iCIS - Intelligent Computing in the Internet of Services
Conference
In Proc. of 10th Int. Conf. on Cyber Warfare and Security (ICCWS-2015). ISBN: 978-1-910309-98-8 ISSN: 2048-9897, March 2015
Cited by
Year 2020 : 2 citations
M. Bahrami, M. Fotuhi-Firuzabad and H. Farzin, "Reliability Evaluation of Power Grids Considering Integrity Attacks Against Substation Protective IEDs," in IEEE Transactions on Industrial Informatics, vol. 16, no. 2, pp. 1035-1044, Feb. 2020.
doi: 10.1109/TII.2019.2926557
Z. Han, X. Li, G. Xu, N. Xiong, E. Merlo and E. Stroulia, "An Effective Evolutionary Analysis Scheme for Industrial Software Access Control Models," in IEEE Transactions on Industrial Informatics, vol. 16, no. 2, pp. 1024-1034, Feb. 2020.
doi: 10.1109/TII.2019.2925422
Year 2019 : 1 citations
Veeramany A, Hutton WJ, III, Sridhar S, Gourisetti S, Coles G, Skare P. A Framework for Development of Risk-Informed Autonomous Adaptive Cyber Controller. ASME. J. Comput. Inf. Sci. Eng. 2019;():1-31. DOI:10.1115/1.4043040
Year 2017 : 3 citations
Sandeep Sekharan, S & Kandasamy, Kamalanathan. (2017). Profiling SIEM tools and correlation engines for security analytics. in Proc of Conference: 2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), 717-721. DOI: 10.1109/WiSPNET.2017.8299855.
VICTOR W. GITUKU, "A LOW COST SYSTEM FOR LOGON ANOMALY DETECTION BASED ON TIME AND LOCATION OF USERS ", MSc Thesis, UNITED STATES INTERNATIONAL UNIVERSITY - AFRICA, summer 2017. Available at: http://usiuservicedesk.usiu.ac.ke/bitstream/handle/11732/3533/VICTOR W GITUKU MSC 2017.pdf?sequence=1&isAllowed=y
Steinegger, RH, Hintz, N., Hippchen, B., Binder, G., Roeser, F., & Abeck, S. (2016, April). Log analysis with open source tools. In software technologies and processes: open source software in the industry, SMEs and the university environment 5. Conference STEP, 3.5. 2016 Furtwangen (p. 7). Walter de Gruyter GmbH & Co KG.
C. Suh-Lee, Ju-Yeon Jo and Yoohwan Kim, "Text mining for security threat detection discovering hidden information in unstructured log messages," 2016 IEEE Conference on Communications and Network Security (CNS), Philadelphia, PA, 2016, pp. 252-260. doi: 10.1109/CNS.2016.7860492
Underwood, M. (2016) Big Data Complex Event Processing for Internet of Things Provenance: Benefits for Audit, Forensics, and Safety, in Cyber-Assurance for the Internet of Things (ed T. T. Brooks), John Wiley & Sons, Inc., Hoboken, NJ, USA. doi: 10.1002/9781119193784.ch8
A. Awad, S. Kadry, B. Lee, G. Maddodi and E. O'Meara, "Integrity Assurance in the Cloud by Combined PBA and Provenance," 2016 10th International Conference on Next Generation Mobile Applications, Security and Technologies (NGMAST), Cardiff, UK, 2016, pp. 127-132.doi: 10.1109/NGMAST.2016.15
Year 2015 : 1 citations
Gianfranco Cerullo, Luigi Coppolino, Salvatore D’Antonio, Valerio Formicola, Gaetano Papale, Bruno Ragucci, “Enabling Convergence of Physical and Logical Security Through Intelligent Event Correlation“, in Proc. of the 9th Int. Symposium on Intelligent Distributed Computing – IDC'2015, Guimarães, Portugal, October 2015, Springer Studies in Computational Intelligence V. 616, pp 427-437, October 2015. DOI: 10.1007/978-3-319-25017-5_40.