Advances in Cyber-Security Techniques and Applications Concurrency and Computation : Practice adn Experience (CCPE)
ATCS 2014
-
Forensic Potentials of Solid State Drives
Zubair Shah, Abdun Mahmood and Jill Slay
-
Cloud Security from Users Point of View: A Pragmatic Study with Thematic Analysis
Syed Saira and Quazi Mamun
-
A Secure Real Time Data Processing Framework for Personally controlled Electronic Health Record (PCEHR) System
Rabbi Khandakar, Kaosar Mohammad, Quazi Mamun and Rafiqul Islam
-
Novel Iterative Min-Max Clustering to Minimize Information Loss in Statistical Disclosure Control
Mustafa Abdul, Abdun N Mahmood and Enamul Kabir
-
Securing Sensor Networks by Moderating Frequencies
Pinaki Sarkar, Mahish Priyatosh, Morshed U Chowdhury and Kouichi Sakurai
-
A Performance Comparison Study of a Coverage-Preserving N.
Qun Wang, Ji Peiyu, Qian Huanyan, Xie Yu and Yang Shuhui
-
Intelligent Financial Fraud Detection Practices: An Investigation
West Jarrod, Maumita Bhattachyria and Rafiqul Islam
-
Network Traffic Pattern Analysis using Improved Information Theoretic Co-clustering based Collective Anomaly Detection.
Ahmed Mohiuddin and Abdun Mahmood
-
A Survey on Mining Program-Graph Features for Malware Analysis
Md Saiful Islam, Rafiqul Islam, Kayes, ASM, Liu Chengfei and Irfan Altas
-
Defence Against Code Injection Attacks
Alnabulsi Hussein, Quazi Mamun, Rafiqul Islam and Morshed Chowdhury
-
False Data Injection Attack Targeting the LTC Transformer to Disrupt Smart Grid Operation
Anwar Adnan, Abdun Mahmood and Mohiuddin Ahmed
-
A Domain-Based Multi-cluster SIP Solution for Mobile Ad Hoc Network.
Ala Abraham and Kim-Kwang Raymond Choo