Carriegos, Ramón Ángel Fernández-Díaz).Pages 273-281 Towards Forecasting Time-Series of Cyber-Security Data Aggregates (Miguel V. Simulating Malware Propagation with Different Infection Rates (Jose Diamantino Hernández Guillén, Angel Martín del Rey).Pages 253-262Ī Data Quality Assessment Model and Its Application to Cybersecurity Data Sources (Noemí DeCastro-García, Enrique Pinto).Pages 263-272 Multi-stage News-Stance Classification Based on Lexical and Neural Features (Fuad Mire Hassan, Mark Lee).Pages 218-228įake News Detection (Ignacio Palacio Marín, David Arroyo).Pages 229-238Īpplication of the BERT-Based Architecture in Fake News Detection (Sebastian Kula, Michał Choraś, Rafał Kozik).Pages 239-249 Proposition of Innovative and Scalable Information System for Call Detail Records Analysis and Visualisation (Rafał Kozik, Michał Choraś, Marek Pawlicki, Aleksandra Pawlicka, Wojciech Warczak, Grzegorz Mazgaj).Pages 174-183Īutomatic Detection of Sensitive Information in Educative Social Networks (Víctor Botti-Cebriá, Elena del Val, Ana García-Fornes).Pages 184-194ĭetection of Artificial Images and Changes in Real Images Using Convolutional Neural Networks (Mariusz Kubanek, Kamila Bartłomiejczyk, Janusz Bobulski).Pages 197-207ĭistributed Architecture for Fake News Detection (Rafał Kozik, Michał Choraś, Sebastian Kula, Marek Pawlicki).Pages 208-217 Duong, Kim-Kwang Raymond Choo, Nhien-An Le-Khac).Pages 163-173 Probabilistic and Timed Analysis of Security Protocols (Olga Siedlecka-Lamch).Pages 142-151ĭomain Knowledge: Predicting the Kind of Content Hosted by a Domain (Suriyan Laohaprapanon, Gaurav Sood).Pages 152-162Įvidence Identification and Acquisition Based on Network Link in an Internet of Things Environment (Saad Khalid Alabdulsalam, Trung Q. Short Message Multichannel Broadcast Encryption (José Luis Salazar, Jose Saldana, Julián Fernández-Navajas, José Ruiz-Mas, Guillermo Azuara).Pages 122-131Ĭybersecurity Overview of a Robot as a Service Platform (Laura Fernández-Becerra, David Fernández González, Ángel Manuel Guerrero-Higueras, Francisco Javier Rodríguez Lera, Camino Fernández-Llamas).Pages 132-141 Health Access Broker: Secure, Patient-Controlled Management of Personal Health Records in the Cloud (Zainab Abaid, Arash Shaghaghi, Ravin Gunawardena, Suranga Seneviratne, Aruna Seneviratne, Sanjay Jha).Pages 111-121 Alegre).Pages 87-96Ĭrime Prediction for Patrol Routes Generation Using Machine Learning (Cesar Guevara, Matilde Santos).Pages 97-107 Impact of Current Phishing Strategies in Machine Learning Models for Phishing Detection (M. IoT Device Identification Using Deep Learning (Jaidip Kotak, Yuval Elovici).Pages 76-86 Directive 90 496 cee pdf file verification#Off-Line Writer Verification Using Segments of Handwritten Samples and SVM (Verónica Aubin, Matilde Santos, Marco Mora).Pages 57-65Ī Comparative Study to Detect Flowmeter Deviations Using One-Class Classifiers (Esteban Jove, José-Luis Casteleiro-Roca, Héctor Quintián, Francisco Zayas-Gato, Paulo Novais, Juan Albino Méndez-Pérez et al.).Pages 66-75 Securing Cryptoasset Insurance Services with Multisignatures (Daniel Wilusz, Adam Wójtowicz).Pages 35-44īuilding an Ethereum-Based Decentralized Vehicle Rental System (Néstor García-Moreno, Pino Caballero-Gil, Cándido Caballero-Gil, Jezabel Molina-Gil).Pages 45-53 The Evolution of Privacy in the Blockchain: A Historical Survey (Sergio Marciante, Álvaro Herrero).Pages 23-34 Kanhere).Pages 3-12īlockchain-Based Systems in Land Registry, A Survey of Their Use and Economic Implications (Yeray Mezquita, Javier Parra, Eugenia Perez, Javier Prieto, Juan Manuel Corchado).Pages 13-22 Attacking with Bitcoin: Using Bitcoin to Build Resilient Botnet Armies (Dimitri Kamenski, Arash Shaghaghi, Matthew Warren, Salil S.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |