Are Smart Home Devices Abandoning IPV Victims? | 0 | 0.34 | 2020 |
Active Authentication using File System Decoys and User Behavior Modeling: Results of a Large Scale Study | 0 | 0.34 | 2019 |
Gaussian Process-Based Dimension Reduction for Goal-Oriented Sequential Design | 0 | 0.34 | 2019 |
(M, K)-Firm Constraints And Derived Data Management For The Qos Enhancement In Distributed Real-Time Dbms | 0 | 0.34 | 2019 |
Sentinel: Secure Mode Profiling and Enforcement for Embedded Systems | 0 | 0.34 | 2018 |
Modeling Cost of Countermeasures in Software Defined Networking-enabled Energy Delivery Systems. | 0 | 0.34 | 2018 |
Self-Healing Cyber Resilient Framework For Software Defined Networking-Enabled Energy Delivery System | 0 | 0.34 | 2018 |
A Novel Architecture for Automatic Document Classification for Effective Security in Edge Computing Environments | 1 | 0.35 | 2018 |
A Validation Approach For Ontology-Based Real-Time Dbms | 0 | 0.34 | 2018 |
A feedback control scheduling architecture for real-time ontology | 0 | 0.34 | 2017 |
Universal Prediction Distribution for Surrogate Models | 1 | 0.37 | 2017 |
You Are What You Use: An Initial Study of Authenticating Mobile Users via Application Usage | 1 | 0.35 | 2016 |
Orchestration of software-defined security services | 1 | 0.35 | 2016 |
Enabling New Technologies for Cyber Security Defense with the ICAS Cyber Security Ontology. | 2 | 0.40 | 2015 |
Applicability of the Imprecise Computation Approach for the QoS Enhancement in Distributed RTDBMS. | 0 | 0.34 | 2014 |
Applicability of the (m,k)-firm Approach for the QoS Enhancement in Distributed RTDBMS | 0 | 0.34 | 2013 |
System Level User Behavior Biometrics using Fisher Features and Gaussian Mixture Models | 14 | 0.63 | 2013 |
Management of the real-time derived data in a Distributed Real-Time DBMS using the semi-total replication data | 0 | 0.34 | 2013 |
Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud | 55 | 1.86 | 2012 |
Combining Baiting and User Search Profiling Techniques for Masquerade Detection. | 4 | 0.81 | 2012 |
A comparison of one-class bag-of-words user behavior modeling techniques for masquerade detection | 2 | 0.39 | 2012 |
Decoy document deployment for effective masquerade attack detection | 24 | 1.52 | 2011 |
On the design and execution of cyber-security user studies: methodology, challenges, and lessons learned | 2 | 0.38 | 2011 |
Cloud Computing. | 0 | 0.34 | 2011 |
Modeling user search behavior for masquerade detection | 38 | 1.95 | 2011 |
Detecting Masqueraders: A Comparison of One-Class Bag-of-Words User Behavior Modeling Techniques. | 12 | 0.84 | 2010 |
Designing Host and Network Sensors to Mitigate the Insider Threat | 28 | 1.61 | 2009 |