Cyber Security Research Group (CSRG)

Filter
Conference paper

Search results

  • 2019

    Virtual view quality enhancement using side view temporal modelling information for free viewpoint video

    Rahaman, D. M. M., Paul, M. & Shoumy, N. J., 16 Jan 2019, 2018 international conference on digital image computing: techniques and applications: DICTA 2018. Pickering, M., Zheng, L., You, S., Rahman, A., Murshed, M., Asikuzzaman, M., Natu, A., Robles-Kelly, A. & Paul, M. (eds.). United States: IEEE, Institute of Electrical and Electronics Engineers, 5 p. 8615827

    Research output: Book chapter/Published conference paperConference paperpeer-review

  • Web sanitization from malicious code injection attacks

    Alnabulsi, H. & Islam, R., 2019, International Conference on Applications and Techniques in Cyber Security and Intelligence ATCI 2018 : Applications and Techniques in Cyber Security and Intelligence. Atiquzzaman, M., Xu, Z., Abawajy, J., Choo, K-K. R. & Islam, R. (eds.). Springer-Verlag London Ltd., p. 251-261 11 p. (Advances in Intelligent Systems and Computing; vol. 842).

    Research output: Book chapter/Published conference paperConference paperpeer-review

    1 Citation (Scopus)
  • 2018

    A conceptual framework of personally controlled electronic health record (PCEHR) system to enhance security and privacy

    Mamun, Q., 01 Jan 2018, International Conference on applications and Techniques in Cyber Security and Intelligence: Applications and techniques in Cyber security and intelligence. Abawajy, J., Choo, K-K. R. & Islam, R. (eds.). Springer-Verlag London Ltd., Vol. 580. p. 304-314 11 p. (Advances in Intelligent Systems and Computing; vol. 580).

    Research output: Book chapter/Published conference paperConference paperpeer-review

    2 Citations (Scopus)
  • A dimension reduction model and classifier for anomaly-based intrusion detection in Internet of Things

    Zhao, S., Li, W., Zia, T. & Zomaya, A. Y., 02 Apr 2018, A Dimension Reduction Model and Classifier for Anomaly-Based Intrusion Detection in Internet of Things: 15th IEEE International Conference on Pervasive Intelligence and Computing (PICom 2017). United States: IEEE, p. 836-843 8 p.

    Research output: Book chapter/Published conference paperConference paperpeer-review

    67 Citations (Scopus)
  • Alignment-free Cancellable Template Generation for Fingerprint based Authentication

    Nazmul, R., Islam, MD. R. & Chowdhury, A. R., 2018, Proceedings of the 4th international conference on information systems security and privacy (ICISSP 2018). Camp, O., Mori, P. & Furnell, S. (eds.). Setúbal, Portugal: Scitepress, p. 361-366 6 p. 46

    Research output: Book chapter/Published conference paperConference paperpeer-review

    Open Access
    File
    1 Citation (Scopus)
    27 Downloads (Pure)
  • Alignment-free fingerprint template protection technique based on minutiae neighbourhood information

    Nazmul, R., Islam, M. R. & Chowdhury, A. R., 01 Jan 2018, International conference on applications and techniques in cyber security and intelligence: Applications and techniques in cyber security and intelligence. Abawajy, J., Choo, K-K. R. & Islam, R. (eds.). Cham, Switzerland: Springer-Verlag London Ltd., Vol. 580. p. 256-265 10 p. (Advances in Intelligent Systems and Computing; vol. 580).

    Research output: Book chapter/Published conference paperConference paperpeer-review

    2 Citations (Scopus)
  • An effective approach for dealing with the pressure to compromise security during systems development

    Al-Saggaf, Y., 25 Apr 2018, Security and Privacy in Communication Networks: SecureComm 2017 International Workshops Proceedings. Lin, X., Ghorbani, A., Ren, K., Zhu, S. & Zhang, A. (eds.). Springer, p. 32-46 15 p. (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; vol. 239).

