On the File Recovery in Systems Infected by Ransomware (Englisch)
- Neue Suche nach: D’Arco, Raffaele
- Neue Suche nach: Pizzolante, Raffaele
- Neue Suche nach: Castiglione, Arcangelo
- Neue Suche nach: Palmieri, Francesco
- Neue Suche nach: Barolli, Leonard
- Neue Suche nach: Amato, Flora
- Neue Suche nach: Moscato, Francesco
- Neue Suche nach: Enokido, Tomoya
- Neue Suche nach: Takizawa, Makoto
- Neue Suche nach: D’Arco, Raffaele
- Neue Suche nach: Pizzolante, Raffaele
- Neue Suche nach: Castiglione, Arcangelo
- Neue Suche nach: Palmieri, Francesco
In:
Advanced Information Networking and Applications
: Proceedings of the 34th International Conference on Advanced Information Networking and Applications (AINA-2020)
;
Kapitel: 119
;
1412-1425
;
2020
- Aufsatz/Kapitel (Buch) / Elektronische Ressource
-
Titel:On the File Recovery in Systems Infected by Ransomware
-
Weitere Titelangaben:Advs in Intelligent Syst., Computing
-
Beteiligte:Barolli, Leonard ( Herausgeber:in ) / Amato, Flora ( Herausgeber:in ) / Moscato, Francesco ( Herausgeber:in ) / Enokido, Tomoya ( Herausgeber:in ) / Takizawa, Makoto ( Herausgeber:in ) / D’Arco, Raffaele ( Autor:in ) / Pizzolante, Raffaele ( Autor:in ) / Castiglione, Arcangelo ( Autor:in ) / Palmieri, Francesco ( Autor:in )
-
Kongress:International Conference on Advanced Information Networking and Applications ; 2020 ; Caserta, Italy
-
Erschienen in:Advanced Information Networking and Applications : Proceedings of the 34th International Conference on Advanced Information Networking and Applications (AINA-2020) ; Kapitel: 119 ; 1412-1425Advances in Intelligent Systems and Computing ; 1151 ; 1412-1425
-
Verlag:
- Neue Suche nach: Springer International Publishing
-
Erscheinungsort:Cham
-
Erscheinungsdatum:28.03.2020
-
Format / Umfang:14 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz/Kapitel (Buch)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis E-Book
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Dynamic Routing and Bandwidth Provision Based on Reinforcement Learning in SDN NetworksLu, Yi-Hsun / Leu, Fang-Yie et al. | 2020
- 2
-
Blockchain-Based Reputation System in Agri-Food Supply ChainShahid, Affaf / Sarfraz, Umair / Malik, Muhammad Waseem / Iftikhar, Muhammad Sohaib / Jamal, Abid / Javaid, Nadeem et al. | 2020
- 3
-
An Enhanced Convolutional Neural Network Model Based on Weather Parameters for Short-Term Electricity Supply and DemandAslam, Zeeshan / Javaid, Nadeem / Adil, Muhammad / Ijaz, Muhammad Tariq / ur Rahman, Atta / Ahmed, Mohsin et al. | 2020
- 4
-
A Secure Distributed e-Health System for the Management of Personal Health Metrics DataBocu, Razvan et al. | 2020
- 5
-
Machine Learning-Based Regression Models for Price Prediction in the Australian Container Shipping Industry: Case Study of Asia-Oceania Trade LaneUbaid, Ayesha / Hussain, Farookh Khadeer / Charles, Jon et al. | 2020
- 6
-
Modeling the Chatbot Quality of Services (CQoS) Using Word Embedding to Intelligently Detect Inappropriate ResponsesAlmansor, Ebtesam Hussain / Hussain, Farookh Khadeer et al. | 2020
- 7
-
Self-balanced IPv4–IPv6 Lossless Translators with Dynamic Addresses MappingBembo, Giovanni / Lo Presti, Francesco et al. | 2020
- 8
-
Eye Tracking Technology in Personal Authentication ProtocolsOgiela, Marek R. / Ogiela, Lidia et al. | 2020
- 9
-
Techno-Economic Analysis of MMWave vs Mid-Band Spectrum in 5G NetworksBouras, Christos / Kollia, Anastasia et al. | 2020
