Multi-Generational Database Inference Controllers (English)
- New search for: Thuraisingham, Bhavani
- New search for: Thuraisingham, Bhavani
-
ISBN:
- Conference paper / Electronic Resource
-
Title:Multi-Generational Database Inference Controllers
-
Contributors:Thuraisingham, Bhavani ( author )
-
Published in:
-
Publisher:
- New search for: IEEE
-
Publication date:2020-05-01
-
Size:525579 byte
-
ISBN:
-
DOI:
-
Type of media:Conference paper
-
Type of material:Electronic Resource
-
Language:English
-
Source:
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Affinity Propagation Initialisation Based Proximity Clustering For Labeling in Natural Language Based Big Data SystemsBandi, Adithya / Joshi, Karuna / Mulwad, Varish et al. | 2020
- 8
-
Multi-Generational Database Inference ControllersThuraisingham, Bhavani et al. | 2020
- 13
-
Research on Maintenance Strategy of Distribution Network based on Monte Carlo TreeLiang, Yundan / Ren, Zhengdong / Liao, Jiawei / Jin, Peipei / Huang, Yu / Lv, Guangxian / Lu, Yiming et al. | 2020
- 19
-
ABInfer: A Novel Field Boundaries inference Approach for Protocol Reverse EngineeringJiang, Dongxiao / Li, Chenggang / Ma, Lixin / Ji, Xiaoyu / Chen, Yanjiao / Li, Bo et al. | 2020
- 24
-
Access Control Vulnerabilities Detection for Web Application ComponentsWang, Qian / Sun, Jinan / Wang, Chen / Zhang, Shikun / Xuanyuan, Sisi / Zheng, Bin et al. | 2020
- 29
-
A Smart-Farming Ontology for Attribute Based Access ControlChukkapalli, Sai Sree Laya / Piplai, Aritran / Mittal, Sudip / Gupta, Maanak / Joshi, Anupam et al. | 2020
- 35
-
Context Sensitive Access Control in Smart Home EnvironmentsDutta, Sofia / Chukkapalli, Sai Sree Laya / Sulgekar, Madhura / Krithivasan, Swathi / Das, Prajit Kumar / Joshi, Anupam et al. | 2020
- 42
-
An Improved Fuzziness based Random Vector Functional Link Network for Liver Disease DetectionCao, Weipeng / Yang, Pengfei / Ming, Zhong / Cai, Shubin / Zhang, Jiyong et al. | 2020
- 49
-
NAttack! Adversarial Attacks to bypass a GAN based classifier trained to detect Network intrusionPiplai, Aritran / Chukkapalli, Sai Sree Laya / Joshi, Anupam et al. | 2020
- 55
-
A Hybrid Deep Learning Model for Malicious Behavior DetectionXu, Aidong / Chen, Lin / Kuang, Xiaoyun / Lv, Huahui / Yang, Hang / Jiang, Yixin / Li, Bo et al. | 2020
- 60
-
Detecting Advanced Attacks Based On Linux LogsChen, Lin / Xu, Aidong / Kuang, Xiaoyun / Lv, Huahui / Yang, Hang / Yang, Yiwei / Li, Bo et al. | 2020
- 65
-
Malware Detection Techniques Based on Deep LearningSreekumari, Prasanthi et al. | 2020
- 71
-
Application of Blockchain in Asset-Backed SecuritizationPan, Wenxuan / Qiu, Meikang et al. | 2020
- 77
-
Blockchain-based Data Traceability Platform Architecture for Supply Chain ManagementWei, Yihang et al. | 2020
- 86
-
Automating GDPR Compliance using Policy Integrated BlockchainMahindrakar, Abhishek / Joshi, Karuna Pande et al. | 2020
- 94
-
Review on Image Processing Based Adversarial Example Defenses in Computer VisionQiu, Meikang / Qiu, Han et al. | 2020
- 100
-
Adaptive Margin Based Deep Adversarial Metric LearningWang, Zhuoyi / Wang, Yigong / Dong, Bo / Pracheta, Sahoo / Hamlen, Kevin / Khan, Latifur et al. | 2020
- 109
-
Solving the Dependency Conflict of Java Components: A Comparative Empirical AnalysisWang, Yongzhi / Xing, Chengli / Sun, Jinan / Zhang, Shikun / Xuanyuan, Sisi / Zhang, Long et al. | 2020
- 115
-
Temporal Understanding of Cybersecurity ThreatsSleeman, Jennifer / Finin, Tim / Halem, Milton et al. | 2020
- 122
-
Intelligent generation algorithm of ceramic decorative patternLiu, Xinxin / Huang, Hua / Wu, Hao et al. | 2020
- 127
-
Imbalanced Learning in Massive Phishing DatasetsAzari, Ali / Namayanja, Josephine M. / Kaur, Navneet / Misal, Vasundhara / Shukla, Suraksha et al. | 2020
- 133
-
