UM

Browse/Search Results:  1-10 of 52 Help

Selected(0)Clear Items/Page:    Sort:
Medical cyber-physical systems: A survey Journal article
JOURNAL OF MEDICAL SYSTEMS, 2018,Volume: 42,Issue: 4
Authors:  Dey, Nilanjan;  Ashour, Amira S.;  Shi, Fuqian;  Fong, Simon James;  Tavares, Joao Manuel R. S.
Favorite  |  View/Download:5/0  |  Submit date:2018/10/30
Networked medical device systems  Wireless sensor networks  Medical internet of things  Body area networks  Security assurance  Patient monitoring  
Human body and face detection based anti-shoulder attack system on atm Conference paper
ACM International Conference Proceeding Series
Authors:  Li C.;  Liang M.;  Xiao K.;  Fong S.;  Wang Q.;  Song W.
Favorite  |  View/Download:0/0  |  Submit date:2019/02/13
ATM security  Face detection  Human body detection  
General precautions against security threats for computer networks in SMEs: From the perspective of big data and IOT Conference paper
ACM International Conference Proceeding Series
Authors:  Wu Y.;  Fong S.;  Zhuang Y.
Favorite  |  View/Download:1/0  |  Submit date:2019/02/13
Computer network security  Security threats  SME  
Big data mining algorithms for fog computing Conference paper
ACM International Conference Proceeding Series
Authors:  Fong S.
Favorite  |  View/Download:1/0  |  Submit date:2019/02/13
Computer network security  Security threats  SME  
DeMalC: A feature-rich machine learning framework for malicious call detection Conference paper
International Conference on Information and Knowledge Management, Proceedings
Authors:  Li Y.;  Hou D.;  Pan A.;  Gong Z.
Favorite  |  View/Download:0/0  |  Submit date:2019/02/12
Antifraud APP  Data mining for social security  Malicious call detection  
Fog-based evaluation approach for trustworthy communication in sensor-cloud system Journal article
IEEE Communications Letters, 2017,Volume: 21,Issue: 11,Page: 2532-2535
Authors:  Wang T.;  Li Y.;  Chen Y.;  Tian H.;  Cai Y.;  Jia W.;  Wang B.
Favorite  |  View/Download:0/0  |  Submit date:2019/02/11
least squares  multiple linear regression  security  Sensor-cloud system  trust  
A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications Journal article
IEEE INTERNET OF THINGS JOURNAL, 2017,Volume: 4,Issue: 5,Page: 1125-1142
Authors:  Lin, Jie;  Yu, Wei;  Zhang, Nan;  Yang, Xinyu;  Zhang, Hanlin;  Zhao, Wei
Favorite  |  View/Download:5/0  |  Submit date:2018/10/30
Applications  enabling technologies  fog/edge computing  Internet of Things (IoT)  security and privacy  
Security Evaluation of the Cyber Networks under Advanced Persistent Threats Journal article
IEEE Access, 2017,Volume: 5,Page: 20111-20123
Authors:  Yang L.-X.;  Li P.;  Yang X.;  Tang Y.Y.
Favorite  |  View/Download:0/0  |  Submit date:2019/02/11
Cyberspace  measurement  nonlinear dynamical systems  security  stability  
Privacy-Preserving Image Denoising from External Cloud Databases Journal article
IEEE Transactions on Information Forensics and Security, 2017,Volume: 12,Issue: 6,Page: 1285-1298
Authors:  Zheng Y.;  Cui H.;  Wang C.;  Zhou J.
Favorite  |  View/Download:0/0  |  Submit date:2018/12/22
cloud computing  external database  Image denoising  privacy  security  
Privacy-Preserving Image Denoising From External Cloud Databases Journal article
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017,Volume: 12,Issue: 6,Page: 1285-1298
Authors:  Zheng, Yifeng;  Cui, Helei;  Wang, Cong;  Zhou, Jiantao
Favorite  |  View/Download:4/0  |  Submit date:2018/10/30
Image denoising  external database  cloud computing  security  privacy