Zobrazeno 1 - 10
of 49
pro vyhledávání: '"Kambiz Ghazinour"'
Publikováno v:
IEEE Transactions on Knowledge and Data Engineering. :1-12
Autor:
Jeremy McHatton, Kambiz Ghazinour
Publikováno v:
Proceedings of the 9th ACM International Workshop on Security and Privacy Analytics.
Publikováno v:
2022 IEEE/ACM 7th Symposium on Edge Computing (SEC).
Publikováno v:
Current Sustainable/Renewable Energy Reports. 8:207-221
This paper provides a SWOT analysis of the Interdependent and Complex Electric Power and Transportation Systems (INTERCEPTS). The SWOT analysis is conducted to highlight the strengths, weaknesses, opportunities, and threats for the safe, secure, and
Publikováno v:
2022 IEEE 18th International Conference on Intelligent Computer Communication and Processing (ICCP).
Publikováno v:
Information Sciences. 544:343-371
Nowadays, efficient and effective stream processing has become increasingly important in many real-world applications such as sensor data monitoring, network intrusion detection, IP network traffic analysis, and so on. In practice, stream data often
Autor:
Paweena Manotipya, Kambiz Ghazinour
Publikováno v:
EUSPN/ICTH
A considerable number of online users are either unaware of the side-effects of sharing personal information or lack adequate knowledge about their rights or means to protecting their privacy. This is even more concerning when we realize the vulnerab
Publikováno v:
EUSPN/ICTH
As social media grows rapidly in both prevalence and scope, the amount of Personally Identifiable Information (PII) shared online has also grown considerably. Unfortunately, many users lack the relevant privacy education and awareness necessary to av
Autor:
Shahrokh Sani, Kambiz Ghazinour
Publikováno v:
2021 International Conference on e-Health and Bioengineering (EHB).
Publikováno v:
The VLDB Journal. 28:961-985
Nowadays, efficient and effective processing over massive stream data has attracted much attention from the database community, which are useful in many real applications such as sensor data monitoring, network intrusion detection, and so on. In prac