    Research output: Book chapter/Published conference paperConference paperpeer-review

  • A new design approach and framework for elderly care robots

    Poulsen, A., Burmeister, O. & Tien, D., 2018, 29th Australasian Conference on Information Systems 2018. Association for Information Systems, p. 1-12 12 p. 162

    Research output: Book chapter/Published conference paperConference paperpeer-review

    Open Access
    File
    449 Downloads (Pure)
  • An improved naive Bayes classifier-based noise detection technique for classifying user phone call behavior

    Sarker, I. H., Kabir, A., Colman, A. & Han, J., 14 Apr 2018, Data mining: 15th Australasian conference, AusDM 2017, revised selected papers. Boo, Y. L., Stirling, D., Chi, L., Liu, L., Ong, K-L. & Williams, G. (eds.). Singapore: Springer, p. 72-85 14 p. (Communications in Computer and Information Science; vol. 845).

    Research output: Book chapter/Published conference paperConference paperpeer-review

    5 Citations (Scopus)
  • A novel algorithm to protect code injection attacks

    Alnabulsi, H., Islam, R. & Mamun, Q., 01 Jan 2018, International Conference on Applications and Techniques in Cyber Security and Intelligence: Applications and Techniques in Cyber Security and Intelligence. Abawajy, J., Choo, K-K. R. & Islam, R. (eds.). Cham, Switzerland: Springer-Verlag London Ltd., Vol. 580. p. 281-292 12 p. (Advances in Intelligent Systems and Computing; vol. 580).

    Research output: Book chapter/Published conference paperConference paperpeer-review

    Open Access
    File
    3 Citations (Scopus)
    79 Downloads (Pure)
  • A novel angle-restricted test zone search algorithm for performance improvement of HEVC

    Vayalil, N. C., Paul, M. & Kong, Y., 22 Feb 2018, 2017 IEEE International Conference on image processing, ICIP, Proceedings, 17–20 September 2017 China National Convention Center Beijing, China. United States: IEEE, Institute of Electrical and Electronics Engineers, p. 6-10 5 p. 8296232

    Research output: Book chapter/Published conference paperConference paperpeer-review

    3 Citations (Scopus)
  • A novel no-reference subjective quality metric for free viewpoint video using human eye movement

    Podder, P. K., Paul, M. & Murshed, M., 2018, Image and video technology: 8th Pacific-Rim symposium (PSIVT 2017), revised selected papers. Paul, M., Hitoshi, C. & Huang, Q. (eds.). Switzerland: Springer, Vol. 10749. p. 237-251 15 p. (Lecture Notes in Computer Science; vol. 10749).

    Research output: Book chapter/Published conference paperConference paperpeer-review

    1 Citation (Scopus)
  • A novel swarm intelligence based sequence generator

    Rabbi, K., Mamun, Q. & Islam, M. R., 01 Jan 2018, International conference on applications and techniques in cyber security and intelligence: applications and techniques in cyber security and intelligence. Abawajy, J., Choo, K-K. R. & Islam, R. (eds.). Springer-Verlag London Ltd., Vol. 580. p. 238-246 9 p. (Advances in Intelligent Systems and Computing; vol. 580).

    Research output: Book chapter/Published conference paperConference paperpeer-review

    1 Citation (Scopus)
  • A novel swarm intelligence based strategy to generate optimum test data in T-way testing

    Rabbi, K., Mamun, Q. & Islam, M. R., 01 Jan 2018, International conference on applications and techniques in cyber security and intelligence : applications and techniques in cyber security and intelligence. Abawajy, J., Choo, K-K. R. & Islam, R. (eds.). Springer-Verlag London Ltd., Vol. 580. p. 247-255 9 p. (Advances in Intelligent Systems and Computing; vol. 580).

    Research output: Book chapter/Published conference paperConference paperpeer-review

    3 Citations (Scopus)
  • A policy framework for subject-driven data sharing

    Chowdhury, M. J. M., Colman, A., Han, J. & Kabir, M. A., 03 Jan 2018, 51st Hawaii International Conference on System Sciences (HICSS). Red Hook, NY: Curran Associates, Inc, p. 4713-4722 10 p.

    Research output: Book chapter/Published conference paperConference paperpeer-review

    Open Access
    File
    12 Citations (Scopus)
    43 Downloads (Pure)
  • A survey of anomaly and automation from a cybersecurity perspective

    Donevski, M. & Zia, T., 13 Dec 2018, 2018 IEEE Globcom Workshops (GC Wkshps). Red Hook NY, USA: IEEE, 6 p.

