13,798 Hits in 7.9 sec

Guest Editors' Introduction to the Joint Special Section on Secure and Emerging Collaborative Computing and Intelligent Systems

Yuan Hong, Valerie Issarny, Surya Nepal, Mudhakar Srivatsa
2021 IEEE Transactions on Emerging Topics in Computing  
This joint special section of IEEE Transactions on Emerging Topics in Computing (TETC) and IEEE Transactions on Dependable and Secure Computing (TDSC) focuses on the security, privacy and trust of the  ...  It includes 11 high quality peer-reviewed papers (3 articles in TETC and 8 articles in TDSC) on various emerging topics: cryptographic protocol, differential privacy, blockchain security, cloud security  ...  This joint special section of IEEE Transactions on Emerging Topics in Computing (TETC) and IEEE Transactions on Dependable and Secure Computing (TDSC) focuses on the security, privacy and trust of the  ... 
doi:10.1109/tetc.2021.3076338 fatcat:zajlttxulzbi3n7gzkkpra5z6e

A Survey of Intrusion Detection System Using Case Study Kuwait Governments Entities

Khalid Abdulkareem Al-Enezi, Imad Fakhri Al-Shaikhli, Abdul Rahman Al-Kandari, Lulwa Ziad Al-Tayyar
2014 2014 3rd International Conference on Advanced Computer Science Applications and Technologies  
In this paper found that the information security and especially the intrusion detection system in Kuwait government needs to be Advanced  ...  ISSN 2250 -3153 IEEE and Sensor and Ad Hoc Comm. and Networks (SECON), 2006. (8) >>>CLICK HERE<<< paper we focus on surveying heterogeneous intrusion detection systems used in MANET intrusion detection  ...  This paper presents an overview of intrusion detection system and a hybrid technique for Systems, Man and Cybernetics, IEEE Transactions on, 20(2):339-346, 1990.  ... 
doi:10.1109/acsat.2014.14 fatcat:km3oztnojjccdjm355yfmr3zea

Secure two-party k-means clustering

Paul Bunn, Rafail Ostrovsky
2007 Proceedings of the 14th ACM conference on Computer and communications security - CCS '07  
Dependable and Secure Computing, page(s): 2 -19 Volume : 2 , Issue:1 Jan.- March 2005 Imran, S. , Hyder, I. , Security Issues in Databases, Future Information Technology and Management Engineering,  ...  Qing Zhao,Shihong Qin, "Study on Security of Web-based Database" . 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial 902-905 Siva Kilaru Paper-1 (Kruskal's Algorithm  ... 
doi:10.1145/1315245.1315306 dblp:conf/ccs/BunnO07 fatcat:hv3vdom7kfhp7llmhvsvmdierm

Thank-you State of the Journal Editorial by the 2019 Outgoing (Acting) Editor-in-Chief

Paolo Montuschi
2020 IEEE Transactions on Emerging Topics in Computing  
Section on Assistive Computing Technologies for Human Well-Being Special Section on Scalable Computing for Blockchain Systems Joint Special Section (with the IEEE Transactions on Dependable and Secure  ...  /paolo.montuschi/ Digital Object Identifier 10.1109/TETC.2020.2964356 VOLUME 8, NO. 1, JAN-MAR. 2020 2168-6750 ß 2020 IEEE.  ... 
doi:10.1109/tetc.2020.2964356 fatcat:zjdkvbfp2bgzdggi2eeeto7dfe

Using error-correcting dependencies for collaborative filtering

Galina Bogdanova, Tsvetanka Georgieva
2008 Data & Knowledge Engineering  
., Ternary schedules for energylimited sensor networks (2007) IEEE Transactions on Information Theory, 53 (8), pp. 2791-2798. 29.  ...  Ding, Y., A construction for constant-composition codes, (2008) IEEE Transactions on Information Theory, 54 (8), pp. 3738-3741. 34.  ... 
doi:10.1016/j.datak.2008.04.008 fatcat:xkgdz76effgp3lsjzeftlebspy

A Probabilistic Model to Predict the Survivability of SCADA Systems

Carlos Queiroz, Abdun Mahmood, Zahir Tari
2013 IEEE Transactions on Industrial Informatics  
IEICE Transactions on Information Systems, Volume E-82-D, Number 1, 1999, pp. 208-223. (not ranked) 65. A. Zaslavsky and Z. Tari: Mobile computing: Overview and Current Status.  ...  Tari, and P. Bertok: Similarity-Based SOAP Multicast Protocol to Reduce Bandwidth and Latency in Web Services. IEEE Transactions on Services Computing (TSC), 1(2):88-103, April-June 2008.  ... 
doi:10.1109/tii.2012.2231419 fatcat:cs7ms5xezbfb3geehouh4l7kgu

Guest Editorial: IEEE Transactions on Emerging Topics in Computing Special Issue on Design & Technology of Integrated Systems in Deep Submicron Era

Giorgio Di Natale, Marco Ottavi
2018 IEEE Transactions on Emerging Topics in Computing  
He is an associate editor of the IEEE Transaction on Emerging Topics in Computing and a senior member of the IEEE. VOLUME 6, NO. 2, APRIL-JUNE 2018 6750 ß 2018 IEEE.  ...  Fabrizio Lombardi, Editor-in-Chief of these IEEE Transactions on Emerging Topics in Computing, for making this special issue possible.  ... 
doi:10.1109/tetc.2018.2802788 fatcat:l65j62jdnff7nhz2wszww3i62q

