-
1
-
-
85008250776
-
-
CPNI, Centre of the Protection of National Infrastrucutre. Accessed on 25 Mar
-
Digital built assets and environments. CPNI, Centre of the Protection of National Infrastrucutre, www. cpni. gov. uk/advice/Cross-cuttingadvice/ Digital-built-assets-and-environments. Accessed on 25 Mar 2016.
-
(2016)
Digital Built Assets and Environments
-
-
-
4
-
-
85008262267
-
-
Accessed on 25 Mar
-
ABIresearch. Connected car cybersecurity. www. abiresearch. com/market-research/product/1017985-connectedcar-cybersecurity. Accessed on 25 Mar 2016.
-
(2016)
Connected Car Cybersecurity
-
-
-
5
-
-
85099426397
-
Detection of ddos attacks via an artificial immune system-inspired multiobjective evolutionary algorithm
-
Cecilia Di Chio et al., editor, Istanbul, Turkey, Apr. Springer-Verlag Berlin Heidelberg
-
U. Akyaz and A. Uyar. Detection of ddos attacks via an artificial immune system-inspired multiobjective evolutionary algorithm. In Cecilia Di Chio et al., editor, EvoApplications 2010, volume Part II of LNCS 6025, pages 1-10, Istanbul, Turkey, Apr. Springer-Verlag Berlin Heidelberg.
-
EvoApplications 2010 Volume Part II of LNCS 6025
, pp. 1-10
-
-
Akyaz, U.1
Uyar, A.2
-
6
-
-
85008254447
-
Seven things to know about the internet of things and industry 4. 0
-
Sept
-
M. Albert. Seven things to know about the internet of things and industry 4. 0. Modern Machine Shop Magazine, 88 (4): 74, Sept 2015.
-
(2015)
Modern Machine Shop Magazine
, vol.88
, Issue.4
, pp. 74
-
-
Albert, M.1
-
7
-
-
84856464520
-
Evolutionary computation in computer security and forensics: An overview
-
D A. Elizondo et al., editor. Springer-Verlag Berlin Heidelberg
-
S. Al amro, D. A. Elizondo, A. Solanas, and A. Martnez-Ballesté. Evolutionary computation in computer security and forensics: An overview. In D. A. Elizondo et al., editor, Computational Intelligence for Privacy and Security, SCI 394, pages 25-34. Springer-Verlag Berlin Heidelberg, 2012.
-
(2012)
Computational Intelligence for Privacy and Security, SCI
, vol.394
, pp. 25-34
-
-
Al Amro, S.1
Elizondo, D.A.2
Solanas, A.3
Martnez-Ballesté, A.4
-
9
-
-
46749156955
-
Craniofacial superimposition in forensic identification using genetic algorithms
-
IEEE Computer Society, California
-
L. Ballerini, O. Cordon, J. Santamaria, S. Damas, I. Aleman, and M. Botella. Craniofacial superimposition in forensic identification using genetic algorithms. In The Third International Symposium on Information Assurance and Security, pages 429-434. IEEE Computer Society, California, 2007.
-
(2007)
The Third International Symposium on Information Assurance and Security
, pp. 429-434
-
-
Ballerini, L.1
Cordon, O.2
Santamaria, J.3
Damas, S.4
Aleman, I.5
Botella, M.6
-
10
-
-
85008256061
-
-
July 2014. Accessed in Jan
-
R. J. Baxter. Bluemix and the internet of things. developer. ibm. com/bluemix/2014/07/16/bluemix-internet-things/, July 2014. Accessed in Jan 2016.
-
(2016)
Bluemix and the Internet of Things
-
-
Baxter, R.J.1
-
11
-
-
84868556898
-
Superidentity: Fusion of identity across real and cyber domains
-
Austin, US, 23-24 Apr
-
S. Black, S. Creese, R. Guest, B. Pike, S. Saxby, D. Stanton Fraser, S. V. Stevenage, and M. T. Whitty. Superidentity: Fusion of identity across real and cyber domains. In ID360-The Global Forum on Identity, Austin, US, 23-24 Apr 2012.
-
(2012)
ID360-The Global Forum on Identity
-
-
Black, S.1
Creese, S.2
Guest, R.3
Pike, B.4
Saxby, S.5
Stanton Fraser, D.6
Stevenage, S.V.7
Whitty, M.T.8
-
12
-
-
85008261649
-
-
CERT-UK, FEb
-
CERT-UK. Cyber-security risks in the supply chain. www. cert. gov. uk/wp-content/uploads/2015/02/Cyber-security-risksin-the-supply-chain. pdf, FEb 2015.
-
(2015)
Cyber-security Risks in the Supply Chain
-
-
-
14
-
-
36248980117
-
Audio-visual multimodal fusion for biometric person authentication and liveness veriftion
-
Australian Computer Society, Inc.