- 10
-
Leveraging Fine-Grained Access Control in Blockchain-Based Healthcare SystemTariq, Fatima / Khan, Zahoor Ali / Sultana, Tanzeela / Rehman, Mubariz / Shahzad, Qaiser / Javaid, Nadeem et al. | 2020
- 11
-
Improving Spectrum Usage on Full-Duplex Communications with an Innovative Channel Reservationde Melo Guimarães, Lucas / Bordim, Jacir Luiz et al. | 2020
- 12
-
Machine Learning Based Data Reduction in WSN for Smart AgricultureSalim, Christian / Mitton, Nathalie et al. | 2020
- 13
-
A QoS-Based Service Chain Composition Approach for a Dynamic End-to-End Resource Allocation in NFVDjouela Kamgang, Inès Raïssa / Zhioua, Ghayet El Mouna / Tabbane, Nabil et al. | 2020
- 14
-
ITMN: A New MAC Protocol for Improving Throughput of Multihop Wireless Networks Considering Number of Neighbor NodesMorita, Taiki / Tian, Xuejun / Okuda, Takashi et al. | 2020
- 15
-
DALC: Distributed Automatic LSTM Customization for Fine-Grained Traffic Speed PredictionLee, Ming-Chang / Lin, Jia-Chun et al. | 2020
- 16
-
Periodic Mining of Traffic Information in Industrial Control NetworksNi, Jiahui / Yin, Wenqing / Jiang, Yong / Zhao, Jingling / Hu, Yiming et al. | 2020
- 17
-
The Power Consumption Model of a Server to Perform Data Access Application Processes in Virtual Machine EnvironmentsEnokido, Tomoya / Takizawa, Makoto et al. | 2020
- 18
-
A Fuzzy Decision Tree Based Tasks Orchestration Algorithm for Edge Computing EnvironmentsMechalikh, Charafeddine / Taktak, Hajer / Moussa, Faouzi et al. | 2020
- 19
-
CUSCO: A Customizable Solution for NFV CompositionFulber-Garcia, Vinicius / Luizelli, Marcelo Caggiani / dos Santos, Carlos R. Paula / Duarte, Elias P. et al. | 2020
- 20
-
Evaluating Energy Efficiency and Security for Internet of Things: A Systematic ReviewOliveira, Luciana P. / Vieira, Moroni N. / Leite, Gabriel B. / de Almeida, Edson L. V. et al. | 2020
- 21
-
IoT Geolocation Performance Using LoRaWANBouras, Christos / Gkamas, Apostolos / Kokkinos, Vasileios / Papachristos, Nikolaos et al. | 2020
- 22
-
TF-BiLSTMS2S: A Chinese Text Summarization ModelXiong, Caiquan / Wang, Zhuang / Shen, Li / Deng, Na et al. | 2020
- 23
-
Mobile Fog Computing Model of a Topic-Based Publish/Subscribe SystemSaito, Takumi / Nakamura, Shigenari / Enokido, Tomoya / Takizawa, Makoto et al. | 2020
- 24
-
Benchmarking Predictive Models in Electronic Health Records: Sepsis Length of Stay PredictionAlsinglawi, Belal / Alnajjar, Fady / Mubin, Omar / Novoa, Mauricio / Karajeh, Ola / Darwish, Omar et al. | 2020
- 25
-
Distributed Approach to Fog Computing with Auction MethodGuo, Yinzhe / Saito, Takumi / Oma, Ryuji / Nakamura, Shigenari / Enokido, Tomoya / Takizawa, Makoto et al. | 2020
- 26
-
A Self–learning Personal Privacy AssistantKasaraneni, Mounika / Thomas, Johnson P. et al. | 2020
- 27
-
Performance Evaluation of WMNs by WMN-PSOHC Hybrid Simulation System Considering CM and LDVM Replacement MethodsSakamoto, Shinji / Ohara, Seiji / Barolli, Leonard / Okamoto, Shusuke et al. | 2020
- 28
-
Performance Evaluation of WMNs Using WMN-PSOHC-DGA Considering LDVM and RDVM Replacement MethodsBarolli, Admir / Ohara, Seiji / Sakamoto, Shinji / Takizawa, Makoto / Barolli, Leonard et al. | 2020
- 29
-
A Mini-review: Conventional and Metaheuristic Optimization Methods for the Solution of Optimal Power Flow (OPF) ProblemUllah, Zia / Elkadeem, M. R. / Wang, Shaorong / Azam, Muhammad / Shaheen, Khdija / Hussain, Mehmood / Rizwan, Muhammad et al. | 2020