    Research output: Book chapter/Published conference paperConference paperpeer-review

    8 Citations (Scopus)
    1 Downloads (Pure)
  • A survey of big data security solutions in healthcare

    Siddique, M., Ayzed Mirza, M., Ahmad, M., Chaudhry, J. & Islam, MD. R., 2018, Security and privacy in communication networks: 14th EAI international conference, SecureCom 2018, proceedings, part II. Beyah, R., Chang, B., Li, Y. & Zhu, S. (eds.). Cham, Switzerland: Springer, Vol. 255. p. 391-406 16 p. (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; vol. 255).

    Research output: Book chapter/Published conference paperConference paperpeer-review

    16 Citations (Scopus)
  • A system architecture for subject-centric data sharing

    Morshed Chowdhury, M. J., Colman, A., Han, J. & Kabir, M. A., 2018, Proceedings of the Australasian computer science week multiconference 2018: Australasian information security conference (AISC 2018). New York: Association for Computing Machinery (ACM), p. 1-10 10 p. 4

    Research output: Book chapter/Published conference paperConference paperpeer-review

    3 Citations (Scopus)
  • Blockchain as a notarization service for data sharing with Personal Data Store

    Chowdhury, M. J. M., Colman, A., Kabir, M. A., Han, J. & Sarda, P., 05 Sept 2018, Proceedings of the 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering: 2018 IEEE Trustcom/BigDataSE 2018. IEEE, Institute of Electrical and Electronics Engineers, p. 1330-1335 6 p. 8456052

    Research output: Book chapter/Published conference paperConference paperpeer-review

    76 Citations (Scopus)
  • Blockchain for fraud prevention: A work-history fraud prevention system

    Sarda, P., Chowdhury, M. J. M., Colman, A., Kabir, M. A. & Han, J., 05 Sept 2018, Proceedings of the 17th IEEE international conference on trust, security and privacy in computing and communications / the 12th IEEE international conference on big data science and engineering: 2018 Trustcom/BigDataSE. IEEE, Institute of Electrical and Electronics Engineers, p. 1858-1863 6 p. 8456149

    Research output: Book chapter/Published conference paperConference paperpeer-review

    29 Citations (Scopus)
  • Blockchain versus database: A critical analysis

    Chowdhury, M. J. M., Colman, A., Kabir, M. A., Han, J. & Sarda, P., 05 Sept 2018, Proceedings of the 17th IEEE International Conference on trust, security and privacy in computing and communications ((IEEE TrustCom 2018) and 12th IEEE International Conference on big data science and engineering (IEEE BigDataSE 2018): Trustcom/BigDataSE 2018. IEEE, Institute of Electrical and Electronics Engineers, p. 1348-1353 6 p. 8456055

    Research output: Book chapter/Published conference paperConference paperpeer-review

    116 Citations (Scopus)
  • Child abuse and domestic abuse: Content and feature analysis from social media disclosures

    Subramani, S., Wang, H., Islam, M. R., Ul-Haq, A. & O'Connor, M., 2018, Databases theory and applications: 29th Australasian Database Conference, ADC 2018, Gold Coast, QLD, Australia, May 24-27, 2018, proceedings. Wang, J., Gao, C., Chen, J. & Qi, J. (eds.). Champagne, Switzerland: Springer, Vol. 10837. p. 174-185 12 p.

    Research output: Book chapter/Published conference paperConference paperpeer-review

    11 Citations (Scopus)
  • Discovering trends for the development of novel authentication applications for dementia patients

    Chaudhry, J., Farmand, S., Islam, S. M. S., Islam, M. R., Hannay, P. & Valli, C., 01 Jan 2018, International Conference on Applications and Techniques in Cyber Security and Intelligence: Applications and Techniques in Cyber Security and Intelligence. Abawajy, J., Choo, K-K. R. & Islam, R. (eds.). Cham, Switzerland: Springer-Verlag London Ltd., Vol. 580. p. 220-237 18 p. (Advances in Intelligent Systems and Computing; vol. 580).

    Research output: Book chapter/Published conference paperConference paperpeer-review

    2 Citations (Scopus)
  • Early stage oral cavity cancer detection: Anisotropic pre-processing and fuzzy C-means segmentation

    Hu, Z., Alsadoon, A., Manoranjan, P., Prasad, P. W. C., Ali, S. & Elchouemic, A., 27 Feb 2018, Proceedings of the 2018 IEEE 8th Annual computing and communication workshop and conference. USA: IEEE, Institute of Electrical and Electronics Engineers, p. 714-719 6 p.