References [chapter]

2004 PACS and Imaging Informatics  
"Fault-tolerant system dependability-explicit modeling of hardware and software component-interactions" IEEE Transactions on Reliability, Vol. 49 Issue: 4, pp. 363-376, Dec. 2000.  ...  "Rigorous development of an embedded fault-tolerant system based on coordinated atomic actions" IEEE Transactions on Computers, Vol. 51 Issue: 2, pp. 164-179 & pp. 402-409, Feb. 2002.  ... 
doi:10.1002/0471654787.refs fatcat:rscdr4npqja53gqswxmogath7e

Provable, Reliable and Secure Data aggregation through integrated distributed mechanism in IoT based WSN environment

Mr. Bharat Kumara*, Dr S Anantha Padmanabhan**
2021 Zenodo  
Moreover, few major application includes agriculture, healthcare, military services and so on.  ...  Hence, in this research work we design and develop Integrated Mechanism; the main aim of this mechanism is to provide provable, reliable and secure data aggregation.  ...  Guo, “Privacy-preserving data aggregation computing in cyber-physical social systems”, ACM Transactions on Cyber Physical Systems, vol.3, no.1, Article 8, 2018. 23. J. Wang, H. Zhang, Z.  ... 
doi:10.5281/zenodo.5803279 fatcat:pihjlxajlfhtvggxrqrx63bfda

A study on Time Sensitive Data Access Control

Dr Piyush Kumar Pareek, Chaitra Y R, Saumya L
2021 Zenodo  
The guarantee is rendered on high modern cryptography basis, with strong security emphasis, so that fine-grained knowledge gets to every business, and they don't have to get intense coordination for precision  ...  To properly protect stored private data, the device proprietor will exchange private data with a chosen few and issue decipherment keys to them.  ...  Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE transactions on parallel and distributed systems, 24(1), 131-143.  ... 
doi:10.5281/zenodo.4482432 fatcat:di5gvx7s5nadbpgkdmvstqsvlm

Stochastic Neural Networks For Cryptocurrency Price Prediction

Patel Jay, Vasu Kalariya, Pushpendra Parmar, Sudeep Tanwar, Neeraj Kumar, Mamoun Alazab
2020 IEEE Access  
We trained the Multi-Layer Perceptron (MLP) and Long Short-Term Memory (LSTM) models for Bitcoin, Ethereum, and Litecoin.  ...  The proposed approach is based on the random walk theory, which is widely used in financial markets for modeling stock prices.  ...  TRANSACTIONS ON BIG DATA, the IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, Computers & Security, and Future Generation Computing Systems.  ... 
doi:10.1109/access.2020.2990659 fatcat:2egmzswpzrbstn6glkur4lir7u

Electronic Payment Schemes Based on Blockchain in VANETs

Xinyang Deng, Tianhan Gao
2020 IEEE Access  
His primary research interests are next generation network security, wireless mesh network security, security and privacy in ubiquitous computing, as well as virtual reality.  ...  uint Xinyang Deng et al.: Electronic Payment Schemes Based on Blockchain in VANETs VOLUME 4, 2016 VOLUME 4, 2016 VOLUME 4, 2016 VOLUME 4, 2016  ... 
doi:10.1109/access.2020.2974964 fatcat:fz63womg3fcipm3ksgpyddynru

IEEE Access Special Section Editorial: Artificial Intelligence in Cybersecurity

Chi-Yuan Chen, Wei Quan, Nan Cheng, Shui Yu, Jong-Hyouk Lee, Gregorio Martínez Pérez, Hongke Zhang, Shiuhpyng Shieh
2020 IEEE Access  
and the IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING.  ...  Security (AsiaCCS), the Steering Committee Chair of the IEEE Conference on Dependable and Secure Computing, and the Program Chair of the IEEE Conference on Security and Reliability.  ... 
doi:10.1109/access.2020.3021604 dblp:journals/access/ChenQCYLPZS20 fatcat:mjvkkgt3wjfo3ditb4eibdc3s4

Secure Wireless Communication Protocol: To Avoid Vulnerabilities in Shared Authentication

Varun Shukla, Atul Chaturvedi, Neelam Srivastava
2017 Communications on Applied Electronics  
It can be shown that MITM (Man in the middle attack) based on dictionary attack can be launched very easily and the security of entire network goes down.  ...  Whenever we consider router or access point for communication, in many cases, they are based on passphrase based security.  ...  [11] W.Diffie, M.Hellman, New directions in cryptography, IEEE transactions on information theory, volume 22, issue 6, 644-654.  ... 
doi:10.5120/cae2017652680 fatcat:ffmahtcvkba4jje4guqgvtb5gu


Manase Prabu. F, Senthilkumar. R
Web of Science, Scopus, and IEEE Xplore.The study reveals that the publications productivity of the outcome of Computer Society Transactions on IEEE has obtained optimum level with 29258 publications from  ...  of source-wise distribution of Computer Society Transactions on IEEE research output bring out the facts that the journal articles' has constituted 27389 (94%) of the total document's Source.  ...  of the Transactions 1 IEEE Transactions on Computers 55 64 71 153 175 146 118 148 109 1105 3.77 3 IEEE Transactions on Dependable and Secure Computing 26 20 28 34 70 73 30 48 54 57 440 1.50 4 IEEE Transactions  ... 
doi:10.36106/paripex/7408276 fatcat:6ssaxdquqbgqdixtvlwpklyqa4
« Previous Showing results 1 — 15 out of 13,798 results