Towards Trustworthy Cyber-Physical Production Systems: A Dynamic Agent Accountability Approach | 0 | 0.34 | 2021 |
AuthGuide: Analyzing Security, Privacy and Usability Trade-Offs in Multi-factor Authentication | 0 | 0.34 | 2021 |
On the Security of Biometrics and Fuzzy Commitment Cryptosystems: A Study on Gait Authentication | 0 | 0.34 | 2021 |
Cloud And Edge Based Data Analytics For Privacy-Preserving Multi-Modal Engagement Monitoring In The Classroom | 1 | 0.35 | 2021 |
Distributed Security Framework for Reliable Threat Intelligence Sharing | 0 | 0.34 | 2020 |
A Practical Approach for Taking Down Avalanche Botnets Under Real-World Constraints | 1 | 0.37 | 2020 |
Automated Configuration Of Nosql Performance And Scalability Tactics For Data-Intensive Applications | 0 | 0.34 | 2020 |
A Siamese Adversarial Anonymizer for Data Minimization in Biometric Applications | 0 | 0.34 | 2020 |
Resource Usage and Performance Trade-offs for Machine Learning Models in Smart Environments. | 0 | 0.34 | 2020 |
AutoAttacker: A reinforcement learning approach for black-box adversarial attacks | 0 | 0.34 | 2019 |
Detection of algorithmically generated domain names used by botnets - a dual arms race. | 3 | 0.47 | 2019 |
A Systematic Comparison of Age and Gender Prediction on IMU Sensor-Based Gait Traces. | 2 | 0.50 | 2019 |
PPG<sup>2</sup>Live: Using dual PPG for active authentication and liveness detection | 0 | 0.34 | 2019 |
Smart Cyber-Physical System Applications In Production And Logistics: Special Issue Editorial | 0 | 0.34 | 2019 |
Special Issue: Big Data for context-aware applications and intelligent environments | 0 | 0.34 | 2019 |
Towards Multi-party Policy-based Access Control in Federations of Cloud and Edge Microservices | 0 | 0.34 | 2019 |
TATIS - Trustworthy APIs for Threat Intelligence Sharing with UMA and CP-ABE. | 0 | 0.34 | 2019 |
Internet of Things for enabling smart environments: A technology-centric perspective. | 7 | 0.43 | 2019 |
Edge-Based and Privacy-Preserving Multi-Modal Monitoring of Student Engagement in Online Learning Environments | 0 | 0.34 | 2019 |
Data Privatizer for Biometric Applications and Online Identity Management. | 0 | 0.34 | 2019 |
Robust Digital Twin Compositions for Industry 4.0 Smart Manufacturing Systems | 0 | 0.34 | 2018 |
Frictionless Authentication Systems: Emerging Trends, Research Challenges and Opportunities. | 0 | 0.34 | 2018 |
Policy reconciliation for access control in dynamic cross-enterprise collaborations. | 1 | 0.36 | 2018 |
Fishy Faces: Crafting Adversarial Images to Poison Face Authentication. | 0 | 0.34 | 2018 |
Managing distributed trust relationships for multi-modal authentication. | 1 | 0.35 | 2018 |
Automated Website Fingerprinting through Deep Learning. | 18 | 0.65 | 2018 |
Fishy Faces: Crafting Adversarial Images to Poison Face Authentication. | 0 | 0.34 | 2018 |
K8-Scalar: a workbench to compare autoscalers for container-orchestrated services (Artifact). | 0 | 0.34 | 2018 |
Automated Feature Extraction for Website Fingerprinting through Deep Learning. | 1 | 0.35 | 2017 |
Quality Parameters as Modeling Language Abstractions for Context-Aware Applications: An AAL Case Study. | 0 | 0.34 | 2017 |
Identity management for cyber-physical production workflows and individualized manufacturing in industry 4.0. | 1 | 0.36 | 2017 |
Enhanced fraud detection as a service supporting merchant-specific runtime customization. | 1 | 0.35 | 2017 |
Introduction to the thematic issue on Intelligent systems, applications and environments for the industry of the future. | 0 | 0.34 | 2017 |
Trustworthy Data-Driven Networked Production For Customer-Centric Plants | 1 | 0.36 | 2017 |
QoC2 Breaker: intelligent software circuit breakers for fault-tolerant distributed context-aware applications. | 0 | 0.34 | 2017 |
The intelligent industry of the future: A survey on emerging trends, research challenges and opportunities in Industry 4.0. | 5 | 0.43 | 2017 |
Leveraging Battery Usage from Mobile Devices for Active Authentication. | 6 | 0.46 | 2017 |
Accelerometer-Based Device Fingerprinting for Multi-factor Mobile Authentication. | 5 | 0.42 | 2016 |
Systematic scalability assessment for feature oriented multi-tenant services | 3 | 0.37 | 2016 |
Feature-Based Variability Management For Scalable Enterprise Applications: Experiences With An E-Payment Case | 0 | 0.34 | 2016 |
Data Protection Compliance Regulations and Implications for Smart Factories of the Future | 0 | 0.34 | 2016 |
SAMURAI: A batch and streaming context architecture for large-scale intelligent applications and environments. | 11 | 0.58 | 2016 |
CEML: Mixing and moving complex event processing and machine learning to the edge of the network for IoT applications. | 1 | 0.35 | 2016 |
Security and privacy controls for streaming data in extended intelligent environments. | 2 | 0.36 | 2016 |
Semantic analysis and verification of context-driven adaptive applications in intelligent environments. | 4 | 0.39 | 2016 |
Privacy-enabled remote health monitoring applications for resource constrained wearable devices. | 2 | 0.35 | 2016 |
Adaptive Dissemination For Mobile Electronic Health Record Applications With Proactive Situational Awareness | 2 | 0.37 | 2016 |
SparkXS: Efficient Access Control for Intelligent and Large-Scale Streaming Data Applications | 2 | 0.37 | 2015 |
Mobile device fingerprinting considered harmful for risk-based authentication | 8 | 0.66 | 2015 |
PRISM: Policy-driven Risk-based Implicit locking for improving the Security of Mobile end-user devices. | 0 | 0.34 | 2015 |