UM

Browse/Search Results:  1-10 of 16 Help

Selected(0)Clear Items/Page:    Sort:
General precautions against security threats for computer networks in SMEs: From the perspective of big data and IOT Conference paper
ACM International Conference Proceeding Series
Authors:  Wu Y.;  Fong S.;  Zhuang Y.
Favorite | View/Download:6/0 | TC[WOS]:0 TC[Scopus]:0 | Submit date:2019/02/13
Computer network security  Security threats  SME  
Big data mining algorithms for fog computing Conference paper
ACM International Conference Proceeding Series
Authors:  Fong S.
Favorite | View/Download:7/0 | TC[WOS]:1 TC[Scopus]:0 | Submit date:2019/02/13
Computer network security  Security threats  SME  
Security Evaluation of the Cyber Networks Under Advanced Persistent Threats Journal article
IEEE Access, 2017,Volume: 5,Page: 20111-20123
Authors:  Yang, Lu-Xing;  Li, Pengdeng;  Yang, Xiaofan;  Tang, Yuan Yan
Favorite | View/Download:18/0 | TC[WOS]:22 TC[Scopus]:0 | Submit date:2018/10/30
Cyberspace  Security  Measurement  Nonlinear Dynamical Systems  Stability  
Millimeter-Wave Secrecy Beamforming Designs for Two-Way Amplify-and-Forward MIMO Relaying Networks Journal article
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2017,Volume: 66,Issue: 3,Page: 2059-2071
Authors:  Gong, Shiqi;  Xing, Chengwen;  Fei, Zesong;  Ma, Shaodan
Favorite | View/Download:22/0 | TC[WOS]:33 TC[Scopus]:0 | Submit date:2018/10/30
Convex Optimization  Millimeter-wave (Mmwave) Communications  Secrecy Beamforming  Two-way Multiple-input Multiple-output (Mimo) Relaying Networks  
Anxiety about internet hacking: Results from a community sample Journal article
Computers in Human Behavior, 2016,Volume: 54,Page: 180-185
Authors:  Elhai,Jon D.;  Hall,Brian J.
Favorite | View/Download:5/0 | TC[WOS]:18 TC[Scopus]:0 | Submit date:2019/07/12
Anxiety  Electronic communication  Information technology  Privacy  Psychological stress  Social media  
A Critical Review of Security Threats in Cloud Computing Conference paper
Proceedings - 2015 3rd International Symposium on Computational and Business Intelligence, ISCBI 2015, Bali, Indonesia, 7-9 Dec. 2015
Authors:  Mahroosh Irfan;  Muhammad Usman;  Yan Zhuang;  Simon Fong
Favorite | View/Download:10/0 | TC[WOS]:4 TC[Scopus]:0 | Submit date:2019/02/13
Cloud Computing  Cloud Security  Deployment Models  Service Models  Threats  
A Modular Approach for Implementation of Honeypots in Cyber Security Journal article
International Journal of Applied Engineering Research, 2016,Volume: 11,Issue: 8,Page: 5446-5451
Authors:  Muneeb Mirza;  Muhammad Usman;  Robert P. Biuk-Aghai;  Simon Fong
Favorite | View/Download:25/0 | TC[WOS]:0 TC[Scopus]:0 | Submit date:2019/02/13
Antimalware  Antivirus  Cyber Security  Honeypots  Intrusion Detection System  Network Security  Signature  
Anxiety about internet hacking: Results from a community sample Journal article
Computers in Human Behavior, 2015,Volume: 54,Page: 180-185
Authors:  Elhai,Jon D.;  Hall,Brian J.
Favorite | View/Download:11/0 | TC[WOS]:18 TC[Scopus]:0 | Submit date:2019/06/25
Anxiety  Electronic Communication  Information Technology  Privacy  Psychological Stress  Social Media  
On false data-injection attacks against power system state estimation: Modeling and countermeasures Journal article
IEEE Transactions on Parallel and Distributed Systems, 2014,Volume: 25,Issue: 3,Page: 717
Authors:  Yang Q.;  Yang J.;  Yu W.;  An D.;  Zhang N.;  Zhao W.
Favorite | View/Download:6/0 | TC[WOS]:145 TC[Scopus]:0 | Submit date:2018/10/30
cyber security  Cyber-physical systems  power grid  state estimation  
Energy security: Stochastic analysis of oil prices Journal article
Lecture Notes in Energy, 2013,Volume: 16,Page: 155-178
Authors:  Skindilias, Konstantinos;  Lo, Chia Chun
Favorite | View/Download:14/0 | TC[WOS]:0 TC[Scopus]:0 | Submit date:2018/11/06