    Research output: Book chapter/Published conference paperConference paperpeer-review

    8 Citations (Scopus)
  • Equally well: A consumer-centric implementation model

    Mehmet, M., Roberts, R., Nayeem, T., Hyde, S. & Burmeister, O., 2018, International Social Marketing Conference 2018: Broadening Cultural Horizons in Social Marketing. Hay, R. (ed.). Australia: James Cook University, p. 66-71 5 p.

    Research output: Book chapter/Published conference paperConference paperpeer-review

    Open Access
    File
    142 Downloads (Pure)
  • Exploring secure communication in VANET broadcasting

    Jafer, M., Khan, M., Rehman, S-U. & Zia, T. A., 25 Apr 2018, Security and privacy in communication networks: SecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22–25, 2017, proceedings. Lin, X., Ghorbani, A., Ren, K., Zhu, S. & Zhang, A. (eds.). Springer, p. 69-84 16 p. (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; vol. 339).

    Research output: Book chapter/Published conference paperConference paperpeer-review

  • Fast and robust biometric authentication scheme using human ear

    Chowdhury, M. M. H., Islam, MD. R. & Gao, J., 25 Apr 2018, Security and privacy in communication networks: SecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22–25, 2017, Proceedings. Lin, X., Ghorbani, A., Ren, K., Zhu, S. & Zhang, A. (eds.). Cham: Springer, p. 133-144 12 p. (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; vol. 239).

    Research output: Book chapter/Published conference paperConference paperpeer-review

    1 Citation (Scopus)
  • Human factors, self-awareness and intervention approaches in cyber security when using mobile devices and social networks

    Eustace, K., Islam, MD. R., Tsang, P. & Fellows, G. H., 25 Apr 2018, Security and privacy in communication networks: SecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22–25, 2017, Proceeding. Lin, X., Ghorbani, A., Ren, K., Zhu, S. & Zhang, A. (eds.). Springer, p. 166-181 16 p. (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; vol. 239).

    Research output: Book chapter/Published conference paperConference paperpeer-review

    3 Citations (Scopus)
  • Hybrid adaptive prediction mechanisms with multilayer propagation neural network for hyperspectral image compression

    Xiao, R. & Paul, M., 2018, Image and Video Technology: 8th Pacific-Rim Symposium (PSIVT 2017) Revised Selected Papers. Paul, M., Hitoshi, C. & Huang, Q. (eds.). Switzerland: Springer, Vol. 10749. p. 162-173 12 p. (Lecture Notes in Computer Science; vol. 10749).

    Research output: Book chapter/Published conference paperConference paperpeer-review

  • Identifying recent behavioral data length in mobile phone log

    Sarker, I. H., Kabir, M. A., Colman, A. & Han, J., 18 Apr 2018, Proceedings of the 14th EAI international conference on mobile and ubiquitous systems: computing, networking and services (MobiQuitous 2017). Gu, T., Kotagiri, R., Kaafar, D. & Zhou, G. (eds.). United States: Association for Computing Machinery (ACM), p. 545-546 2 p.

    Research output: Book chapter/Published conference paperConference paperpeer-review

  • Inverted P-shaped UWB antenna with dual/tri-band-notch characteristics

    Quddus, A., Saleem, R., Shafique, M. F. & Ur Rehman, S., 24 May 2018, 2018 international applied computational electromagnetics society symposium in Denver (ACES-Denver 2018). Colorado, USA: IEEE, Institute of Electrical and Electronics Engineers, 2 p.

    Research output: Book chapter/Published conference paperConference paperpeer-review

    1 Citation (Scopus)
  • Joint texture and depth map coding for error-resilient 3-D video transmission

    Gao, P., Xiang, W., Rahaman, D. M. M. & Paul, M., 22 Feb 2018, 2017 IEEE International Conference on Image Processing: Proceedings. United States: IEEE, Institute of Electrical and Electronics Engineers, p. 1905-1909 5 p. 8296613

    Research output: Book chapter/Published conference paperConference paperpeer-review

    1 Citation (Scopus)
  • Malware analysis and detection using data mining and machine learning classification

    Chowdhury, M., Rahman, A. & Islam, R., 01 Jan 2018, International Conference on Applications and Techniques in Cyber Security and Intelligence: Applications and Techniques in Cyber Security and Intelligence. Abawajy, J., Choo, K-K. R. & Islam, R. (eds.). Cham, Switzerland: Springer-Verlag London Ltd., Vol. 580. p. 266-274 9 p. (Advances in Intelligent Systems and Computing; vol. 580).