Research on Automatic Generation and Analysis Technology of Network Attack GraphHu, Wenhui / Zhang, Long / Liu, Xueyang / Huang, Yu / Zhang, Minghui / Xing, Liang et al. | 2020
- 140
-
Finding Gold in the Sand: Identifying Anomaly Indicators Though Huge Amount Security LogsXu, Aidong / Chen, Lin / Jiang, Yixin / Lv, Huahui / Yang, Hang / Li, Bo et al. | 2020
- 145
-
Detecting SQL Injection Attacks in Cloud SaaS using Machine LearningTripathy, Dharitri / Gohil, Rudrarajsinh / Halabi, Talal et al. | 2020
- 151
-
Predicting Future Malware Attacks on Cloud Systems using Machine LearningPatel, Vrushang / Choe, Seungho / Halabi, Talal et al. | 2020
- 157
-
SDN-based Stateful Firewall for CloudLi, Jian / Jiang, Hao / Jiang, Wei / Wu, Jing / Du, Wen et al. | 2020
- 162
-
Cost Optimised Heuristic Algorithm (COHA) for Scientific Workflow Scheduling in IaaS Cloud EnvironmentKonjaang, J. Kok / Xu, Lina et al. | 2020
- 169
-
Gaussian Privacy Protector for Online Data Communication in a Public WorldAlsulaimawi, Zahir et al. | 2020
- 174
-
A Navigation Satellite Selection Method Based on optimized DPSO AlgorithmHong, Yunqing / Xu, Si et al. | 2020
- 180
-
A Parallel Integer Relative Robust Mean-RCVaR Model for Portfolio optimizationYang, Xueying / Lu, Zhonghua / Qiu, Meikang / Hu, Yonghong et al. | 2020
- 186
-
Multi-label Classification for Clinical Text with Feature-level AttentionPan, Disheng / Zheng, Xizi / Liu, Weijie / Li, Mengya / Ma, Meng / Zhou, Ying / Yang, Li / Wang, Ping et al. | 2020
- 192
-
A Reflective Neural Network Based Learning Framework for Intelligent Physical SystemsSathish A.P., Kumar / Brown, Michael A et al. | 2020
- 198
-
Access Control Model for Google Cloud IoTGupta, Deepti / Bhatt, Smriti / Gupta, Maanak / Kayode, Olumide / Tosun, Ali Saman et al. | 2020
- 209
-
Experimental Study of ModSecurity Web Application FirewallsSobola, Timilehin David / Zavarsky, Pavol / Butakov, Sergey et al. | 2020
- 214
-
PassGAN Based Honeywords System for Machine-Generated Passwords DatabaseFauzi, Muhammad Ali / Yang, Bian / Martiri, Edlira et al. | 2020
- 221
-
IFLBC: On the Edge Intelligence Using Federated Learning Blockchain NetworkDoku, Ronald / Rawat, Danda B. et al. | 2020
- 227
-
Machine Learning based Intrusion Detection System for Web-Based AttacksSharma, Sushant / Zavarsky, Pavol / Butakov, Sergey et al. | 2020
- 231
-
Detection Efficiency of Static Analyzers against Obfuscated Android MalwareAjiri, Victor / Butakov, Sergey / Zavarsky, Pavol et al. | 2020
- 235
-
SLA as a mechanism to manage risks related to chatbot services.Gondaliya, Krishna / Butakov, Sergey / Zavarsky, Pavol et al. | 2020
- 241
-
Deep Packet Inspection in Industrial Automation Control System to Mitigate Attacks Exploiting Modbus/TCP VulnerabilitiesNyasore, Osborn N. / Zavarsky, Pavol / Swar, Bobby / Naiyeju, Raphael / Dabra, Shubham et al. | 2020
- 246
-
Automatic Event Coding Framework for Spanish Political News ArticlesSalam, Sayeed / Khan, Lamisah / El-Ghamry, Amir / Brandt, Patrick / Holmes, Jennifer / D'Orazio, Vito / Osorio, Javier et al. | 2020
- 254
-
An Efficient Private Set Intersection Protocol for the Cloud Computing EnvironmentsRuan, Ou / Huang, Xiongbo / Mao, Hao et al. | 2020
- 260
-
Storage and Querying of Large Provenance Graphs Using NoSQL DSEKashliev, Andrii et al. | 2020
- 263
-
A Survey of Intelligent Transportation Systems Security: Challenges and SolutionsHarvey, Julie / Kumar, Sathish et al. | 2020
- i
-
BigDataSecurity/HPSC/IDS 2020 Opinion| 2020
- i
-
BigDataSecurity/HPSC/IDS 2020 Commentary| 2020
- i
-
BigDataSecurity/HPSC/IDS 2020 TOC| 2020
- i
-
BigDataSecurity/HPSC/IDS 2020 Committees| 2020
- i
-
BigDataSecurity/HPSC/IDS 2020 List Reviewer Page| 2020
- i
-
BigDataSecurity/HPSC/IDS 2020 Index| 2020
- i
-
BigDataSecurity/HPSC/IDS 2020 Breaker Page| 2020