default search action
6th DependSys 2020: Nadi, Fiji
- 6th IEEE International Conference on Dependability in Sensor, Cloud and Big Data Systems and Applications, DependSys 2020, Nadi, Fiji, December 14-16, 2020. IEEE 2020, ISBN 978-1-7281-7651-2
- Xuejin Zhu, Jie Huang, Chunyang Qi, Xiaowen Wang:
Modeling and Analysis of Malware Propagation for Cluster-based Wireless Sensor Networks. 1-7 - Antonio Rapuano, Gerardo Iovane, Marta Chinnici:
A scalable Blockchain based system for super resolution images manipulation. 8-15 - Congwei Chen, Marwa A. Elsayed, Mohammad Zulkernine:
HBD-Authority: Streaming Access Control Model for Hadoop. 16-25 - Qiuxian Li, Quanxing Zhou, Qixin Pan, Lingyun Wang, Hongfa Ding:
A secret sharing scheme based on game theory and BP neural network. 26-32 - Israa Alsarsour, Qutaibah M. Malluhi, Yongge Wang:
Free Chain: Enabling Freedom of Expression through Public Blockchains. 33-40 - Alaa Alhowaide, Izzat Alsmadi, Jian Tang:
An Ensemble Feature Selection Method for IoT IDS. 41-48 - Keijiro Nakagawa, Daisuké Shimotoku, Junya Kawase, Hill Hiroki Kobayashi:
Dependable Wildlife DTN: Wearable Animal Resource Optimization for Sustainable Long-Term Monitoring. 49-56 - Joseph Boi-Ukeme, Cristina Ruiz Martin, Gabriel A. Wainer:
Real-Time Fault Detection and Diagnosis of CPS Faults in DEVS. 57-64 - Eric Cheek, Dhimant Khuttan, Raghu Changalvala, Hafiz Malik:
Physical Fingerprinting of Ultrasonic Sensors and Applications to Sensor Security. 65-72 - Francesco Schiliro, Nour Moustafa, Amin Beheshti:
Cognitive Privacy: AI-enabled Privacy using EEG Signals in the Internet of Things. 73-79 - Andreea Floricu, Razvan Buzatu, Catalin Negru, Florin Pop, Aniello Castiglione:
Implementing a solution for monitoring SLA violations in Cloud. 80-86 - Khaldoon Dhou, Christopher Cruzen:
A New Chain Code for Bi-Level Image Compression Using an Agent-Based Model of Echolocation in Dolphins. 87-91 - Rajesh Kumar:
An attack tree template based on feature diagram hierarchy. 92-97 - Stephen Ugwuanyi, Rameez Asif, James Irvine:
Network Virtualization: Proof of Concept for Remote Management of Multi-Tenant Infrastructure. 98-105 - Fawaz Kserawi, Qutaibah M. Malluhi:
Privacy Preservation of Aggregated Data Using Virtual Battery in the Smart Grid. 106-111 - Sumesh J. Philip, James M. McQuillan, Oluwatoba Adegbite:
LoRaWAN v1.1 Security: Are We in the Clear Yet? 112-118 - Jim Basney, Phuong Cao, Terry Fleury:
Investigating Root Causes of Authentication Failures Using a SAML and OIDC Observatory. 119-126 - Antonino Ferraro, Antonio Galli, Vincenzo Moscato, Giancarlo Sperlì:
A novel approach for predictive maintenance combining GAF encoding strategies and deep networks. 127-132
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.