UM

Browse/Search Results:  1-10 of 12 Help

Selected(0)Clear Items/Page:    Sort:
Medical cyber-physical systems: A survey Journal article
JOURNAL OF MEDICAL SYSTEMS, 2018,Volume: 42,Issue: 4
Authors:  Dey, Nilanjan;  Ashour, Amira S.;  Shi, Fuqian;  Fong, Simon James;  Tavares, Joao Manuel R. S.
Favorite  |  View/Download:2/0  |  Submit date:2018/10/30
Networked medical device systems  Wireless sensor networks  Medical internet of things  Body area networks  Security assurance  Patient monitoring  
A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications Journal article
IEEE INTERNET OF THINGS JOURNAL, 2017,Volume: 4,Issue: 5,Page: 1125-1142
Authors:  Lin, Jie;  Yu, Wei;  Zhang, Nan;  Yang, Xinyu;  Zhang, Hanlin;  Zhao, Wei
Favorite  |  View/Download:2/0  |  Submit date:2018/10/30
Applications  enabling technologies  fog/edge computing  Internet of Things (IoT)  security and privacy  
Privacy-Preserving Image Denoising From External Cloud Databases Journal article
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017,Volume: 12,Issue: 6,Page: 1285-1298
Authors:  Zheng, Yifeng;  Cui, Helei;  Wang, Cong;  Zhou, Jiantao
Favorite  |  View/Download:2/0  |  Submit date:2018/10/30
Image denoising  external database  cloud computing  security  privacy  
DeMalC: A Feature-rich Machine Learning Framework for Malicious Call Detection Conference paper
Authors:  Li, Yuhong;  Hou, Dongmei;  Pan, Aimin;  Gong, Zhiguo;  Assoc Comp Machinery
Favorite  |  View/Download:0/0  |  Submit date:2018/10/30
Data Mining for Social Security  Malicious Call Detection  Anti-fraud APP  
Security Evaluation of the Cyber Networks Under Advanced Persistent Threats Journal article
IEEE ACCESS, 2017,Volume: 5,Page: 20111-20123
Authors:  Yang, Lu-Xing;  Li, Pengdeng;  Yang, Xiaofan;  Tang, Yuan Yan
Favorite  |  View/Download:1/0  |  Submit date:2018/10/30
Cyberspace  security  measurement  nonlinear dynamical systems  stability  
A new 1D chaotic system for image encryption Journal article
Signal Processing, 2014,Volume: 97,Page: 172
Authors:  Zhou Y.;  Bao L.;  Chen C.L.P.
Favorite  |  View/Download:2/0  |  Submit date:2018/10/30
Chaotic system  Chosen-plaintext attack  Image encryption  Security analysis  
On false data-injection attacks against power system state estimation: Modeling and countermeasures Journal article
IEEE Transactions on Parallel and Distributed Systems, 2014,Volume: 25,Issue: 3,Page: 717
Authors:  Yang Q.;  Yang J.;  Yu W.;  An D.;  Zhang N.;  Zhao W.
Favorite  |  View/Download:0/0  |  Submit date:2018/10/30
cyber security  Cyber-physical systems  power grid  state estimation  
Image encryption using binary bitplane Journal article
Signal Processing, 2014,Volume: 100,Page: 197
Authors:  Zhou Y.;  Cao W.;  Philip Chen C.L.
Favorite  |  View/Download:0/0  |  Submit date:2018/10/30
Bit-level permutation  Bitplane decomposition  Image encryption  Security analysis  
SCADA communication and security issues Journal article
Security and Communication Networks, 2014,Volume: 7,Issue: 1,Page: 175
Authors:  Gao J.;  Liu J.;  Rajan B.;  Nori R.;  Fu B.;  Xiao Y.;  Liang W.;  Philip Chen C.L.
Favorite  |  View/Download:0/0  |  Submit date:2018/10/30
Communication  SCADA  Security  Smart grid  
Leader-member exchange, organizational identification, and job satisfaction: A social identity perspective Journal article
Journal of Occupational and Organizational Psychology, 2014,Volume: 87,Issue: 1,Page: 42
Authors:  Loi R.;  Chan K.W.;  Lam L.W.
Favorite  |  View/Download:0/0  |  Submit date:2018/10/30
Job satisfaction  Job security  Leader-member exchange  Organizational identification  Social identity theory