- 30
-
Narrative Knowledge Representation and Blockchain: A Symbiotic RelationshipSabri, Lyazid / Boubetra, Abdelhak et al. | 2020
- 31
-
Investigating Feature Selection for Predicting the Number of Bus Passengers by Monitoring Wi-Fi Signal Activity from Mobile DevicesOransirikul, Thongtat / Takada, Hideyuki et al. | 2020
- 32
-
Better User Clustering Scheme in Distributed NOMA SystemsMounchili, Salifou / Hamouda, Soumaya et al. | 2020
- 33
-
Sample Selection Search to Predict Elephant Flows in IXP Programmable Networksda Silva, Marcus Vinicius Brito / de Carvalho, André Augusto Pacheco / Jacobs, Arthur Selle / Pfitscher, Ricardo José / Granville, Lisandro Zambenedetti et al. | 2020
- 34
-
An Experimental Study on Culturally Competent Robot for Smart Home EnvironmentPham, Van Cu / Lim, Yuto / Bui, Ha-Duong / Tan, Yasuo / Chong, Nak Young / Sgorbissa, Antonio et al. | 2020
- 35
-
A Heuristic Approach for Large-Scale Orchestration of the In-band Data Plane Telemetry ProblemHohemberger, Rumenigue / Lorenzon, Arthur Francisco / Rossi, Fábio Diniz / Luizelli, Marcelo Caggiani et al. | 2020
- 36
-
Impact of Road Gradient on Electric Vehicle Energy Consumption in Real-World DrivingSagaama, Insaf / Kchiche, Amine / Trojet, Wassim / Kamoun, Farouk et al. | 2020
- 37
-
Architecture for Visualizing Indoor Air Quality Data with Augmented Reality Based Cognitive Internet of ThingsHadj Sassi, Mohamed Saifeddine / Chaari Fourati, Lamia et al. | 2020
- 38
-
Security Measures in Vehicular Ad-Hoc Networks on the Example of Bogus and Sybil AttacksStepień, Krzysztof / Poniszewska-Marańda, Aneta et al. | 2020
- 39
-
Comparative Analysis of Japan and the US Cybersecurity Related Newspaper Articles: A Content and Sentiment Analysis ApproachGhasiya, Piyush / Okamura, Koji et al. | 2020
- 40
-
A Universal Defense System Based on Backtrace Canary for ELF Against VulnerabilitiesZhao, Jingling / Yu, Congxiang / Ni, Yunze et al. | 2020
- 41
-
Budgeted Constrained Coverage on Series-Parallel Multi-interface NetworksAloisio, Alessandro / Navarra, Alfredo et al. | 2020
- 42
-
Transformative Computing for Distributed Services Management ProtocolsOgiela, Lidia / Takizawa, Makoto / Ogiela, Urszula et al. | 2020
- 43
-
Effect of Task Accomplishment for Actor Node Selection in WSANs: Performance Evaluation and a Comparison StudyElmazi, Donald / Cuka, Miralda / Ikeda, Makoto / Matsuo, Keita / Barolli, Leonard / Takizawa, Makoto et al. | 2020
- 44
-
A Fuzzy Based Simulation System for IoT Node Selection in an Opportunistic Network Considering IoT Node’s Unique Encounters as a New ParameterCuka, Miralda / Elmazi, Donald / Matsuo, Keita / Ikeda, Makoto / Takizawa, Makoto / Barolli, Leonard et al. | 2020
- 45
-
A Blockchain-Based Secure Data Storage and Trading Model for Wireless Sensor NetworksAli, Shahab / Javaid, Nadeem / Javeed, Danish / Ahmad, Ijaz / Ali, Anwar / Badamasi, Umar Mohammed et al. | 2020
- 46
-
Performance Evaluation of Nomadic Lévy Walk on Unit Disk Graphs Using Hierarchical ClusteringSugihara, Koichiro / Hayashibara, Naohiro et al. | 2020
- 47
-
Animal Species Recognition Using Deep LearningIbraheam, Mai / Gebali, Fayez / Li, Kin Fun / Sielecki, Leonard et al. | 2020
- 48
-
Implementing On-Chip Wireless Communication in Multi-stage Interconnection NoCsMnejja, Sirine / Aydi, Yassine / Abid, Mohamed / Monteleone, Salvatore / Palesi, Maurizio / Patti, Davide et al. | 2020