-
G. Chetty and M. Wagner. Audio-visual multimodal fusion for biometric person authentication and liveness veriftion. In Proceedings of the 2005 NICTA-HCSNet Multimodal User Interaction Workshop, volume 57, pages 17-24. Australian Computer Society, Inc., 2005.
-
(2005)
Proceedings of the 2005 NICTA-HCSNet Multimodal User Interaction Workshop
, vol.57
, pp. 17-24
-
-
Chetty, G.1
Wagner, M.2
-
15
-
-
85008243406
-
Audio-visual multimodal fusion for biometric person authentication and liveness veriftion
-
Nov.
-
G. Chetty and M. Wagner. Audio-visual multimodal fusion for biometric person authentication and liveness veriftion. International Journal of Advanced Science and Technology, 48: 23-60, Nov. 2012.
-
(2012)
International Journal of Advanced Science and Technology
, vol.48
, pp. 23-60
-
-
Chetty, G.1
Wagner, M.2
-
19
-
-
84876943063
-
Internet of things (iot): A vision, architectural elements, and future directions
-
9
-
J. Gubbia, R. Buyyab, S. Marusica, and M. Palaniswamia. Internet of things (iot): A vision, architectural elements, and future directions. Future Generation Computer Systems, 29 (7): 1645-1660, 9 2013.
-
(2013)
Future Generation Computer Systems
, vol.29
, Issue.7
, pp. 1645-1660
-
-
Gubbia, J.1
Buyyab, R.2
Marusica, S.3
Palaniswamia, M.4
-
21
-
-
34548334405
-
Review spam detection
-
Bsanff, Alberta, Canada, 8-12 May
-
N. Jindal and B. Liu. Review spam detection. In WWW 2007, ACM 978-1-59593-654-7/07/0005, Banff, Alberta, Canada, 8-12 May 2007.
-
(2007)
WWW 2007 ACM 978-1-59593-654-7/07/0005
-
-
Jindal, N.1
Liu, B.2
-
22
-
-
84955449565
-
Recommendations for implementing the strategic initiative industrie 4. 0: Securing the future of German manufacturing industry, final report of the industrie 4. 0 working group
-
Apr
-
H. Kagermann, J. Helbig, A. Hellinger, and W. Wahlster. Recommendations for implementing the strategic initiative industrie 4. 0: Securing the future of german manufacturing industry, final report of the industrie 4. 0 working group. Forschungsunion, Apr 2013.
-
(2013)
Forschungsunion
-
-
Kagermann, H.1
Helbig, J.2
Hellinger, A.3
Wahlster, W.4
-
23
-
-
85008254336
-
Develops world's first authentication technology to extract and match 2, 048-bit feature codes from palm vein images
-
accessed in Jan, Aug. 2013
-
Kawasaki. Fujitsu develops world's first authentication technology to extract and match 2, 048-bit feature codes from palm vein images. Fujitsu Laboratories Ltd, Aug. 2013. accessed in Jan 2016.
-
(2016)
Fujitsu Laboratories Ltd
-
-
Fujitsu, K.1
-
24
-
-
33750682639
-
Detecting spam blogs: A machine learning approach
-
P. Kolari, A. Java, T. Finin, T. Oates, and A. Joshi. Detecting spam blogs: a machine learning approach. In Proceeding of AAAI'06 proceedings of the 21st national conference on Artificial intelligence, volume 2, pages 1351-1356, 2006.
-
(2006)
Proceeding of AAAI'06 Proceedings of the 21st National Conference on Artificial Intelligence
, vol.2
, pp. 1351-1356
-
-
Kolari, P.1
Java, A.2
Finin, T.3
Oates, T.4
Joshi, A.5
-
26
-
-
85008259107
-
-
Sept 2012. Accessed in Jan
-
M. J. Koster. Data models for the internet of things. iotdatamodels. blogspot. co. uk/2012/09/data-models-for-internet-of-things-5. html, Sept 2012. Accessed in Jan 2016.
-
(2016)
Data Models for the Internet of Things
-
-
Koster, M.J.1
-
30
-
-
84879391983
-
Material selection using an interval 2-tuple linguistic vikor method considering subjective and objective weights
-
H.-C. Liu, L. Liu, and J. Wu. Material selection using an interval 2-tuple linguistic vikor method considering subjective and objective weights. Materials and Design, 52: 158-167, 2013.
-
(2013)
Materials and Design
, vol.52
, pp. 158-167
-
-
Liu, H.-C.1
Liu, L.2
Wu, J.3
-
33
-
-
37549016464
-
Likelihood ratio based biometric score fusion
-
Feb
-
K. Nandakumar, Y. Chen, S. C. Dass, and A. K. Jain. Likelihood ratio based biometric score fusion. IEEE Transactions on Pattern Analysis and Machine Intelligence, 30 (2): 342-347, Feb 2007.
