Change Point Models for Real-Time Cyber Attack Detection in Connected Vehicle Environment | 0 | 0.34 | 2022 |
A Review on Cybersecurity of Cloud Computing for Supporting Connected Vehicle Applications | 0 | 0.34 | 2022 |
Towards De-Anonymization of Google Play Search Rank Fraud | 0 | 0.34 | 2021 |
Commercial Cloud Computing for Connected Vehicle Applications in Transportation Cyberphysical Systems: A Case Study | 2 | 0.35 | 2021 |
Grey models for short-term queue length predictions for adaptive traffic signal control | 0 | 0.34 | 2021 |
Vision-Based Personal Safety Messages (PSMs) Generation for Connected Vehicles | 0 | 0.34 | 2020 |
The Art and Craft of Fraudulent App Promotion in Google Play | 2 | 0.36 | 2019 |
In-Vehicle False Information Attack Detection and Mitigation Framework using Machine Learning and Software Defined Networking. | 0 | 0.34 | 2019 |
Privacy-Preserved, Provable Secure, Mutually Authenticated Key Agreement Protocol for Healthcare in a Smart City Environment. | 0 | 0.34 | 2019 |
IoT Data Compression and Optimization Techniques in Cloud Storage: Current Prospects and Future Directions | 0 | 0.34 | 2019 |
A Review of Sensing and Communication, Human Factors, and Controller Aspects for Information-Aware Connected and Automated Vehicles | 5 | 0.37 | 2019 |
Leveraging Analysis of User Behavior to Identify Malicious Activities in Large-Scale Social Networks. | 4 | 0.42 | 2018 |
Feasibility of 5G mm-wave communication for connected autonomous vehicles. | 0 | 0.34 | 2018 |
Search Rank Fraud De-Anonymization in Online Systems. | 0 | 0.34 | 2018 |
A Distributed Message Delivery Infrastructure for Connected Vehicle Technology Applications. | 6 | 0.44 | 2018 |
Real-time Traffic Data Prediction with Basic Safety Messages using Kalman-Filter based Noise Reduction Model and Long Short-term Memory Neural Network. | 0 | 0.34 | 2018 |
A prediction system of Sybil attack in social network using deep-regression model. | 4 | 0.39 | 2018 |
Vulnerability Analysis for the Authentication Protocols in Trusted Computing Platforms and a Proposed Enhancement of the OffPAD Protocol. | 1 | 0.35 | 2018 |
Fraud De-Anonymization for Fun and Profit. | 0 | 0.34 | 2018 |
Real-time Pedestrian Detection Approach with an Efficient Data Communication Bandwidth Strategy. | 0 | 0.34 | 2018 |
SybilTrap: A graph-based semi-supervised Sybil defense scheme for online social networks. | 6 | 0.52 | 2018 |
Towards Secure Infrastructure-based Cooperative Adaptive Cruise Control. | 0 | 0.34 | 2018 |
Sybil Defense Techniques in Online Social Networks: A Survey. | 10 | 0.47 | 2017 |
FairPlay: Fraud and Malware Detection in Google Play. | 8 | 0.51 | 2017 |
Lessons Learned from the Real-World Deployment of a Connected Vehicle Testbed: | 1 | 0.37 | 2017 |
A shallow water model for computing water level due to tide and surge along the coast of Bangladesh using nested numerical schemes. | 0 | 0.34 | 2017 |
Smart Health Solution Integrating IoT and Cloud: A Case Study of Voice Pathology Monitoring. | 22 | 0.88 | 2017 |
Stateless Puzzles for Real Time Online Fraud Preemption. | 1 | 0.34 | 2017 |
Comparative analysis of amino acid composition in the active site of nirk gene encoding copper-containing nitrite reductase (CuNiR) in bacterial spp. | 0 | 0.34 | 2017 |
Search Rank Fraud and Malware Detection in Google Play. | 6 | 0.53 | 2017 |
A Longitudinal Study of Google Play | 2 | 0.35 | 2017 |
Privacy-Preserving Data Communication Through Secure Multi-Party Computation in Healthcare Sensor Cloud. | 3 | 0.38 | 2017 |
GeoPal: Friend Spam Detection in Social Networks Using Private Location Proofs | 0 | 0.34 | 2016 |
QoS and trust-aware coalition formation game in data-intensive cloud federations | 8 | 0.48 | 2016 |
Integration of Structural Health Monitoring and Intelligent Transportation Systems for Bridge Condition Assessment: Current Status and Future Direction. | 3 | 0.40 | 2016 |
Performance of bridging in cognitive wireless personal area networks | 2 | 0.40 | 2015 |
A Multistage Credibility Analysis Model for Microblogs. | 5 | 0.44 | 2015 |
PKE-AET: Public Key Encryption with Authorized Equality Test. | 3 | 0.43 | 2015 |
Improving the Efficacy of Car-Following Models With a New Stochastic Parameter Estimation and Calibration Method | 3 | 0.68 | 2015 |
Security, privacy, and applications in mobile healthcare | 1 | 0.36 | 2015 |
Large-Scale Mangrove Canopy Height Map Generation From Tandem-X Data By Means Of Pol-Insar Techniques | 0 | 0.34 | 2015 |
Spectrum and energy aware multipath routing for cognitive radio ad hoc networks | 0 | 0.34 | 2014 |
Review of Microscopic Lane-Changing Models and Future Research Opportunities | 16 | 1.50 | 2013 |
Legal Knowledge Framework for Identifying Water, Energy, Food and Climate Nexus. | 0 | 0.34 | 2013 |
An Efficient Approach towards Mitigating Soft Errors Risks | 0 | 0.34 | 2011 |
Cache-Oblivious Scanline Algorithm Design | 0 | 0.34 | 2007 |
A fast two-grid and finite section method for a class of integral equations on the real line with application to an acoustic scattering problem in the half-plane | 5 | 1.46 | 2002 |
The suitability of the Java language for computer-graphics and visualisation research | 0 | 0.34 | 2002 |