FedMCCS: Multicriteria Client Selection Model for Optimal IoT Federated Learning | 8 | 0.47 | 2021 |
A Survey on Federated Learning: The Journey From Centralized to Distributed On-Site Learning and Beyond | 15 | 0.71 | 2021 |
Multi-Persona Mobility: Joint Cost-Effective and Resource-Aware Mobile-Edge Computation Offloading | 3 | 0.36 | 2021 |
Internet of Things Intrusion Detection: Centralized, On-Device, or Federated Learning? | 11 | 0.55 | 2020 |
LCA-ABE: Lightweight Context-Aware Encryption for Android Applications | 0 | 0.34 | 2020 |
ITADP: An inter-tenant attack detection and prevention framework for multi-tenant SaaS | 0 | 0.34 | 2019 |
Machine Learning-Based EDoS Attack Detection Technique Using Execution Trace Analysis. | 0 | 0.34 | 2019 |
Proactive machine learning-based solution for advanced manageability of multi-persona mobile computing. | 0 | 0.34 | 2019 |
Selective Mobile Cloud Offloading to Augment Multi-Persona Performance and Viability | 2 | 0.35 | 2019 |
A Novel Ad-Hoc Mobile Edge Cloud Offering Security Services Through Intelligent Resource-Aware Offloading | 1 | 0.35 | 2019 |
Multi-tenant intrusion detection system for public cloud (MTIDS). | 1 | 0.35 | 2018 |
Security as a Service for Public Cloud Tenants(SaaS). | 0 | 0.34 | 2018 |
Combining heterogeneous anomaly detectors for improved software security. | 3 | 0.38 | 2018 |
Smart mobile computation offloading: Centralized selective and multi-objective approach. | 1 | 0.34 | 2017 |
Attribute-Based Encryption for Preserving Smart Home Data Privacy. | 0 | 0.34 | 2017 |
SQLIIDaaS: A SQL Injection Intrusion Detection Framework as a Service for SaaS Providers | 0 | 0.34 | 2017 |
An anomaly detection system based on variable N-gram features and one-class SVM. | 11 | 0.57 | 2017 |
Network Function Virtualization as a Service for multi-tenant software defined networks | 0 | 0.34 | 2017 |
Generative versus discriminative classifiers for android anomaly-based detection system using system calls filtering and abstraction process. | 2 | 0.36 | 2016 |
Towards ad-hoc cloud based approach for mobile intrusion detection | 0 | 0.34 | 2016 |
From model-driven specification to design-level set-based analysis of XACML policies. | 2 | 0.42 | 2016 |
On the Use of Mobile GPU for Accelerating Malware Detection Using Trace Analysis | 0 | 0.34 | 2015 |
Towards flexible, scalable and autonomic virtual tenant slices | 1 | 0.35 | 2015 |
AOMD approach for context-adaptable and conflict-free Web services composition. | 6 | 0.43 | 2015 |
Enhancing malware detection for Android systems using a system call filtering and abstraction process. | 2 | 0.64 | 2015 |
Towards an offloading approach that augments multi-persona performance and viability | 1 | 0.35 | 2015 |
CaptureMe: Attacking the User Credential in Mobile Banking Applications | 0 | 0.34 | 2015 |
Optimal Placement Of Sequentially Ordered Virtual Security Appliances In The Cloud | 3 | 0.39 | 2015 |
On-device anomaly detection for resource-limited systems | 2 | 0.40 | 2015 |
Securing Business Data on Android Smartphones. | 1 | 0.37 | 2014 |
Impact of Dataset Representation on Smartphone Malware Detection Performance. | 1 | 0.35 | 2013 |
Towards a BPEL model-driven approach for Web services security | 6 | 0.43 | 2012 |
Performance Evaluation of Multi-pattern Matching Algorithms on Smartphone | 2 | 0.42 | 2012 |
Smartphone malware detection: From a survey towards taxonomy | 12 | 0.55 | 2012 |
Aspect-Oriented Modeling for Representing and Integrating Security Concerns in UML | 12 | 0.56 | 2010 |
Weaving security aspects into UML 2.0 design models | 8 | 0.75 | 2009 |
An Aspect-Oriented Approach for Software Security Hardening: from Design to Implementation | 2 | 0.36 | 2009 |
Usability of Security Specification Approaches for UML Design: A Survey | 0 | 0.34 | 2009 |
Automated Windows Memory File Extraction for Cyber Forensics Investigation | 1 | 0.42 | 2008 |
Execution monitoring enforcement under memory-limitation constraints | 26 | 1.08 | 2008 |
Common Criteria Approach to J2ME CLDC Security Requirements | 0 | 0.34 | 2006 |
Security Evaluation Of J2me Cldc Embedded Java Platform | 11 | 2.26 | 2006 |
Execution monitoring enforcement for limited-memory systems | 5 | 0.42 | 2006 |
E-Bunny: A Dynamic Compiler For Embedded Java Virtual Machines | 5 | 0.70 | 2005 |
Java for Mobile Devices: A Security Study | 7 | 0.78 | 2005 |
Security Analysis of Wireless Java | 1 | 0.51 | 2005 |
Security Analysis of Mobile Java | 6 | 0.79 | 2005 |
A dynamic compiler for embedded Java virtual machines | 7 | 0.62 | 2004 |
a synergy between efficient interpretation and fast selective dynamic compilation for the acceleration of embedded Java virtual machines | 4 | 0.44 | 2004 |