Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Zuochao Dou"'
Autor:
Hazim Shakhatreh, Ahmad H. Sawalmeh, Ala Al-Fuqaha, Zuochao Dou, Eyad Almaita, Issa Khalil, Noor Shamsiah Othman, Abdallah Khreishah, Mohsen Guizani
Publikováno v:
IEEE Access, Vol 7, Pp 48572-48634 (2019)
The use of unmanned aerial vehicles (UAVs) is growing rapidly across many civil application domains, including real-time monitoring, providing wireless coverage, remote sensing, search and rescue, delivery of goods, security and surveillance, precisi
Externí odkaz:
https://doaj.org/article/5bbea5238aba4e5e9b4ae39f1ef3f45c
Publikováno v:
Current Pharmaceutical Design. 27:911-918
Abstract:: Adverse drug events have been a long-standing concern for the wide-ranging harms to public health, and the substantial disease burden. The key to diminish or eliminate the impacts is to build a comprehensive pharmacovigilance system. Appli
Autor:
Jieren Deng, Zuochao Dou, Hao Zheng, Guanmin Gao, Xiang Chen, Kang Xie, Feng Chen, Yuhui Xiao, Xin Wu, Shengqian Xu, Huji Xu, Mengmeng Li, Zhen Wang, Shuang Wang
Publikováno v:
Briefings in Bioinformatics. 22
Genome-wide association studies (GWAS) have been widely used for identifying potential risk variants in various diseases. A statistically meaningful GWAS typically requires a large sample size to detect disease-associated single nucleotide polymorphi
Publikováno v:
IEEE Systems Journal. 12:3279-3290
We propose a new authentication factor based on network round trip time ( $\rm {NRTT}$ ). We show how $\rm {NRTT}$ can be used to uniquely and securely identify login locations and hence can support location-based web authentication mechanisms. The f
Publikováno v:
IEEE Systems Journal. 12:1874-1885
Hadoop is an open source software framework for storage and processing of large-scale datasets. The proliferation of cloud services and its corresponding increasing number of users lead to a larger attack surface, especially for internal threats. The
Publikováno v:
IEEE Communications Surveys & Tutorials. 19:2797-2819
Phishing is a form of cyber attack that leverages social engineering approaches and other sophisticated techniques to harvest personal information from users of websites. The average annual growth rate of the number of unique phishing websites detect
Publikováno v:
Security and Communication Networks, Vol 2017 (2017)
We design and implement a novel communications latency based authentication scheme, dubbed CLAS, that strengthens the security of state-of-the-art web authentication approaches by leveraging the round trip network communications latency (RTL) between
Publikováno v:
AsiaCCS
In this paper, we leverage the characteristics of round-trip communications latency (RTL) to design and implement a novel highly secure and usable web authentication scheme, dubbed CLAS. CLAS uses, in addition to the traditional credentials, round tr
Publikováno v:
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ISBN: 9783319238289
SecureComm (1)
SecureComm (1)
Hadoop is an open source distributed system for data storage and parallel computations that is widely used. It is essential to ensure the security, authenticity, and integrity of all Hadoop’s entities. The current secure implementations of Hadoop r
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::396f2fd737c17b61b1ad71b6768a3535
https://doi.org/10.1007/978-3-319-23829-6_8
https://doi.org/10.1007/978-3-319-23829-6_8
Publikováno v:
IEEE CLOUD
As servers are placed in diverse locations in networked services today, it becomes vital to direct a client's request to the best server(s) to achieve both high performance and reliability. In this distributed setting, non-negligible latency and serv