


default search action
2nd ICDIS 2019: South Padre Island, TX, USA
- 2nd International Conference on Data Intelligence and Security, ICDIS 2019, South Padre Island, TX, USA, June 28-30, 2019. IEEE 2019, ISBN 978-1-7281-2080-5
Session A
- Xinchi He, Ethan Robards, Rose F. Gamble, Mauricio Papa
:
Anomaly Detection Sensors for a Modbus-Based Oil and Gas Well-Monitoring System. 1-8 - Sanjeev Kumar, Harsh Kumar, Ganesh Reddy Gunnam
:
Security Integrity of Data Collection from Smart Electric Meter under a Cyber Attack. 9-13 - Cong Pu
, Bryan Groves:
Energy Depletion Attack in Low Power and Lossy Networks: Analysis and Defenses. 14-21
Session B
- Zachary Hill, John Hale
, Mauricio Papa
, Peter J. Hawrylak
:
Using Bro with a Simulation Model to Detect Cyber-Physical Attacks in a Nuclear Reactor. 22-27 - Leonard Renners, Felix Heine
, Carsten Kleiner
, Gabi Dreo Rodosek:
Design and Evaluation of an Approach for Feedback-Based Adaptation of Incident Prioritization. 28-35 - Hamidreza Alvari, Paulo Shakarian:
Hawkes Process for Understanding the Influence of Pathogenic Social Media Accounts. 36-42
Session C
- Hamidreza Alvari, Soumajyoti Sarkar, Paulo Shakarian:
Detection of Violent Extremists in Social Media. 43-47 - Umesh Timalsina
, Andy Wang:
Incentivizing Services Sharing in IoT with OSGi and HashGraph. 48-52 - Jarilyn Hernández Jiménez, Katerina Goseva-Popstojanova
:
Malware Detection Using Power Consumption and Network Traffic Data. 53-59 - Sara Mohammadi, Mauricio Papa
, Eduardo Pereyra
, Cem Sarica
:
Selection of Optimal Closure Relationships for Multiphase Flow using a Genetic Algorithm. 60-67
Session D
- Xiao Zhang, Yanqiu Wang, Qing Wang, Xiaonan Zhao:
A New Approach to Double I/O Performance for Ceph Distributed File System in Cloud Computing. 68-75 - Paul Devlin, Matt Halom, Ishfaq Ahmad:
Applying a Novel Feature Set Fusion Technique to Facial Recognition. 76-81 - Zachary Hill, John Hale
, Mauricio Papa
, Peter J. Hawrylak
:
Platform-Agnostic Language to Map Control Primitives to SCADA Communication Protocols. 82-88 - Saifullah Khalid, Ishfaq Ahmad, Khodyar Mohammad E.:
An Evolutionary Approach to Optimize Data Center Profit in Smart Grid Environment. 89-96
Session E
- Mohamed Alkalai, Wisam H. Benamer
:
Secure Exchanging of Various Data Types Used for Classification Purposes. 97-102 - Yongle Zhang
, Lin Qi, Junyu Dong, Qi Wen, Mingdong Lv:
Data Processing Based on Low-Precision IMU Equipment to Predict Wave Height and Wave Period. 103-107 - Andrew Corum, Donovan Jenkins, Jun Zheng
:
Robust PDF Malware Detection with Image Visualization and Processing Techniques. 108-114
Session F
- Liang Chen, Lingling Wu, Xuwei Li, Jin Xu:
An Immersive VR Interactive Learning System for Tenon Structure Training. 115-119 - Sultan Almakdi
, Brajendra Panda:
Secure and Efficient Query Processing Technique for Encrypted Databases in Cloud. 120-127 - Elham Shaabani, Ashkan Sadeghi-Mobarakeh, Hamidreza Alvari, Paulo Shakarian:
An End-to-End Framework to Identify Pathogenic Social Media Accounts on Twitter. 128-135
Session G
- Lee Hinkle
, Kamrad Khoshhal, Vangelis Metsis:
Physiological Measurement for Emotion Recognition in Virtual Reality. 136-143 - Sean Elliott:
Nash Equilibrium of Multiple, Non-Uniform Bitcoin Block Withholding Attackers. 144-151 - Mahmoud K. Quweider, Bassam Arshad, Hansheng Lei, Liyu Zhang, Fitra Khan:
An Accelerated Hierarchical Approach for Object Shape Extraction and Recognition. 152-159 - Mohammad Al-Ramahi
, Ali Ahmed:
Identifying Users' Concerns in Lodging Sharing Economy Using Unsupervised Machine Learning Approach. 160-166
Session H
- Binyao Duan, Wenjian Luo, Hao Jiang, Li Ni:
Dynamic Social Networks Generator Based on Modularity: DSNG-M. 167-173 - Ming Li, Peter J. Hawrylak
, John Hale
:
Concurrency Strategies for Attack Graph Generation. 174-179 - Hatim Alsuwat, Emad Alsuwat, Tieming Geng
, Chin-Tser Huang, Csilla Farkas:
Data Dependencies Preserving Shuffle in Relational Database. 180-187 - Pinchao Liu, Adnan Maruf
, Farzana Beente Yusuf, Labiba Jahan, Hailu Xu
, Boyuan Guan, Liting Hu, S. Sitharama Iyengar
:
Towards Adaptive Replication for Hot/Cold Blocks in HDFS using MemCached. 188-194
Session J
- Yongzhong He, Liping Hu, Rui Gao:
Detection of Tor Traffic Hiding Under Obfs4 Protocol Based on Two-Level Filtering. 195-200 - Hansheng Lei, Mahmoud Quweider
, Liyu Zhang, Fitra Khan:
Mining Survey Data. 201-207
Poster Session
- Mohammad Zoynul Abedin, Guotai Chi, Fahmida E. Moula:
Weighted SMOTE-Ensemble Algorithms: Evidence from Chinese Imbalance Credit Approval Instances. 208-211 - Maryann Njorbuenwu, Bobby Swar, Pavol Zavarsky:
A Survey on the Impacts of Quantum Computers on Information Security. 212-218 - Jonathan West
, John Hale
, Mauricio Papa
, Peter J. Hawrylak
:
Automatic Identification of Critical Digital Assets. 219-224 - Faruk Ahmed, Md. Sultan Mahmud, Mohammed Yeasin:
RNN and CNN for Way-Finding and Obstacle Avoidance for Visually Impaired. 225-228 - Aaron Barrera, Chu-Wen Cheng, Sanjeev Kumar:
Improved Mix Column Computation of Cryptographic AES. 229-232 - Joshua Bassey, Xiangfang Li, Lijun Qian:
An Experimental Study of Multi-Layer Multi-Valued Neural Network. 233-236

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.