Skip to main content

and
  1. No Access

    Article

    Design and implementation of Negative Authentication System

    Modern society is mostly dependent on online activities like official or social communications, fund transfers and so on. Unauthorized system access is one of the utmost concerns than ever before in cyber syst...

    Dipankar Dasgupta, Abhijit Kumar Nag in International Journal of Information Secur… (2019)

  2. No Access

    Chapter

    Machine Learning Algorithm Acceleration Using Hybrid (CPU-MPP) MapReduce Clusters

    The uninterrupted growth of information repositories has progressively led data-intensive applications, such as MapReduce-based systems, to the mainstream. The MapReduce paradigm has frequently proven to be a...

    Sergio Herrero-Lopez, John R. Williams in Large-Scale Data Analytics (2014)

  3. No Access

    Chapter and Conference Paper

    Securing Advanced Metering Infrastructure Using Intrusion Detection System with Data Stream Mining

    Advanced metering infrastructure (AMI) is an imperative component of the smart grid, as it is responsible for collecting, measuring, analyzing energy usage data, and transmitting these data to the data concent...

    Mustafa Amir Faisal, Zeyar Aung, John R. Williams in Intelligence and Security Informatics (2012)

  4. Chapter and Conference Paper

    Discerning Industrial Networks, Clusters and Competences – An Alternative View Using Web Mining Techniques

    This short extract is part of a wider study into the use of the web for research into the presence and structure of industrial clusters and is concerned here with the discernment of networks of firms and the p...

    John R. Williams, Dimitris Assimakopoulos in Collaborative Networks for a Sustainable World (2010)

  5. No Access

    Chapter

    Anti-Counterfeiting and Supply Chain Security

    Counterfeit trade developed into a severe problem for many industries. While established security features such as holograms, micro printings or chemical markers do not seem to efficiently avert trade in illic...

    Thorsten Staake, Florian Michahelles in Networked RFID Systems and Lightweight Cry… (2008)