- 49
-
Synergy of Trust, Blockchain and Smart Contracts for Optimization of Decentralized IoT Service PlatformsShala, Besfort / Trick, Ulrich / Lehmann, Armin / Ghita, Bogdan / Shiaeles, Stavros et al. | 2020
- 50
-
SSR: A Stall Scheme Reducing Bubbles in Load-Use Hazard of RISC-V PipelineSu, Dongchu / Li, Yong / Yuan, Bo et al. | 2020
- 51
-
On the Regression and Assimilation for Air Quality Mapping Using Dense Low-Cost WSNFekih, Mohamed Anis / Mokhtari, Ichrak / Bechkit, Walid / Belbaki, Yasmine / Rivano, Hervé et al. | 2020
- 52
-
Evaluation of SLA Negotiation for Personalized SDN Service DeliveryKhan, Shuraia / Hussain, Farookh Khadeer et al. | 2020
- 53
-
Trust-Based Decision Making for Food-Energy-Water ActorsUslu, Suleyman / Kaur, Davinder / Rivera, Samuel J. / Durresi, Arjan / Babbar-Sebens, Meghna et al. | 2020
- 54
-
Trust-Based Human-Machine Collaboration Mechanism for Predicting CrimesKaur, Davinder / Uslu, Suleyman / Durresi, Arjan / Mohler, George / Carter, Jeremy G. et al. | 2020
- 55
-
Detection of Users’ Abnormal Behavior on Social NetworksBen Chaabene, Nour El Houda / Bouzeghoub, Amel / Guetari, Ramzi / Balti, Samar / Ben Ghezala, Henda Hajjami et al. | 2020
- 56
-
Efficient Authentication Scheme Using Blockchain in IoT DevicesSikarwar, Himani / Das, Debasis / Kalra, Sumit et al. | 2020
- 57
-
VNF-DOC: A Dynamic Overload Controller for Virtualized Network Functions in CloudMurugasen, Sudhakar / Raman, Shankar / Veezhinathan, Kamakoti et al. | 2020
- 58
-
On the Impact of Delays on Control Packets of Routing Algorithms and Mitigation Strategies for Wireless Ad-Hoc NetworksSinha, Pratik Kumar / Choudhury, Subhrabrata / Dutta, Animesh et al. | 2020
- 59
-
An Innovative Big Data Predictive Analytics Framework over Hybrid Big Data Sources with an Application for Disease AnalyticsSouza, Joglas / Leung, Carson K. / Cuzzocrea, Alfredo et al. | 2020
- 60
-
Optimisation of the CSIT Allocation Size for Interference Alignment Technique in Massive MIMO NetworksManai, Hosni / Ben Hadj Slama, Larbi / Bouallegue, Ridha et al. | 2020
- 61
-
A Flexible and Interpretable Framework for Predicting Anomalous Behavior in Industry 4.0 EnvironmentsLangone, Rocco / Cuzzocrea, Alfredo / Skantzos, Nikolaos et al. | 2020
- 62
-
Future Internet Exchange Point (FIXP): Enabling Future Internet Architectures InterconnectionGavazza, José A. T. / Melo, Juliano Coelho / da Silva, Thiago Bueno / Alberti, Antonio M. / Rosa, Pedro Frosi / de Oliveira Silva, Flávio / Verdi, Fábio L. / Suruagy, José Augusto et al. | 2020
- 63
-
Ensuring the Practical Applicability of Algorithms for User Behavior Modeling Through Integration into Building Automation SystemsAleksy, Markus / Bauer, Philipp et al. | 2020
- 64
-
Analysis of Human Vital Functions Based on Data from Internet of Things DevicesPoniszewska-Marańda, Aneta / Pluta, Maciej et al. | 2020
- 65
-
Adaptive Multi-agent-based Alert System for Diseases’ DetectionSelmi, Ibtihel / Kabachi, Nadia / Ben Abdallah, Sana / Ghedira Guegan, Chirine / Baazaoui, Hajer et al. | 2020
- 66
-
Anycast MAC Protocol with Advanced Preamble for Wireless Sensor NetworksGiacomin, João Carlos / Araújo, Gustavo Figueiredo / Heimfarth, Tales et al. | 2020
- 67
-
Ant Colony Optimization Algorithm for Split Delivery Vehicle Routing ProblemOchelska-Mierzejewska, Joanna et al. | 2020
