A predictive approach for the efficient distribution of agent-based systems on a hybrid-cloud Fulltext Access 44 Pages 2018
Identifying, authenticating and authorizing smart objects and end users to cloud services in Internet of Things Fulltext Access 44 Pages 2018
An adaptive multi-population differential artificial bee colony algorithm for many-objective service composition in cloud manufacturing Fulltext Access 44 Pages 2018
A machine learning based approach to identify protected health information in Chinese clinical text Fulltext Access 44 Pages 2018
MASKER: Masking for privacy-preserving aggregation in the smart grid ecosystem Fulltext Access 44 Pages 2018
An approach for optimized feature selection in large-scale software product lines Fulltext Access 45 Pages 2018
Feature selection based on composition of rough sets induced by feature granulation Fulltext Access 45 Pages 2018
Scheduling parallel tasks with energy and time constraints on multiple manycore processors in a cloud computing environment Fulltext Access 45 Pages 2018
A novel optimized vertical handover framework for seamless networking integration in cyber-enabled systems Fulltext Access 45 Pages 2018
Sociometrics and observational assessment of teaming and leadership in a cyber security defense competition Fulltext Access 45 Pages 2018
Mobile phishing attacks and defence mechanisms: State of art and open research challenges Fulltext Access 45 Pages 2018
Automated poisoning attacks and defenses in malware detection systems: An adversarial machine learning approach Fulltext Access 45 Pages 2018
Exploring the usefulness of unlabelled test cases in software fault localization Fulltext Access 45 Pages 2018
Investigating the effect of adding nanoparticles to the blood flow in presence of magnetic field in a porous blood arterial Fulltext Access 45 Pages 2018
IT-enabled knowledge ambidexterity and innovation performance in small U.S. firms: The moderator role of social media capability Fulltext Access 45 Pages 2018
Early detection of Parkinson's disease through patient questionnaire and predictive modelling Fulltext Access 45 Pages 2018
Using the elaboration likelihood model to examine online persuasion through website design Fulltext Access 45 Pages 2018
Friend-safe evasion attack: An adversarial example that is correctly recognized by a friendly classifier Fulltext Access 45 Pages 2018
A multi-target approach to estimate software vulnerability characteristics and severity scores Fulltext Access 45 Pages 2018
Design and simulation of the emergent behavior of small drones swarming for distributed target localization Fulltext Access 45 Pages 2018
An ordinal consistency-based group decision making process with probabilistic linguistic preference relation Fulltext Access 45 Pages 2018
A decision maxim for efficient task realization within analytical network infrastructures Fulltext Access 46 Pages 2018
The impact of collectivism and psychological ownership on protection motivation: A cross-cultural examination Fulltext Access 46 Pages 2018
Investigating the impact of fault data completeness over time on predicting class fault-proneness Fulltext Access 46 Pages 2018
Lessoning travelers' motivating behavior for a growing phenomenon in Taiwan by an advanced hybrid object-oriented hierarchical model Fulltext Access 46 Pages 2018
Privacy-preserving personal data operation on mobile cloud-Chances and challenges over advanced persistent threat Fulltext Access 46 Pages 2018
Cloud provider capacity augmentation through automated resource bartering Fulltext Access 46 Pages 2018
Building situational awareness for network threats in fog/edge computing: Emerging paradigms beyond the security perimeter model Fulltext Access 46 Pages 2018
Security-oriented opportunistic data forwarding in Mobile Social Networks Fulltext Access 46 Pages 2018
A multi-temporal framework for high-level activity analysis: Violent event detection in visual surveillance Fulltext Access 46 Pages 2018
Using behavioral features in tablet-based auditory emotion recognition studies Fulltext Access 46 Pages 2018
Guided dynamic particle swarm optimization for optimizing digital image watermarking in industry applications Fulltext Access 46 Pages 2018
How do we efficiently generate high-resolution hydraulic models at large numbers of riverine reaches? Fulltext Access 47 Pages 2018
Molecular dynamics simulation approach to explore atomistic molecular mechanism of peroxidase activity of apoptotic cytochrome c mutants Fulltext Access 47 Pages 2018
Providing recommendations in social networks by integrating local and global reputation Fulltext Access 47 Pages 2018
Cross project defect prediction using class distribution estimation and oversampling Fulltext Access 47 Pages 2018