    Research output: Book chapter/Published conference paperConference paperpeer-review

    Open Access
    File
    53 Citations (Scopus)
    1081 Downloads (Pure)
  • Malware detection for healthcare data security

    Chowdhury, M., Jahan, S., Islam, MD. R. & Gao, J., 29 Dec 2018, Security and privacy in communication networks: 14th International Conference, SecureComm 2018, Singapore, Singapore, August 8-10, 2018, Proceedings, Part II. Beyah, R., Chang, B., Li, Y. & Zhu, S. (eds.). Springer, Vol. 255. p. 407-416 10 p. (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; vol. 255).

    Research output: Book chapter/Published conference paperConference paperpeer-review

    8 Citations (Scopus)
  • Mining accurate message formats for service APIs

    Hossain, M. A., Versteeg, S., Han, J., Kabir, A., Jiang, J. & Schneider, J-G., 05 Apr 2018, 25th IEEE International conference on software analysis, evolution and reengineering (SANER) 2018 Campobasso, Italy. IEEE Xplore, p. 266-276

    Research output: Book chapter/Published conference paperConference paperpeer-review

    11 Citations (Scopus)
  • On improving the prediction accuracy of a decision tree using genetic algorithm

    Adnan, M. N., Islam, Z. & Akbar, M., Nov 2018, Advanced Data Mining and Applications. Gan, G., Li, B., Li, X. & Wang, S. (eds.). LNAI, Vol. 11323. p. 80 - 94 15 p. 7. (Lecture Notes in Artificial Intelligence ).

    Research output: Book chapter/Published conference paperConference paperpeer-review

    1 Citation (Scopus)
  • Online radicalisation along a continuum: From when individuals express grievances to when they transition into extremism

    Al-Saggaf, Y., 29 Dec 2018, (E-pub ahead of print) Security and privacy in communication networks: 14th International Conference, SecureComm 2018, Singapore, August 8-10,2018, Proceedings Part II. Chang, B., Li, Y., Beyah, R. & Zhu, S. (eds.). Cham: Springer-Verlag London Ltd., p. 429-440 12 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 255).

    Research output: Book chapter/Published conference paperConference paperpeer-review

    1 Citation (Scopus)
  • Perceptions and Experiences of General Practice Users About MyHealthRecord

    Raza Khan, U., Zia, T., Pearce, C. & Perera, K., 2018, Health information science: 7th International Conference, HIS 2018, Cairns, QLD, Australia, October 5-7, 2018, proceedings. Siuly, S., Lee, I., Huang, Z., Zhou, R., Wang, H. & Xiang, W. (eds.). Cham, Switzerland: Springer, Vol. 11148. p. 3-16 14 p.

    Research output: Book chapter/Published conference paperConference paperpeer-review

    2 Citations (Scopus)
  • Phubbing: How frequent? Who is phubbed? In which situation? And using which apps?

    Al-Saggaf, Y. & MacCulloch, R., 01 Jan 2018, 39th International Conference on Information Systems (ICIS 2018): Bridging the internet of people, data, and things . Association for Information Systems, 9 p. (International Conference on Information Systems 2018, ICIS 2018).

    Research output: Book chapter/Published conference paperConference paperpeer-review

    10 Citations (Scopus)
  • Preface

    Abawajy, J., Choo, K. K. R., Atiquzzaman, M., Islam, R. & Xu, Z., 2018, Advances in intelligent systems and computing. Vol. 842. p. v-vi (Advances in Intelligent Systems and Computing).

    Research output: Book chapter/Published conference paperConference paperpeer-review

  • Privacy in social media

    Ozkaya, E. & Islam, MD. R., 25 Apr 2018, Security and privacy in communication networks: SecureComm 2017 international workshops, proceedings. Lin, X., Ghorbani, A., Ren, K., Zhu, S. & Zhang, A. (eds.). Cham, Switzerland: Springer, Vol. 239. p. 3-10 8 p. (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; vol. 239).

