Now showing items 1-5 of 5

    • Community-oriented architecture for smart cities 

      Jalali, Roozbeh (2017-12-01)
      With the widespread use of smartphone devices, a surge in mobile sensing, progress in wireless communication and networking techniques, as well as the development of the Internet of Things (IoT) and cloud computing, ...
    • DL-based defense against polymorphic network attacks 

      Sabeel, Ulya (2024-01-01)
      Network security is of vital importance in our world dominated by internet systems. These systems are vulnerable to large-scale rapidly evolving attacks by sophisticated cyber attackers who can have an upper edge over the ...
    • A mixed-method approach to analyze the robustness of natural language processing classifiers 

      Laughlin, Brandon (2021-04-01)
      Natural language processing algorithms (NLP) have become an essential approach for processing large amounts of textual information with applications such as spam, phishing and content moderation. Malicious actors can craft ...
    • On the potential of intent-based access control (IBAC) in preventing insider threats 

      Almehmadi, Abdulaziz (2015-11-01)
      Existing access control mechanisms are based on the concepts of identity enrollment and recognition, and assume that recognized identity is synonymous with ethical actions. However, statistics over the years show that the ...
    • Towards measuring privacy 

      Kosa, Tracy Ann (2015-04-01)
      The acceptable threshold for privacy is an individual choice, informed by culture, tradition and experience. That it is important, conversely, is self-evident. We use it to moderate personal information disclosure, how ...