Cybersecurity, Vol. 2, 2019
1.) Adversarial attack and defense in reinforcement learning-from AI security view. --Tong Chen, Jiqiang Liu, Yingxiao Xiang, Wenjia Niu, Endong Tong and Zhen Han.
2.) Group topic-author model for efficient discovery of latent social astroturfing groups in tourism domain. --Noora Alallaq, Muhmmad Al-khiza’ay and Xin Han.
3.) PathMarker: protecting web contents against inside crawlers. --Shengye Wan, Yue Li and Kun Sun.
4.) Comprehensive evaluation of key management hierarchies for outsourced data. --Naveen Kumar and Anish Mathuria.
5.) Privacy-preserving decision tree for epistasis detection. --Qingfeng Chen, Xu Zhang and Ruchang Zhang.
6.) A framework for the extended evaluation of ABAC policies. --Charles Morisset, Tim A. C. Willemse and Nicola Zannone.
7.) The privacy protection mechanism of Hyperledger Fabric and its application in supply chain finance. --Chaoqun Ma, Xiaolin Kong, Qiujun Lan and Zhongding Zhou.
8.) Semi Markov process inspired selfish aware co-operative scheme for wireless sensor networks (SMPISCS). --Kanchana Devi V and Ganesan R.
9.) Access control technologies for Big Data management systems: literature review and future trends. --Pietro Colombo and Elena Ferrari.
10.) Automated extraction of attributes from natural language attribute-based access control (ABAC) Policies. --Manar Alohaly, Hassan Takabi and Eduardo Blanco.
11.) DTrace: fine-grained and efficient data integrity checking with hardware instruction tracing. --Xiayang Wang, Fuqian Huang and Haibo Chen.
Dst...
2.) Group topic-author model for efficient discovery of latent social astroturfing groups in tourism domain. --Noora Alallaq, Muhmmad Al-khiza’ay and Xin Han.
3.) PathMarker: protecting web contents against inside crawlers. --Shengye Wan, Yue Li and Kun Sun.
4.) Comprehensive evaluation of key management hierarchies for outsourced data. --Naveen Kumar and Anish Mathuria.
5.) Privacy-preserving decision tree for epistasis detection. --Qingfeng Chen, Xu Zhang and Ruchang Zhang.
6.) A framework for the extended evaluation of ABAC policies. --Charles Morisset, Tim A. C. Willemse and Nicola Zannone.
7.) The privacy protection mechanism of Hyperledger Fabric and its application in supply chain finance. --Chaoqun Ma, Xiaolin Kong, Qiujun Lan and Zhongding Zhou.
8.) Semi Markov process inspired selfish aware co-operative scheme for wireless sensor networks (SMPISCS). --Kanchana Devi V and Ganesan R.
9.) Access control technologies for Big Data management systems: literature review and future trends. --Pietro Colombo and Elena Ferrari.
10.) Automated extraction of attributes from natural language attribute-based access control (ABAC) Policies. --Manar Alohaly, Hassan Takabi and Eduardo Blanco.
11.) DTrace: fine-grained and efficient data integrity checking with hardware instruction tracing. --Xiayang Wang, Fuqian Huang and Haibo Chen.
Dst...
Chen, Tong - Personal Name
Alohaly, Manar - Personal Name
Colombo, Pietro - Personal Name
Chaoqun Ma - Personal Name
Morisset, Charles - Personal Name
Chen, Qingfeng - Personal Name
Kumar, Naveen - Personal Name
Wan, Shengye - Personal Name
Alallaq, Noora - Personal Name
Wang, Xiayang - Personal Name
Alohaly, Manar - Personal Name
Colombo, Pietro - Personal Name
Chaoqun Ma - Personal Name
Morisset, Charles - Personal Name
Chen, Qingfeng - Personal Name
Kumar, Naveen - Personal Name
Wan, Shengye - Personal Name
Alallaq, Noora - Personal Name
Wang, Xiayang - Personal Name
Vol. 2, 2019
2523-3246
e-Journal TI
Inggris
Springer Nature
2019
United Kingdom
LOADING LIST...
LOADING LIST...