{"title":"PUFloc: PUF and Location Based Hierarchical Mutual Authentication Protocol for Surveillance Drone Networks","authors":"Aiswarya S. Nair, S. Thampi","doi":"10.1007/978-981-19-0468-4_6","DOIUrl":"https://doi.org/10.1007/978-981-19-0468-4_6","url":null,"abstract":"","PeriodicalId":232780,"journal":{"name":"International Conference on Ubiquitous Security","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114018923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wahid Sadique Koly, Abu Kaisar Jamil, Mohammad Shahriar Rahman, Hanif Bhuiyan, Md Zakirul Alam Bhuiyan, A. Omar
{"title":"Towards a Location-Aware Blockchain-Based Solution to Distinguish Fake News in Social Media","authors":"Wahid Sadique Koly, Abu Kaisar Jamil, Mohammad Shahriar Rahman, Hanif Bhuiyan, Md Zakirul Alam Bhuiyan, A. Omar","doi":"10.1007/978-981-19-0468-4_9","DOIUrl":"https://doi.org/10.1007/978-981-19-0468-4_9","url":null,"abstract":"","PeriodicalId":232780,"journal":{"name":"International Conference on Ubiquitous Security","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125660722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the Variability in the Application and Measurement of Supervised Machine Learning in Cyber Security","authors":"Omar Alshaikh, S. Parkinson, Saad Khan","doi":"10.1007/978-981-99-0272-9_38","DOIUrl":"https://doi.org/10.1007/978-981-99-0272-9_38","url":null,"abstract":"","PeriodicalId":232780,"journal":{"name":"International Conference on Ubiquitous Security","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127791243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Iosif Andrei-Cristian, T. Gasiba, Tiange Zhao, U. Lechner, M. Pinto-Albuquerque
{"title":"A Large-Scale Study on the Security Vulnerabilities of Cloud Deployments","authors":"Iosif Andrei-Cristian, T. Gasiba, Tiange Zhao, U. Lechner, M. Pinto-Albuquerque","doi":"10.1007/978-981-19-0468-4_13","DOIUrl":"https://doi.org/10.1007/978-981-19-0468-4_13","url":null,"abstract":"","PeriodicalId":232780,"journal":{"name":"International Conference on Ubiquitous Security","volume":"203 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121467713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Listen to the Music: Evaluating the Use of Music in Audio Based Authentication","authors":"Michael Tsai, Vimal Kumar","doi":"10.1007/978-981-99-0272-9_2","DOIUrl":"https://doi.org/10.1007/978-981-99-0272-9_2","url":null,"abstract":"","PeriodicalId":232780,"journal":{"name":"International Conference on Ubiquitous Security","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122772620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sensor Cloud Data Privacy Protection Model Based on Collaborative Deep Learning","authors":"Xiaoqian Ran, Yufeng Zhuang, Hongping Wang, Danni Cao, Yulian Cao, Wenjuan Gu","doi":"10.1007/978-981-99-0272-9_29","DOIUrl":"https://doi.org/10.1007/978-981-99-0272-9_29","url":null,"abstract":"","PeriodicalId":232780,"journal":{"name":"International Conference on Ubiquitous Security","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123128481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Guanghui Feng, Wenyin Yang, Tao Peng, X. Xing, Shuhong Chen, Yuting Li
{"title":"An Interactive Query Differential Privacy Protection Model Based on Big Data Analysis","authors":"Guanghui Feng, Wenyin Yang, Tao Peng, X. Xing, Shuhong Chen, Yuting Li","doi":"10.1007/978-981-99-0272-9_23","DOIUrl":"https://doi.org/10.1007/978-981-99-0272-9_23","url":null,"abstract":"","PeriodicalId":232780,"journal":{"name":"International Conference on Ubiquitous Security","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125398010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}