


default search action
2nd TPS-ISA 2019: Los Angeles, CA, USA
- First IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, TPS-ISA 2019, Los Angeles, CA, USA, December 12-14, 2019. IEEE 2019, ISBN 978-1-7281-6741-1

- Mehrnoosh Shakarami, Ravi S. Sandhu:

Safety and Consistency of Mutable Attributes Using Quotas: A Formal Analysis. 1-9 - Ian Y. Garrett

, Ryan M. Gerdes:
Z Table: Cost-Optimized Attack on Reinforcement Learning. 10-17 - Anders Tungeland Gjerdrum, Håvard Dagenborg Johansen, Lars Brenna, Dag Johansen:

Diggi: A Secure Framework for Hosting Native Cloud Functions with Minimal Trust. 18-27 - Abdulrahman Alzahrani, Hani Alshahrani, Ali Alshehri

, Huirong Fu:
An Intelligent Behavior-Based Ransomware Detection System For Android Platform. 28-35 - Kuheli Sai, David Tipper

:
Disincentivizing Double Spend Attacks Across Interoperable Blockchains. 36-45 - Tyler Phillips, Xiaoyuan Yu, Brandon Haakenson, Xukai Zou:

Design and Implementation of Privacy-Preserving, Flexible and Scalable Role-Based Hierarchical Access Control. 46-55 - Kyle Haefner, Indrakshi Ray:

ComplexIoT: Behavior-Based Trust For IoT Networks. 56-65 - Jai Gopal Pandey, Chhavi Mitharwal, Abhijit Karmakar

:
An RNS Implementation of the Elliptic Curve Cryptography for IoT Security. 66-72 - Yasamin Alagrash, Nithasha Mohan, Sandhya Rani Gollapalli, Julian L. Rrushi:

Machine Learning and Recognition of User Tasks for Malware Detection. 73-81 - Stacey Truex, Ling Liu, Mehmet Emre Gursoy, Wenqi Wei, Lei Yu

:
Effects of Differential Privacy and Data Skewness on Membership Inference Vulnerability. 82-91 - Josh Payne

, Ashish Kundu:
Towards Deep Federated Defenses Against Malware in Cloud Ecosystems. 92-100 - Feng Wei, Uyen Trang Nguyen:

Twitter Bot Detection Using Bidirectional Long Short-Term Memory Neural Networks and Word Embeddings. 101-109 - Sara M. Sutton, Benjamin Bond, Sementa Tahiri, Julian L. Rrushi:

Countering Malware Via Decoy Processes with Improved Resource Utilization Consistency. 110-119 - Hyunsu Mun, Youngseok Lee:

Analysis and Nudging of Personally Identifiable Information in Online Used Markets. 120-129 - Nahida Sultana Chowdhury, Rajeev R. Raje:

SERS: A Security-Related and Evidence-Based Ranking Scheme for Mobile Apps. 130-139 - Hanlin Chen, Baijian Yang

:
A Performance Evaluation of CAN Encryption. 140-149 - Naresh Adhikari

, Naila Bushra, Mahalingam Ramkumar
:
Redistricting using Blockchain Network. 150-159 - Naila Bushra, Naresh Adhikari

, Mahalingam Ramkumar
:
Secure Queryable Dynamic Graphs using Blockchain. 160-167 - Ashwini Rao, Jürgen Pfeffer:

Data Siphoning Across Borders: The Role of Internet Tracking. 168-176 - Kemal Bicakci

, Ihsan Kagan Ak, Betul Askin Özdemir, Mesut Gozutok:
Open-TEE is No Longer Virtual: Towards Software-Only Trusted Execution Environments Using White-Box Cryptography. 177-183 - Jonathan Kilgallin, Ross Vasko:

Factoring RSA Keys in the IoT Era. 184-189 - Golam Dastoger Bashar, Graham Hill, Subroto Singha

, Praneeth Babu Marella, Gaby G. Dagher
, Jidong Xiao:
Contextualizing Consensus Protocols in Blockchain: A Short Survey. 190-195 - Mortaza S. Bargh, Sunil Choenni:

Towards Applying Design-Thinking for Designing Privacy-Protecting Information Systems. 196-202 - Ajay Kumar Shrestha

, Julita Vassileva:
User Acceptance of Usable Blockchain-Based Research Data Sharing System: An Extended TAM-Based Study. 203-208 - Saptarshi Das

, Shamik Sural
, Jaideep Vaidya, Vijayalakshmi Atluri
:
Central Attribute Authority (CAA): A Vision for Seamless Sharing of Organizational Resources. 209-217 - Murat Kantarcioglu, Fahad Shaon:

Securing Big Data in the Age of AI. 218-220 - Abhishek Malvankar, Josh Payne

, Karan K. Budhraja, Ashish Kundu, Suresh Chari, Mukesh K. Mohania:
Malware Containment in Cloud. 221-227 - Md Shihabul Islam, Harsh Verma, Latifur Khan

, Murat Kantarcioglu:
Secure Real-Time Heterogeneous IoT Data Management System. 228-235 - Amirmasoud Ghiassi, Taraneh Younesian, Zilong Zhao, Robert Birke, Valerio Schiavoni

, Lydia Y. Chen:
Robust (Deep) Learning Framework Against Dirty Labels and Beyond. 236-244 - Benjamin D. Horne, Maurício Gruppi

, Sibel Adali:
Trustworthy Misinformation Mitigation with Soft Information Nudging. 245-254 - David Mohaisen, Songqing Chen:

Computer Systems Have 99 Problems, Let's Not Make Machine Learning Another One. 255-259 - Denis Gracanin

, Ramoni O. Lasisi, Mohamed Azab, Mohamed Eltoweissy:
Next Generation Smart Built Environments: The Fusion of Empathy, Privacy and Ethics. 260-267

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














