default search action
3rd ICDIS 2020: South Padre Island, TX, USA
- 3rd International Conference on Data Intelligence and Security, ICDIS 2020, South Padre Island, TX, USA, June 24-26, 2020. IEEE 2020, ISBN 978-1-7281-9379-3
- Rohitshankar Mishra, Ishfaq Ahmad, Akshaya Sharma:
A Dynamic Multi-Threaded Queuing Mechanism for Reducing the Inter-Process Communication Latency on Multi-Core Chips. 12-19 - Aaron Barrera, Chu-Wen Cheng, Sanjeev Kumar:
A Fast Implementation of the Rijndael Substitution Box for Cryptographic AES. 20-25 - Hamidreza Alvari, Ghazaleh Beigi, Soumajyoti Sarkar, Scott W. Ruston, Steven R. Corman, Hasan Davulcu, Paulo Shakarian:
A Feature-Driven Approach for Identifying Pathogenic Social Media Accounts. 26-33 - Zainab Alibhai, Taylor Burreson, Matthew Stiller, Ishfaq Ahmad, Manfred Huber, Addison Clark:
A Human-Computer Interface For Smart Wheelchair Control Using Forearm EMG Signals. 34-39 - Karthik Anagandula, Pavol Zavarsky:
An Analysis of Effectiveness of Black-Box Web Application Scanners in Detection of Stored SQL Injection and Stored XSS Vulnerabilities. 40-48 - Harsh Kumar, Sanjeev Kumar:
Effect of Intermediate Network Systems on Remote Power Data Collection in Smart Grid. 49-55 - Shivanjali Khare, Michael W. Totaro:
Ensemble Learning for Detecting Attacks and Anomalies in IoT Smart Home. 56-63 - William Robert Rivas, Sanjeev Kumar:
Evaluation of CentOS performance under IoT based DDoS Security Attacks. 64-70 - Jonas Herskind Sejr, Arthur Zimek, Peter Schneider-Kamp:
Explainable Detection of Zero Day Web Attacks. 71-78 - Ishfaq Ahmad, Addison Clark, Muhammad Ali, David Ferris, Alex J. Aved:
Identifying Optimal Attacks for Infrastructure Networks with failure Propagation. 79-86 - Cameron Dignan, Eliud Perez, Ishfaq Ahmad, Manfred Huber, Addison Clark:
Improving Sign Language Recognition by Combining Hardware and Software Techniques. 87-92 - Christoph Lipps, Sachinkumar Bavikatti Mallikarjun, Mathias Strufe, Christopher Heinz, Christoph Grimm, Hans Dieter Schotten:
Keep Private Networks Private: Secure Channel-PUFs, and Physical Layer Security by Linear Regression Enhanced Channel Profiles. 93-100 - Ahmad Raza Hameed, Kashif Munir, Saif ul Islam, Ishfaq Ahmad:
Load-balancing of computing resources in vehicular fog computing. 101-108 - Chester Parrott, Doris L. Carver:
Lodestone: A Streaming Approach to Behavior Modeling and Load Testing. 109-116 - Ishfaq Ahmad, Addison Clark, Alex Sabol, David Ferris, Alex Aved:
Maximizing Resilience under Defender Attacker Model in Heterogeneous Multi-Networks. 117-126 - Pranshu Bajpai, Richard J. Enbody:
Preparing Smart Cities for Ransomware Attacks. 127-133 - Wenjian Luo, Junteng Wang, Yamin Hu, Peilan Xu:
Solving Dynamic 3-SAT Formula: An Empirical Study. 134-140 - Suhail Basalama, Atiyehsadat Panahi, Ange-Thierry Ishimwe, David Andrews:
SPAR-2: A SIMD Processor Array for Machine Learning in IoT Devices. 141-147 - Haoran Mo, Qi Yong, Ning Liu:
Trial Risk Index Model and Assessment System Based on Extended TOPSIS Method. 148-155
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.