-
(2007)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.30
, Issue.2
, pp. 342-347
-
-
Nandakumar, K.1
Chen, Y.2
Dass, S.C.3
Jain, A.K.4
-
34
-
-
85008244614
-
-
NCCIC, Sept 2014. Accessed in Jan
-
NCCIC. Incident response / vulnerability coordination in 2014. ics-cert. us-cert. gov/sites/default/files/Monitors/ICSCERT Monitor Sep2014-Feb2015. pdf, Sept 2014. Accessed in Jan 2016.
-
(2016)
Incident Response / Vulnerability Coordination in 2014
-
-
-
35
-
-
85008244606
-
-
accessed in Jan
-
Protiviti. Intelligent computation. www. protiviti. co. uk/en-US/Documents/POV/POV-Privacy-and-Data-Protection-Protiviti. pdf. accessed in Jan 2016.
-
(2016)
Intelligent Computation
-
-
-
36
-
-
83755206461
-
Detection of internet scam using logistic regression
-
Oct
-
M. Sharifi, E. Fink, and J. G. Carbonell. Detection of internet scam using logistic regression. In 2011 IEEE International Conference on Systems, Man, and Cybernetics (SMC), pages 2168-2172, Oct 2011. 10. 1109/ICSMC. 2011. 6083998.
-
(2011)
2011 IEEE International Conference on Systems, Man, and Cybernetics (SMC)
, pp. 2168-2172
-
-
Sharifi, M.1
Fink, E.2
Carbonell, J.G.3
-
38
-
-
84982835293
-
Optimization of tls security protocol using the adaptable security model
-
Jan
-
P. Sza?achowski, B. Ksie? ?zopolski, and Z. Kotulski. Optimization of tls security protocol using the adaptable security model. Annales UMCS, Informatica, 9 (1): 59-75, Jan 2009.
-
(2009)
Annales UMCS, Informatica
, vol.9
, Issue.1
, pp. 59-75
-
-
Szaachowski, P.1
Ksie Zopolski, B.2
Kotulski, Z.3
-
39
-
-
79955072754
-
Spam detection in online classified advertisements
-
ACM New York, NY, USA, 2011.
-
H. Tran, T. Hornbeck, V. Ha-Thuc, J. Cremer, and P. Srinivasan. Spam detection in online classified advertisements. In Proceedings of the 2011 Joint WICOW/AIRWeb Workshop on Web Quality (WebQuality'11), ISBN: 978-1-4503-0706-2, pages 35-41. ACM New York, NY, USA, 2011. 10. 1145/1964114. 1964122.
-
Proceedings of the 2011 Joint WICOW/AIRWeb Workshop on Web Quality (WebQuality'11)
, pp. 35-41
-
-
Tran, H.1
Hornbeck, T.2
Ha-Thuc, V.3
Cremer, J.4
Srinivasan, P.5
-
40
-
-
24344492944
-
Machine learning techniques in spam filtering
-
May
-
K. Tretyakov. Machine learning techniques in spam filtering. In Data Mining Problem-oriented Seminar, MTAT. 03. 177, pages 60-79, May 2004.
-
(2004)
Data Mining Problem-oriented Seminar, MTAT.
, vol.3
, Issue.177
, pp. 60-79
-
-
Tretyakov, K.1
-
41
-
-
84894683129
-
Data mining for internet of things: A survey
-
C.-W. Tsai, C.-F. Lai, M.-C. Chiang, and L. T. Yang. Data mining for internet of things: A survey. IEEE Coomunications Surveys & Tutorials, 16 (1): 77-97, 2014.
-
(2014)
IEEE Coomunications Surveys & Tutorials
, vol.16
, Issue.1
, pp. 77-97
-
-
Tsai, C.-W.1
Lai, C.-F.2
Chiang, M.-C.3
Yang, L.T.4
-
42
-
-
84892430418
-
Cloud manufacturing: A new manufacturing paradigm
-
L. Zhang, Y. Luo, F. Tao, B. H. Li, L. Ren, X. Zhang, H. Guo, Y. Cheng, A. Hu, and Y. Liu. Cloud manufacturing: a new manufacturing paradigm. Enterprise Information Systems, 8 (2): 167-187, 2014.
-
(2014)
Enterprise Information Systems
, vol.8
, Issue.2
, pp. 167-187
-
-
Zhang, L.1
Luo, Y.2
Tao, F.3
Li, B.H.4
Ren, L.5
Zhang, X.6
Guo, H.7
Cheng, Y.8
Hu, A.9
Liu, Y.10
|