• Publications
  • Influence
Classification and Novel Class Detection in Concept-Drifting Data Streams under Time Constraints
TLDR
This work proposes a data stream classification technique that integrates a novel class detection mechanism into traditional classifiers, enabling automatic detection of novel classes before the true labels of the novel class instances arrive.
Remaining Useful Life Estimation Based on a Nonlinear Diffusion Degradation Process
Remaining useful life estimation is central to the prognostics and health management of systems, particularly for safety-critical systems, and systems that are very expensive. We present a non-linear
Privacy preservation in wireless sensor networks: A state-of-the-art survey
TLDR
Two main categories of privacy-preserving techniques for protecting two types of private information, data-oriented and context-oriented privacy, respectively are reviewed, and a number of important open challenges for future research are discussed.
Heuristics-Based Query Processing for Large RDF Graphs Using Cloud Computing
TLDR
This paper describes a framework that is built using Hadoop to store and retrieve large numbers of RDF triples by exploiting the cloud computing paradigm and shows that this framework is scalable and efficient and can handle large amounts of R DF data, unlike traditional approaches.
ROWLBAC: representing role based access control in OWL
TLDR
Two different ways to support the NIST Standard RBAC model in OWL are shown and how the OWL constructions can be extended to model attribute-based RBAC or more generally attribute- based access control are discussed.
A new intrusion detection system using support vector machines and hierarchical clustering
TLDR
This paper presents a new approach of combination of SVM and DGSOT, which starts with an initial training set and expands it gradually using the clustering structure produced by the D GSOT algorithm, which has proved to overcome the drawbacks of traditional hierarchical clustering algorithms.
Flow-based identification of botnet traffic by mining multiple log files
TLDR
A multiple log-file based temporal correlation technique for detecting Command and Control traffic and assuming that bots respond much faster than humans is proposed, which shows better overall performance when compared to other recently published techniques.
A semantic web based framework for social network access control
TLDR
This work proposes an extensible fine grained access control model that depends on trust relationships among various users, and is modeled using OWL and SWRL, and presents the architecture of the framework in its support.
Effective Software Fault Localization Using an RBF Neural Network
TLDR
The results clearly show that the proposed technique is more effective than several other popular, state of the art fault localization techniques, and can easily be applied to programs with multiple bugs as well.
Selective and authentic third-party distribution of XML documents
TLDR
By embedding in the query response one digital signature generated by the Owner and some hash values, a subject is able to locally verify the authenticity of a query response, and an approach is presented that, for a wide range of queries, allows a subject to verify the completeness of query results.
...
1
2
3
4
5
...