A systematic review on security of E-commerce systems

S Badotra, A Sundas - International Journal of Applied Science and …, 2021 - gigvvy.com
With the emergence of digitalization, making the use of Internet almost for everything is not a
new trend. The maximum use of it is in the E-commerce systems. Most of the customers are …

A knowledge graph empowered online learning framework for access control decision-making

M You, J Yin, H Wang, J Cao, K Wang, Y Miao… - World Wide Web, 2023 - Springer
Abstract Knowledge graph, as an extension of graph data structure, is being used in a wide
range of areas as it can store interrelated data and reveal interlinked relationships between …

A novel statistical technique for intrusion detection systems

E Kabir, J Hu, H Wang, G Zhuo - Future Generation Computer Systems, 2018 - Elsevier
This paper proposes a novel approach for intrusion detection system based on sampling
with Least Square Support Vector Machine (LS-SVM). Decision making is performed in two …

Attribute-based access control for smart cities: A smart-contract-driven framework

Y Zhang, M Yutaka, M Sasabe… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Efficient and reliable access control in smart cities is critical for the protection of various
resources for decision making and task execution. Existing centralized access control …

[HTML][HTML] A graph empowered insider threat detection framework based on daily activities

W Hong, J Yin, M You, H Wang, J Cao, J Li, M Liu… - ISA transactions, 2023 - Elsevier
While threats from outsiders are easier to alleviate, effective ways seldom exist to handle
threats from insiders. The key to managing insider threats lies in engineering behavioral …

Semi-dilated convolutional neural networks for epileptic seizure prediction

R Hussein, S Lee, R Ward, MJ McKeown - Neural Networks, 2021 - Elsevier
Epilepsy is a neurological brain disorder that affects∼ 75 million people worldwide.
Predicting epileptic seizures holds great potential for improving the quality of life of people …

Evaluating the role of trust in consumer adoption of mobile payment systems: An empirical analysis

S Chandra, SC Srivastava, YL Theng - Communications of the …, 2010 - aisel.aisnet.org
Consumer adoption of mobile payment (m-payment) solutions is low compared to the
acceptance of traditional forms of payments. Motivated by this fact, we propose and test a …

Special issue on security and privacy of IoT

H Wang, Z Zhang, T Taleb - World Wide Web, 2018 - Springer
Recent years have witnessed the rapid development and deployment of the Internet of
Things (IoT) thanks to the tremendous advancement of computer and communication …

An empirical investigation on mobile banking service adoption in rural Karnataka

SVK Kishore, AH Sequeira - Sage Open, 2016 - journals.sagepub.com
Government of India (GOI) initialized financial inclusion campaign to quell exclusion. The
campaign did not gain expected progress. Government employed technologies to speed up …

Improving accessibility of the Australian My Health Records while preserving privacy and security of the system

P Vimalachandran, H Liu, Y Lin, K Ji, H Wang… - … Information Science and …, 2020 - Springer
Abstract Australian My Health Record (MyHR) is a significant development in empowering
patients, allowing them to access their summarised health information themselves and to …