


default search action
2nd ICDIS 2019: South Padre Island, TX, USA
- 2nd International Conference on Data Intelligence and Security, ICDIS 2019, South Padre Island, TX, USA, June 28-30, 2019. IEEE 2019, ISBN 978-1-7281-2080-5

Session A
- Xinchi He, Ethan Robards, Rose F. Gamble, Mauricio Papa

:
Anomaly Detection Sensors for a Modbus-Based Oil and Gas Well-Monitoring System. 1-8 - Sanjeev Kumar, Harsh Kumar, Ganesh Reddy Gunnam

:
Security Integrity of Data Collection from Smart Electric Meter under a Cyber Attack. 9-13 - Cong Pu

, Bryan Groves:
Energy Depletion Attack in Low Power and Lossy Networks: Analysis and Defenses. 14-21
Session B
- Zachary Hill, John Hale

, Mauricio Papa
, Peter J. Hawrylak
:
Using Bro with a Simulation Model to Detect Cyber-Physical Attacks in a Nuclear Reactor. 22-27 - Leonard Renners, Felix Heine

, Carsten Kleiner
, Gabi Dreo Rodosek:
Design and Evaluation of an Approach for Feedback-Based Adaptation of Incident Prioritization. 28-35 - Hamidreza Alvari, Paulo Shakarian

:
Hawkes Process for Understanding the Influence of Pathogenic Social Media Accounts. 36-42
Session C
- Hamidreza Alvari, Soumajyoti Sarkar, Paulo Shakarian

:
Detection of Violent Extremists in Social Media. 43-47 - Umesh Timalsina

, Andy Wang:
Incentivizing Services Sharing in IoT with OSGi and HashGraph. 48-52 - Jarilyn Hernández Jiménez, Katerina Goseva-Popstojanova

:
Malware Detection Using Power Consumption and Network Traffic Data. 53-59 - Sara Mohammadi, Mauricio Papa

, Eduardo Pereyra
, Cem Sarica
:
Selection of Optimal Closure Relationships for Multiphase Flow using a Genetic Algorithm. 60-67
Session D
- Xiao Zhang, Yanqiu Wang, Qing Wang, Xiaonan Zhao:

A New Approach to Double I/O Performance for Ceph Distributed File System in Cloud Computing. 68-75 - Paul Devlin, Matt Halom, Ishfaq Ahmad:

Applying a Novel Feature Set Fusion Technique to Facial Recognition. 76-81 - Zachary Hill, John Hale

, Mauricio Papa
, Peter J. Hawrylak
:
Platform-Agnostic Language to Map Control Primitives to SCADA Communication Protocols. 82-88 - Saifullah Khalid, Ishfaq Ahmad, Khodyar Mohammad E.:

An Evolutionary Approach to Optimize Data Center Profit in Smart Grid Environment. 89-96
Session E
- Mohamed Alkalai, Wisam H. Benamer

:
Secure Exchanging of Various Data Types Used for Classification Purposes. 97-102 - Yongle Zhang

, Lin Qi, Junyu Dong, Qi Wen, Mingdong Lv:
Data Processing Based on Low-Precision IMU Equipment to Predict Wave Height and Wave Period. 103-107 - Andrew Corum, Donovan Jenkins, Jun Zheng

:
Robust PDF Malware Detection with Image Visualization and Processing Techniques. 108-114
Session F
- Liang Chen, Lingling Wu, Xuwei Li, Jin Xu:

An Immersive VR Interactive Learning System for Tenon Structure Training. 115-119 - Sultan Almakdi

, Brajendra Panda:
Secure and Efficient Query Processing Technique for Encrypted Databases in Cloud. 120-127 - Elham Shaabani, Ashkan Sadeghi-Mobarakeh, Hamidreza Alvari, Paulo Shakarian

:
An End-to-End Framework to Identify Pathogenic Social Media Accounts on Twitter. 128-135
Session G
- Lee Hinkle

, Kamrad Khoshhal, Vangelis Metsis:
Physiological Measurement for Emotion Recognition in Virtual Reality. 136-143 - Sean Elliott:

Nash Equilibrium of Multiple, Non-Uniform Bitcoin Block Withholding Attackers. 144-151 - Mahmoud K. Quweider, Bassam Arshad, Hansheng Lei, Liyu Zhang, Fitra Khan:

An Accelerated Hierarchical Approach for Object Shape Extraction and Recognition. 152-159 - Mohammad Al-Ramahi

, Ali Ahmed:
Identifying Users' Concerns in Lodging Sharing Economy Using Unsupervised Machine Learning Approach. 160-166
Session H
- Binyao Duan, Wenjian Luo, Hao Jiang, Li Ni:

Dynamic Social Networks Generator Based on Modularity: DSNG-M. 167-173 - Ming Li, Peter J. Hawrylak

, John Hale
:
Concurrency Strategies for Attack Graph Generation. 174-179 - Hatim Alsuwat, Emad Alsuwat, Tieming Geng

, Chin-Tser Huang, Csilla Farkas:
Data Dependencies Preserving Shuffle in Relational Database. 180-187 - Pinchao Liu, Adnan Maruf

, Farzana Beente Yusuf, Labiba Jahan, Hailu Xu
, Boyuan Guan, Liting Hu, S. Sitharama Iyengar
:
Towards Adaptive Replication for Hot/Cold Blocks in HDFS using MemCached. 188-194
Session J
- Yongzhong He, Liping Hu, Rui Gao:

Detection of Tor Traffic Hiding Under Obfs4 Protocol Based on Two-Level Filtering. 195-200 - Hansheng Lei, Mahmoud Quweider

, Liyu Zhang, Fitra Khan:
Mining Survey Data. 201-207
Poster Session
- Mohammad Zoynul Abedin

, Guotai Chi, Fahmida E. Moula:
Weighted SMOTE-Ensemble Algorithms: Evidence from Chinese Imbalance Credit Approval Instances. 208-211 - Maryann Njorbuenwu, Bobby Swar, Pavol Zavarsky:

A Survey on the Impacts of Quantum Computers on Information Security. 212-218 - Jonathan West

, John Hale
, Mauricio Papa
, Peter J. Hawrylak
:
Automatic Identification of Critical Digital Assets. 219-224 - Faruk Ahmed, Md. Sultan Mahmud, Mohammed Yeasin:

RNN and CNN for Way-Finding and Obstacle Avoidance for Visually Impaired. 225-228 - Aaron Barrera, Chu-Wen Cheng, Sanjeev Kumar:

Improved Mix Column Computation of Cryptographic AES. 229-232 - Joshua Bassey, Xiangfang Li, Lijun Qian:

An Experimental Study of Multi-Layer Multi-Valued Neural Network. 233-236

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