Scalable approximate query tracking over highly distributed data streams with tunable accuracy guarantees Fulltext Access 47 Pages 2018
The role of social media in enhancing guanxi and perceived effectiveness of E-commerce institutional mechanisms in online marketplace Fulltext Access 47 Pages 2018
Parallel algorithms for the automated discovery of declarative process models Fulltext Access 47 Pages 2018
Dynamic skipping and blocking, dead path elimination for cyclic workflows, and a local semantics for inclusive gateways Fulltext Access 47 Pages 2018
Laboratory testing in primary care: A systematic review of health IT impacts Fulltext Access 48 Pages 2018
Genetic algorithms for hyperparameter optimization in predictive business process monitoring Fulltext Access 48 Pages 2018
Computational methods and optimizations for containment and complementarity in web data cubes Fulltext Access 48 Pages 2018
Distributed nearest neighbor classification for large-scale multi-label data on spark Fulltext Access 49 Pages 2018
Building an automotive security assurance case using systematic security evaluations Fulltext Access 49 Pages 2018
Do android developers neglect error handling? a maintenance-Centric study on the relationship between android abstractions and uncaught exceptions Fulltext Access 49 Pages 2018
Secure multi-keyword ranked search over encrypted cloud data for multiple data owners Fulltext Access 49 Pages 2018
Adaptive generation of challenging scenarios for testing and evaluation of autonomous vehicles Fulltext Access 49 Pages 2018
Exploiting smart e-Health gateways at the edge of healthcare Internet-of-Things: A fog computing approach Fulltext Access 49 Pages 2018
Security-by-design in multi-cloud applications: An optimization approach Fulltext Access 49 Pages 2018
Distinguishing between facts and opinions for sentiment analysis: Survey and challenges Fulltext Access 50 Pages 2018
Cloud service evaluation method-based Multi-Criteria Decision-Making: A systematic literature review Fulltext Access 50 Pages 2018
Solving Stackelberg security Markov games employing the bargaining Nash approach: Convergence analysis Fulltext Access 50 Pages 2018
Identification of geochemical anomalies through combined sequential Gaussian simulation and grid-based local singularity analysis Fulltext Access 50 Pages 2018
Efficient detection and validation of atomicity violations in concurrent programs Fulltext Access 50 Pages 2018
The impacts of techniques, programs and tests on automated program repair: An empirical study Fulltext Access 50 Pages 2018
On the implementation of dynamic software product lines: An exploratory study Fulltext Access 51 Pages 2018
Feature interaction in software product line engineering: A systematic mapping study Fulltext Access 51 Pages 2018
Sources and impacts of social influence from online anonymous user reviews Fulltext Access 51 Pages 2018
A distributed approach to compliance monitoring of business process event streams Fulltext Access 51 Pages 2018
What motivates health information exchange in social media? The roles of the social cognitive theory and perceived interactivity Fulltext Access 51 Pages 2018
System 1 and System 2 cognition in the decision to adopt and use a new technology Fulltext Access 51 Pages 2018
Information security investments: An exploratory multiple case study on decision-making, evaluation and learning Fulltext Access 52 Pages 2018
A systematic mapping study on text analysis techniques in software architecture Fulltext Access 52 Pages 2018
Are there any relationships between technology and cultural values? A country-level trend study of the association between information communication technology and cultural values Fulltext Access 52 Pages 2018
Explaining the privacy paradox: A systematic review of literature investigating privacy attitude and behavior Fulltext Access 52 Pages 2018
From improper to acceptable: How perpetrators neutralize workplace bullying behaviors in the cyber world Fulltext Access 52 Pages 2018
Dynamic security metrics for measuring the effectiveness of moving target defense techniques Fulltext Access 53 Pages 2018
Revealing community structures by ensemble clustering using group diffusion Fulltext Access 53 Pages 2018
Proactive defense mechanisms for the software-defined Internet of Things with non-patchable vulnerabilities Fulltext Access 53 Pages 2018
Software metrics thresholds calculation techniques to predict fault-proneness: An empirical comparison Fulltext Access 53 Pages 2018
A Bayesian networks-based approach to assess and improve the teamwork quality of agile teams Fulltext Access 53 Pages 2018
An exponential-type kernel robust regression model for interval-valued variables Fulltext Access 53 Pages 2018