcement Learning Intrusion Detection ModelSantos, Roger Robson dos / Viegas, Eduardo Kugler / Santin, Altair / Cogo, Vinicius Vielmo et al. | 2020
- 1449
-
Context-Aware and Dynamic Role-Based Access Control Using BlockchainRahman, Mobhsin Ur / Baiardi, Barbara Guidi. Fabrizio / Ricci, Laura et al. | 2020
- 1461
-
A Framework for Classifying Web Attacks While Respecting ML RequirementsRabah, Nourhène Ben / Tekeya, Ines Ben et al. | 2020
- 1474
-
Anomaly Detection and Extra Tree Regression for Assessment of the Remaining Useful Life of Lithium-Ion BatteryOssai, Chinedu I. / Egwutuocha, Ifeanyi P. et al. | 2020
-
Ant Colony Optimization Algorithm for Split Delivery Vehicle Routing ProblemOchelska-Mierzejewska, Joanna et al. | 2020