- 68
-
Multi-objective Priority Based Heuristic Optimization for Region Coverage with UAVsKilic, Kemal Ihsan / Gemikonakli, Orhan / Mostarda, Leonardo et al. | 2020
- 69
-
Network Forensics of WhatsApp: A Practical Approach Based on Side-Channel AnalysisDe Luca Fiscone, Gianluca / Pizzolante, Raffaele / Castiglione, Arcangelo / Palmieri, Francesco et al. | 2020
- 70
-
Incentive Mechanism for Mobile Crowdsensing in Spatial Information Prediction Using Machine LearningShinkuma, Ryoichi / Takagi, Rieko / Inagaki, Yuichi / Oki, Eiji / Xhafa, Fatos et al. | 2020
- 71
-
Constructing Balanced, Conflict-Minimal, Overlap-Fair Channel Sensing SchedulesAragao, Paulo / Gotzhein, Reinhard et al. | 2020
- 72
-
Investigation into MPI All-Reduce Performance in a Distributed Cluster with Consideration of Imbalanced Process Arrival PatternsProficz, Jerzy / Sumionka, Piotr / Skomiał, Jarosław / Semeniuk, Marcin / Niedzielewski, Karol / Walczak, Maciej et al. | 2020
- 73
-
Enabling Multi-domain and End-to-End Slice Orchestration for Virtualization Everything Functions (VxFs)Moreira, Rodrigo / Rosa, Pedro Frosi / Aguiar, Rui Luis Andrade / de Oliveira Silva, Flávio et al. | 2020
- 74
-
A RSA-Biometric Based User Authentication Scheme for Smart Homes Using SmartphonesBagha, Amir Mohammadi / Woungang, Isaac / Dhurandher, Sanjay Kumar / Traore, Issa et al. | 2020
- 75
-
A Bottom-Up Approach for Extracting Network IntentsRibeiro, Rafael Hengen / Jacobs, Arthur Selle / Parizotto, Ricardo / Zembruzki, Luciano / Schaeffer-Filho, Alberto Egon / Granville, Lisandro Zambenedetti et al. | 2020
- 76
-
: Measuring Centralization of DNS Infrastructure in the WildZembruzki, Luciano / Jacobs, Arthur Selle / Landtreter, Gustavo Spier / Granville, Lisandro Zambenedetti / Moura, Giovane C. M. et al. | 2020
- 77
-
Classification of Encrypted Internet Traffic Using Kullback-Leibler Divergence and Euclidean DistanceCunha, Vanice Canuto / Zavala, Arturo A. Z. / Inácio, Pedro R. M. / Magoni, Damien / Freire, Mario M. et al. | 2020
- 78
-
Facing the Unknown: A Stream Learning Intrusion Detection System for Reliable Model UpdatesViegas, Eduardo K. / Santin, Altair O. / Cogo, Vinicius V. / Abreu, Vilmar et al. | 2020
- 79
-
Efficient Distributed D2D ProSe-Based Service Discovery and Querying in Disaster SituationsAbdellatif, Sami / Tibermacine, Okba / Bechkit, Walid / Bachir, Abdelmalik et al. | 2020
- 80
-
Micro-service Based Network Management for Distributed Applicationsde Jesus Martins, Rafael / Hecht, Rodolfo B. / Machado, Ederson Ribas / Nobre, Jéferson Campos / Wickboldt, Juliano Araujo / Granville, Lisandro Zambenedetti et al. | 2020
- 81
-
Offloading the Small Cells for Load Balancing in UDNs Using the Proactive and the User Transfer Algorithms with Reducing the APs Inter-communicationsSalhani, Mohamad et al. | 2020
- 82
-
Weighted-Gain Beam Selection for Beamspace mmWave Massive MIMO SystemsShili, Maroua / Hajjaj, Moufida / Ammari, Mohamed Lassaad et al. | 2020
- 83
-
Implementing the Cognition Level for Industry 4.0 by Integrating Augmented Reality and Manufacturing Execution SystemsDi Pace, Alfonso / Fenza, Giuseppe / Gallo, Mariacristina / Loia, Vincenzo / Meglio, Aldo / Orciuoli, Francesco et al. | 2020
- 84
-
Dynamic User Interests Profiling Using Fuzzy Logic ApplicationSilem, Abd El Heq / Taktak, Hajer / Moussa, Faouzi et al. | 2020
- 85
-