    Research output: Book chapter/Published conference paperConference paperpeer-review

  • Protecting data from malware threats using machine learning technique

    Chowdhury, M. M. H., Rahman, A. & Islam, MD. R., 08 Feb 2018, Proceedings of the 2017 12th IEEE Conference on Industrial Electronics and Applications (ICIEA). United States: IEEE, Institute of Electrical and Electronics Engineers, p. 1691-1694 4 p.

    Research output: Book chapter/Published conference paperConference paperpeer-review

    22 Citations (Scopus)
  • Rank forest: Systematic attribute sub-spacing in decision forest

    Babar, Z., Islam, M. Z. & Mansha, S., 01 Jan 2018, Proceedings of the 15th Australasian Data Mining Conference (AusDM 2017). Boo, Y. L., Stirling, D., Chi, L., Liu, L., Ong, K-L. & Williams, G. (eds.). Singapore: Springer, p. 24-37 14 p. (Communications in Computer and Information Science; vol. 845).

    Research output: Book chapter/Published conference paperConference paperpeer-review

  • Reducing deformation - Augmented Reality (AR) in facelift surgery: A theoretical and mathematical study

    Ng, S., Alsadoon, A., Prasad, P. W. C., Deva, A., Paul, M., Elchouemi, A. & Lau, S. H., 16 Nov 2018, Proceedings of the 2018 7th international conference on computer and communication Engineering (ICCCE). IEEE, Institute of Electrical and Electronics Engineers, p. 172-176 5 p. 8539344

    Research output: Book chapter/Published conference paperConference paperpeer-review

    2 Citations (Scopus)
  • Reducing USB attack surface: A lightweight authentication and delegation protocol

    Mahboubi, A., Camtepe, S. & Morarji, H., 2018, 2018 International Conference on smart computing and electronic enterprise (ICSCEE 2018). IEEE, p. 1-7

    Research output: Book chapter/Published conference paperConference paperpeer-review

    2 Citations (Scopus)
  • Retinal blood vessel extraction method based on basic filtering schemes

    Soomro, T., Gao, J., Paul, M. & Zheng, L., 22 Feb 2018, 2017 IEEE International Conference on image processing (ICIP) proceedings. United States: IEEE, p. 4422-4426 5 p.

    Research output: Book chapter/Published conference paperConference paperpeer-review

    10 Citations (Scopus)
  • Robust Ear Biometric Recognition using Neural Network

    Chowdhury, M. M. H., Islam, MD. R. & Gao, J., 08 Feb 2018, Proceedings of the 2017 12th IEEE Conference on  Industrial Electronics and Applications (ICIEA). United States: IEEE, Institute of Electrical and Electronics Engineers, p. 1855-1859 5 p.

    Research output: Book chapter/Published conference paperConference paperpeer-review

    15 Citations (Scopus)
  • Securing healthcare data using biometric authentication

    Jahan, S., Chowdhury, M. M. H., Islam, MD. R. & Chaudhry, J., 25 Apr 2018, Security and privacy in communication networks: SecureComm 2017 International workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22–25, 2017, Proceedings. Lin, X., Ghorbani, A., Ren, K., Zhu, S. & Zhang, A. (eds.). Springer, p. 123-132 10 p. (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; vol. 339).

    Research output: Book chapter/Published conference paperConference paperpeer-review

    5 Citations (Scopus)
  • Security and privacy protection for eHealth data

    Jahan, S., Chowdhury, M., Islam, R. & Gao, J., 16 Jun 2018, Future network systems and security: 4th International conference, FNSS 2018 Paris, France, July 9–11, 2018 proceedings. Doss, R., Piramuthu, S. & Zhou, W. (eds.). Switzerland: Springer-Verlag London Ltd., p. 197-205 9 p. (Communications in Computer and Information Science; vol. 878).

    Research output: Book chapter/Published conference paperConference paperpeer-review

    2 Citations (Scopus)
  • Social media users' privacy against malicious data miners

    Reza, K. J., Islam, M. Z. & Estivill-Castro, V., 15 Jan 2018, Proceedings of the 2017 12th international conference on intelligent systems and knowledge engineering (ISKE): IEEE ISKE 2017. Li, T., López, L. M. & Li, Y. (eds.). United States: IEEE, Institute of Electrical and Electronics Engineers, p. 1-8 8 p.

    Research output: Book chapter/Published conference paperConference paperpeer-review

    5 Citations (Scopus)