IAFSE-CIDSE: Assured and Scalable Data Engineering, Center for (CASCADE)

Research Output 1993 2019

Filter
Chapter
2015
7 Citations (Scopus)

Compressed spatial hierarchical bitmap (cSHB) indexes for efficiently processing spatial range query workloads

Nagarkar, P., Candan, K. & Bhat, A., 2015, Proceedings of the VLDB Endowment. 12 ed. Association for Computing Machinery, Vol. 8. p. 1382-1393 12 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Query processing
Processing
Planning
Information management
Agglomeration

Lookingglass: A visual intelligence platform for tracking social movements

Davulcu, H. & Woodward, D., Jan 1 2015, Illuminating Dark Networks. Cambridge University Press, p. 84-102 19 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Social Movements
intelligence
scaling
driver
sect
2016
37 Citations (Scopus)

An overview of sentiment analysis in social media and its applications in disaster relief

Beigi, G., Hu, X., Maciejewski, R. & Liu, H., 2016, Studies in Computational Intelligence. Springer Verlag, Vol. 639. p. 313-340 28 p. (Studies in Computational Intelligence; vol. 639).

Research output: Chapter in Book/Report/Conference proceedingChapter

Disasters
Competitive intelligence
World Wide Web
Websites
Visualization
4 Citations (Scopus)

Cyber-deception and attribution in capture-the-flag exercises

Nunes, E., Kulkarni, N., Shakarian, P., Ruef, A. & Little, J., Jan 1 2016, Cyber Deception: Building the Scientific Foundation. Springer International Publishing, p. 149-165 17 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

14 Citations (Scopus)

Exploring malicious hacker forums

Shakarian, J., Gunn, A. T. & Shakarian, P., Jan 1 2016, Cyber Deception: Building the Scientific Foundation. Springer International Publishing, p. 259-282 24 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Internet
Arsenals
Intellectual property
Mobile phones
Industry
3 Citations (Scopus)

Ransomware and cryptocurrency Partners in crime

Ahn, G-J., Doupe, A., Zhao, Z. & Liao, K., Jan 1 2016, Cybercrime Through an Interdisciplinary Lens. Taylor and Francis, p. 105-126 22 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

offense
4 Citations (Scopus)

Use of cationized ferritin nanoparticles to measure renal glomerular microstructure with MRI

Bennett, K. M., Beeman, S. C., Baldelomar, E. J., Zhang, M., Wu, T., Hann, B. D., Bertram, J. F. & Charlton, J. R., 2016, Methods in Molecular Biology. Humana Press Inc., Vol. 1397. p. 67-79 13 p. (Methods in Molecular Biology; vol. 1397).

Research output: Chapter in Book/Report/Conference proceedingChapter

Nanoparticles
Ferritins
Magnetic Resonance Imaging
Kidney
Contrast Media
2018

Applying argumentation models for cyber attribution

Nunes, E., Shakarian, P., Simari, G. I. & Ruef, A., Jan 1 2018, SpringerBriefs in Computer Science. 9783319737874 ed. Springer, p. 75-84 10 p. (SpringerBriefs in Computer Science; no. 9783319737874).

Research output: Chapter in Book/Report/Conference proceedingChapter

Argumentation-based cyber attribution: The DeLP3E model

Nunes, E., Shakarian, P., Simari, G. I. & Ruef, A., Jan 1 2018, SpringerBriefs in Computer Science. 9783319737874 ed. Springer, p. 17-45 29 p. (SpringerBriefs in Computer Science; no. 9783319737874).

Research output: Chapter in Book/Report/Conference proceedingChapter

Logic programming
Statistical Models
Uncertainty

Baseline cyber attribution models

Nunes, E., Shakarian, P., Simari, G. I. & Ruef, A., Jan 1 2018, SpringerBriefs in Computer Science. 9783319737874 ed. Springer, p. 5-16 12 p. (SpringerBriefs in Computer Science; no. 9783319737874).

Research output: Chapter in Book/Report/Conference proceedingChapter

Belief revision in DeLP3E

Nunes, E., Shakarian, P., Simari, G. I. & Ruef, A., Jan 1 2018, SpringerBriefs in Computer Science. 9783319737874 ed. Springer, p. 47-74 28 p. (SpringerBriefs in Computer Science; no. 9783319737874).

Research output: Chapter in Book/Report/Conference proceedingChapter

Mathematical operators
Artificial intelligence
Specifications
Engineers

Conclusion

Nunes, E., Shakarian, P., Simari, G. I. & Ruef, A., Jan 1 2018, SpringerBriefs in Computer Science. 9783319737874 ed. Springer, 1 p. (SpringerBriefs in Computer Science; no. 9783319737874).

Research output: Chapter in Book/Report/Conference proceedingChapter

Learning systems
Decision making

Conclusions

Yao, Y., Su, X. & Tong, H., Jan 1 2018, SpringerBriefs in Computer Science. Springer, p. 51-53 3 p. (SpringerBriefs in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingChapter

Data Capturing and Processing

Yao, Y., Su, X. & Tong, H., Jan 1 2018, SpringerBriefs in Computer Science. Springer, p. 7-16 10 p. (SpringerBriefs in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingChapter

Smartphones
Sensors
Processing
Data mining

Enhanced data collection for cyber attribution

Nunes, E., Shakarian, P., Simari, G. I. & Ruef, A., Jan 1 2018, SpringerBriefs in Computer Science. 9783319737874 ed. Springer, p. 85-90 6 p. (SpringerBriefs in Computer Science; no. 9783319737874).

Research output: Chapter in Book/Report/Conference proceedingChapter

Open source software

Feature Engineering

Yao, Y., Su, X. & Tong, H., Jan 1 2018, SpringerBriefs in Computer Science. Springer, p. 17-23 7 p. (SpringerBriefs in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingChapter

Feature extraction
Time series
Energy efficiency
Sensors

Hierarchical Model

Yao, Y., Su, X. & Tong, H., Jan 1 2018, SpringerBriefs in Computer Science. Springer, p. 25-30 6 p. (SpringerBriefs in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingChapter

Data mining
Energy conservation
Sensors
Subways
Gyroscopes

Introduction

Yao, Y., Su, X. & Tong, H., Jan 1 2018, SpringerBriefs in Computer Science. Springer, p. 1-6 6 p. (SpringerBriefs in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingChapter

Data mining
Smartphones
Data privacy
Sensors

Mobile data mining

Yao, Y., Su, X. & Tong, H., Jan 1 2018, SpringerBriefs in Computer Science. Springer, p. 1-58 58 p. (SpringerBriefs in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingChapter

Data mining

Online Model

Yao, Y., Su, X. & Tong, H., Jan 1 2018, SpringerBriefs in Computer Science. Springer, p. 43-50 8 p. (SpringerBriefs in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingChapter

Data mining

Personalized Model

Yao, Y., Su, X. & Tong, H., Jan 1 2018, SpringerBriefs in Computer Science. Springer, p. 31-41 11 p. (SpringerBriefs in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingChapter

Data mining
Labels
Sensors
2019
1 Citation (Scopus)

Patch before exploited: An approach to identify targeted software vulnerabilities

Almukaynizi, M., Nunes, E., Dharaiya, K., Senguttuvan, M., Shakarian, J. & Shakarian, P., Jan 1 2019, Intelligent Systems Reference Library. Springer Science and Business Media Deutschland GmbH, p. 81-113 33 p. (Intelligent Systems Reference Library; vol. 151).

Research output: Chapter in Book/Report/Conference proceedingChapter

vulnerability
World Wide Web
Classifiers
software
Vulnerability