Blended Learning Course Design from the Perspective of Learning Powered by Technology-A Case Study on Computer NetworkingQi, Yuanyi / Yang, Jianhua / Zhang, Yongzhong et al. | 2020
- 86
-
A Secure and Distributed Control Plane for Software Defined Networksda Silva, Jefferson Pereira / Alchieri, Eduardo / Bordim, Jacir / Costa, Lucas et al. | 2020
- 87
-
Efficiently Detecting Web Spambots in a Temporally Annotated SequenceAlamro, Hayam / Iliopoulos, Costas S. / Loukides, Grigorios et al. | 2020
- 88
-
On Scheduling Transaction in Grid Processing System Considering Load Using Fuzzy Ant Colony OptimizationMahato, Dharmendra Prasad et al. | 2020
- 89
-
DeepScheduling: Grid Computing Job Scheduler Based on Deep Reinforcement LearningCasagrande, Lucas C. / Koslovski, Guilherme P. / Miers, Charles C. / Pillon, Maurício A. et al. | 2020
- 90
-
Communication QoS-Aware Navigation of Autonomous Robots for Effective CoordinationNath, Amar / Niyogi, Rajdeep et al. | 2020
- 91
-
Semantic CPPS in Industry 4.0Fenza, Giuseppe / Gallo, Mariacristina / Loia, Vincenzo / Marino, Domenico / Orciuoli, Francesco / Volpe, Alberto et al. | 2020
- 92
-
Semantically Oriented Idioms for Sentiment Analysis. A Linguistic Resource for the Italian LanguagePelosi, Serena et al. | 2020
- 93
-
Keywords Co-occurrence Analysis to Map New Topics and Recent Trends in Social Research MethodsCatone, Maria Carmela / Diana, Paolo / Giordano, Giuseppe et al. | 2020
- 94
-
Context-Aware Service Composition with Functionally Equivalent Services for Complex User RequestsSwain, Sujata / Niyogi, Rajdeep et al. | 2020
- 95
-
Cloud Resources Reassignment Based on CPU and Bandwidth CorrelationVila, Sergi / Moraes, Nilson / Guirado, Fernando / Lérida, Josep L. / Cores, Fernando / Verdi, Fábio L. et al. | 2020
- 96
-
Elixir: An Agent for Supporting Elasticity in Docker SwarmAlexiou, Michail S. / Petrakis, Euripides G. M. et al. | 2020
- 97
-
A Distributed Decision Making Model for Cloudlets Network: A Fog to Cloud Computing ApproachBen Lazreg, Amel / Ben Arbia, Anis / Youssef, Habib et al. | 2020
- 98
-
Data Center Resource Provisioning Using Particle Swarm Optimization and Cuckoo Search: A Performance ComparisonBraiki, Khaoula / Youssef, Habib et al. | 2020
- 99
-
A Multi-Criteria Decision Making Approach for Cloud-Fog CoordinationYahya, Fadwa / Maamar, Zakaria / Boukadi, Khouloud et al. | 2020
- 100
-
A Model-Driven Approach to Unravel the Interoperability Problem of the Internet of ThingsBerrouyne, Imad / Adda, Mehdi / Mottu, Jean-Marie / Royer, Jean-Claude / Tisi, Massimo et al. | 2020
- 101
-
Towards an Approach for Validating the Internet-of-Transactional-ThingsMaamar, Zakaria / Sellami, Mohamed / Narendra, Nanjangud C. / Guidara, Ikbel / Ugljanin, Emir / Banihashemi, Bita et al. | 2020
- 102
-
iZen: Secure Federated Service Oriented Architecture for the Internet of Things in the CloudZacharia, Neofytos / Tsakos, Konstantinos / Petrakis, Euripides G. M. et al. | 2020
- 103
-
iSWoT: Service Oriented Architecture in the Cloud for the Semantic Web of ThingsBotonakis, Stelios / Tzavaras, Aimilios / Petrakis, Euripides G. M. et al. | 2020
- 104
-
Identity and Access Management for IoT in Smart GridAbreu, Vilmar / Santin, Altair O. / Viegas, Eduardo K. / Cogo, Vinicius V. et al. | 2020
- 105
-
Information Centric Protocols to Overcome the Limitations of Group Communication in the IoTLachowski, Rosana / Pellenz, Marcelo E. / Jamhour, Edgard / Penna, Manoel C. / Moritz, Guilherme / Brante, Glauber / Souza, Richard D. et al. | 2020
- 106
-
Prevention of DDoS Attacks in IoT NetworksOuerfelli, Fatima Ezzahra / Barbaria, Khaled / Zouari, Belhassen / Fachkha, Claude et al. | 2020
- 107
-
Dynamic Hierarchical Security Access Control with Time-Limited Method in Electronic Medical RecordTai, Kuang-Yen / Chen, Tzer-Shyong / Lin, Frank Yeong-Sung / Huang, Po-Min / Tu, Jing-Chen et al. | 2020
- 108
-
Development of an Information Security Management Model for Enterprise Automated SystemsAlhussain, Thamer / AlZubi, Ahmad Ali / AlFarraj, Osama / Alkhalaf, Salem / Alkhalaf, Musab S. et al. | 2020
- 109
-
Analysis of the Relationship Between Psychological Manipulation Techniques and Both Personality Factors and Behavioral Characteristics in Targeted EmailUehara, Kota / Nishikawa, Hiroki / Yamamoto, Takumi / Kawauchi, Kiyoto / Nishigaki, Masakatsu et al. | 2020
- 110
-
RePAD: Real-Time Proactive Anomaly Detection for Time SeriesLee, Ming-Chang / Lin, Jia-Chun / Gran, Ernst Gunnar et al. | 2020
- 111
-
An Event-B Based Approach for Formal Modelling and Verification of Smart ContractsLahbib, Asma / Ait Wakrime, Abderrahim / Laouiti, Anis / Toumi, Khalifa / Martin, Steven et al. | 2020
- 112
-
Greybox Fuzzing Based on Ant Colony AlgorithmSun, Bowen / Wang, Bo / Cui, Baojiang / Fu, Yeqi et al. | 2020
- 113
-
Micro Biometric Authentication Using Fingernail Surfaces: A Study of Practical UseShiomi, Yuya / Sugimoto, Genki / Sugimoto, Ayaka / Uehara, Kota / Fujita, Masahiro / Mano, Yuto / Ohki, Tetsushi / Nishigaki, Masakatsu et al. | 2020
- 114
-
Generating Sentiment-Preserving Fake Online Reviews Using Neural Language Models and Their Human- and Machine-Based DetectionAdelani, David Ifeoluwa / Mai, Haotian / Fang, Fuming / Nguyen, Huy H. / Yamagishi, Junichi / Echizen, Isao et al. | 2020
- 115
-
New Programmable Data Plane Architecture Based on P4 OpenFlow AgentCarvalho, Ranyelson N. / Costa, Lucas R. / Bordim, Jacir L. / Alchieri, Eduardo A. P. et al. | 2020
- 116
-
Code Reordering Obfuscation Technique Detection by Means of Weak BisimulationCrincoli, Giuseppe / Marinaro, Tiziano / Martinelli, Fabio / Mercaldo, Francesco / Santone, Antonella et al. | 2020
- 117
-
Using Four Modalities for Malware Detection Based on Feature Level and Decision Level FusionHernández Jiménez, Jarilyn M. / Goseva-Popstojanova, Katerina et al. | 2020
- 118
-
Intrusion Detection Using ASTDsTidjon, Lionel N. / Frappier, Marc / Mammar, Amel et al. | 2020
- 119
-
On the File Recovery in Systems Infected by RansomwareD’Arco, Raffaele / Pizzolante, Raffaele / Castiglione, Arcangelo / Palmieri, Francesco et al. | 2020
- 120
-
An Improved Fast Correlation Attack on Fruit-80Zhang, Chunlan / Dong, Lihua et al. | 2020
- 121
-
A Long-Lasting Reinforcement Learning Intrusion Detection Modeldos Santos, Roger Robson / Viegas, Eduardo Kugler / Santin, Altair / Cogo, Vinicius Vielmo et al. | 2020
- 122
-
Context-Aware and Dynamic Role-Based Access Control Using BlockchainRahman, Mohsin Ur / Guidi, Barbara / Baiardi, Fabrizio / Ricci, Laura et al. | 2020
- 123
-
A Framework for Classifying Web Attacks While Respecting ML RequirementsBen Rabah, Nourhène / Ben Tekeya, Ines et al. | 2020
- 124
-
Anomaly Detection and Extra Tree Regression for Assessment of the Remaining Useful Life of Lithium-Ion BatteryOssai, Chinedu I. / Egwutuoha, Ifeanyi P. et al. | 2020